Three levels of security

March 2012 Surveillance

Security or operations managers should be aware that there are three levels that need to be protected when designing a physical security programme. These include the outer perimeter, the inner perimeter and the interior.

The outer perimeter is defined by the actual property lines. In securing the outer perimeter the objective is to control who can walk or drive onto the property. In deciding the type of perimeter security to implement, one needs to weigh the risk of an intruder entering the property with the cost of the available security measures. Criminals like to feel in control as they enter and exit the property. The perception is then one of lower risk. A way to deter criminals is to use natural access control, which includes building, and landscape features. The idea is to guide people as they enter and exit an area. This can also prove useful to block any potential escape routes.

The use of territorial reinforcement can effectively prevent unauthorised entry by creating a clear distinction between public and private property. By adopting this distinction, legitimate occupants have a sense of ownership and will notice any perpetrators who will have a hard time blending in.

The inner perimeter includes doors, windows and walls of a building. Traditional methods used to protect these include locks and keys, or proximity readers with access tags and cards. A common problem is loss of control of access media, which includes these keys, access tags and cards. Recent developments have seen the increased usage of biometric readers which read some type of unique human feature such as fingerprints. The advantage of these systems is the inability to do buddy clocking.

Selecting IP

Commercial security solution providers should seriously consider an IP-based system when designing a surveillance system. The uptake of megapixel IP camera utilisation has seen the price of these systems dropping over recent times. Studies have shown that the total cost of ownership of an IP solution of 32 cameras is actually cheaper than a similar 32 camera analogue system.

Of course, the resolution of the IP solution is better (currently a magnitude of 10 times). The higher resolution of the megapixel allows for a certain amount of digital zooming without picture degradation. This makes identification of an intruder or perpetrator a lot more reliable as well as having a better chance of the video footage standing up in court as legitimate evidence. There is also less cable (about one-third) required when compared to analogue.

Video analytics are proving to be an important factor in the future implementation of video surveillance. Surveillance systems are becoming larger with the count of cameras regularly exceeding 100 cameras on an average commercial site. It is impossible for an operator to monitor all the cameras all the time. Video analytics can be implemented to overcome this issue.

For example, a surveillance system can be set up to do a ‘screen pop’ when a restricted area has been entered. Any surveillance platform (example NVR or DVR) will allow you to record and store video on cost-effective hard drives. The point has been reached where the amount of video storage has exceeded the ability to analyse. Video analytics can also help in this aspect. For example, an intelligent search option will allow the operator to search through hours of video and only list the incidences where people entered a building. Typical types of video analytics include general motion, missing object, camera occlusion, foreign object, focus lost and signal loss.

The technologies used in providing perimeter and interior security can and should overlap (for example cameras can be used on the perimeter or inside the buildings). The effectiveness of security technology is the ability to ensure a safe environment. However, only implementing one technology in each of the three levels can present the possibility of a security breach. Security or operations managers should look at implementing two or three measures at each level.

For more information contact IP Security Solutions, +27 (0)11 553 3300,  [email protected], www.ipsecuritysolutions.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Human-centric control rooms
Iritron Integrated Solutions Surveillance Residential Estate (Industry)
Iritron and Oculus show that when it comes to control rooms, people, not just technology, are at the centre of the most significant performance differentiators today, not just how efficiently the technology works.

Read more...
Smarter security for safer estate living
neaMetrics Suprema Integrated Solutions Surveillance Access Control & Identity Management Residential Estate (Industry)
The expansion of residential estates has led to many communities being constructed with security as an afterthought. Unfortunately, fencing, cameras, and a guard at the gate only create a false sense of safety, which vanishes after the first incident.

Read more...
Secure, long-distance thermal from Keenfinity
Products & Solutions Surveillance Residential Estate (Industry)
The DINION thermal 8100i camera is a bullet thermal camera built for mission-critical applications, prioritising long-distance monitoring and reliable perimeter intrusion detection with built-in Intelligent Video Analytics (IVA) Pro Perimeter video analytics.

Read more...
IVA AI Pro Visual Gun Detection
Products & Solutions Surveillance Security Services & Risk Management Residential Estate (Industry)
Bosch has announced the launch of the IVA AI Pro Visual Gun Detection analytics based on deep learning. It is designed for automatic detection and classification of people and brandished firearms.

Read more...
IP-based horn loudspeakers
Products & Solutions Surveillance Security Services & Risk Management Residential Estate (Industry)
Bosch has announced the launch of its new IP-based horn loudspeakers and amplifier module: the high-output LHN-UC15L-SIP horn (for long-throw applications), the compact LHN-UC15W-SIP horn (for wide-angle coverage) and the AMN-P15-SIP amplifier module.

Read more...
Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Make BIG and COMPLEX small and manageable
neaMetrics Suprema AI & Data Analytics Surveillance Integrated Solutions
Traditional CCTV and access systems often operate separately, creating gaps in visibility and efficiency. TRASSIR and Suprema have partnered to develop an integrated platform that improves security, operations, and situational awareness.

Read more...
Get the AI fundamentals right
Leaderware Editor's Choice Surveillance AI & Data Analytics
Much of the marketing for CCTV AI detection implies the client can just drop the AI into their existing systems and operations, and they will be detecting all criminals and be far more efficient when doing it.

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
LiDAR protects railways from new and existing dangers
Surveillance
3D LiDAR (Light Detection and Ranging) sensors are being installed to monitor rail traffic and ensure safety of passengers as well as individuals walking near the tracks, or trying to perform dangerous stunts for social media.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.