SlideShare a Scribd company logo
BB Arch –IV Sem VII Advanced Building Services
BB Arch –IV Sem VII Advanced Building Services
Definition of Security:
Security systems are generally divided into
three sub-components:
1. • Access control
2. • Intrusion and
3. • Surveillance
Effective security systems integrate these
three areas, allowing the building mode,
function and operation to be pre-
scheduled or controlled by individual
access requests. A typical system will
involve:
• access card
• elevator interface
• door interface
• intrusion detection
• sensor detection, such as temperature,
moisture, glass breakage, etc.
• guard tours
• parking controls
The prevention of and protection against assault, damage, fire, fraud, invasion of
privacy, theft, unlawful entry, and other such occurrences
Life safety systems
•Known as “fire systems", are typically driven by
code considerations. Security systems are required to
release doors per code constraints under emergency
conditions.
•HVAC systems are also driven by life safety needs,
e.g., smoke extraction, stairwell pressurization and
elevator recall
Three concepts are important when developing effective building security programs:
1. Learn from the past:-
Previous acts of terrorism, violence, and disasters are instructive because they point out what happens
due to lack of preparedness, when risks are not fully considered or addressed. During the twentieth
century, most building codes and standards did not anticipate the range or likelihood of terrorist
threats, or the magnitude of destruction from natural disasters. The examination of what happened
and why brings about important changes to building codes and industry standards, thereby improving
public health, safety, and welfare, and preventing loss of life.
2. Integrate design, technology, and operations.
Building owners and project teams determine security requirements by conducting a risk assessment
and vulnerability analysis. This information is used to establish priorities and solutions for protecting
sites and facilities. The most successful security programs integrate good design and appropriate
technology with building operational policies and emergency procedures.
3. Plan and design transparent security.
Security need not be obtrusive, obvious, or restrictive to be effective. Installing concrete barriers in
front of buildings may discourage vehicular bomb threats, but will not necessarily ensure greater
security within buildings unless other elements are addressed. Transparent security, not visible to the
public eye, can be achieved through informed planning, design, and facility operations.
Building Security Theory:
BB Arch –IV Sem VII Advanced Building Services
BB Arch –IV Sem VII Intelligent Buildings
1. Definition Access Control System
A system to prohibit the entry of unwanted agents or
limited agents in a desired place.
•The Main panel is the brain of the system as it supports all the
wireless detectors, door sensor, PIR etc.
•The users can arm/disarm the alarm system by dialing the
telephone number connected to the main panel.
•The in built hooter gets the information from the sensors, it then
raises an audible alarm and panel simultaneously sends a single
to the Central Monitoring Service.
BB Arch –IV Sem VII Intelligent Buildings
Components of Access Control
Wireless Main Panel
Wired Main Panel
The Main Panel supports all the wireless detectors,PIR,door sensors
etc. The built-in hooter gets the information from sensors, to raise
an alarm and the panel simultaneously sends a signal to the
Monitoring Service.
Magnetic Door Sensor is used to monitor closed entry points
such as door and windows. It is designed to send signals to
main panel, when the contact between the transmitter and
corresponding magnetic sensor is broken.
Magnetic Door Sensor
•Motion sensor is equipped with passive infrared sensors that detect
unauthorized movement in the house when the Alarm System is in armed
condition.
•The motion sensor can distinguish between the movement of a pet and a
human, eliminating the possibility of a false alarm.
•In case of High traffic ,the sensors shutdown can detect pet immunity up to 27
kgs.
Motion Sensor
Glass Break Detector is a sensor that detects if a pane of glass
is shattered or broken. The sensors are placed near glass
window, which detect any glass breakages and instantly
triggers a signal to the Main Panel.
Glass Break Detector
BB Arch –IV Sem VII Intelligent Buildings
BB Arch –IV Sem VII Intelligent Buildings
The Smoke detector is configured to detect smoke emanating from
short circuit or any other negligence causing fire. Even before fire
starts, the detector warns people in the vicinity avoiding any
possibility of fire out-break.
Smoke detector
Hooter is on the key components of the alarm
system. It sends a strong hooter warning and alerts
the neighbors/ security guards.
Hooter
Key Fob enables arming and disarming
of the system. The panic button helps
to activate the alarm and allows to
protect premises and call for
emergency.
Key Fob
BB Arch –IV Sem VII Intelligent Buildings
•Intrusion detection is the act of detecting
unwanted traffic on a network or a device.
•An IDS can be a piece of installed software or a
physical appliance that monitors network traffic
in order to detect unwanted activity and events
such as illegal and malicious traffic, traffic that
violates security policy, and traffic that violates
acceptable use policies
•There are namely two types of IDS:
1. Network Intrusion Detection system
2. Wireless Intrusion Detection System
Agencies into Intrusion System
• McAfee
• Integrit
• Lumension
2. Definition of Intrusion system:
NIDS
WIDS
•Server protection —Designed to protect the underlying operating system
by helping prevent attackers from exploiting operating system and
application vulnerabilities.
•Web application protection —encrypted application layer intrusion
monitoring, analysis, and response capability for both Apache and IIS Web
servers
•Advanced intrusion prevention/blocking —Monitors all traffic to and
from the server or network in order to detect and prevent inbound attacks as
well as block new and unknown outbound attacks such as buffer overflows,
Trojans, brute force attacks, unauthorized access and network worms
Benefits of Intrusion Detection System
BB Arch –IV Sem VII Intelligent Buildings
• Closed-circuit television (CCTV) cameras can
produce images or recordings for surveillance
purposes, and can be either video cameras, or
digital stills cameras.
Surveillance is the monitoring of
the behavior, activities, or other
changing information.
3. Definition of Surveillance:
BB Arch –IV Sem VII Advanced Building Services
Application of Surveillance:
•Security: surveillance of car parks,
hotel lobbies, building halls, buildings,
public places etc.
•Industry: surveillance of stock, car
parks, ware-houses, receptions etc.
•Data Center: surveillance of network
equip-ment, access control for staff etc
•Private property: surveillance of
houses, yachts, garages etc.

More Related Content

Similar to Importance of.pdf

Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013
Niraj Kumar
 
An electronic switch sensor with a point to-point intrusive monitoring system
An electronic switch sensor with a point to-point intrusive monitoring systemAn electronic switch sensor with a point to-point intrusive monitoring system
An electronic switch sensor with a point to-point intrusive monitoring system
Zac Darcy
 

Similar to Importance of.pdf (20)

Pioneer Systems
Pioneer Systems Pioneer Systems
Pioneer Systems
 
Pioneer Systems
Pioneer SystemsPioneer Systems
Pioneer Systems
 
PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY
PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITYPSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY
PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY
 
Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013
 
What is the application of intruder detector.pdf
What is the application of intruder detector.pdfWhat is the application of intruder detector.pdf
What is the application of intruder detector.pdf
 
Security System with Advanced Intelligence for International Alexander
Security System with Advanced Intelligence for International AlexanderSecurity System with Advanced Intelligence for International Alexander
Security System with Advanced Intelligence for International Alexander
 
ISS Solution_IA_201605_en
ISS Solution_IA_201605_enISS Solution_IA_201605_en
ISS Solution_IA_201605_en
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Physical Security
Physical SecurityPhysical Security
Physical Security
 
Security measures
Security measuresSecurity measures
Security measures
 
SECURITY UPDATE.pptx
SECURITY UPDATE.pptxSECURITY UPDATE.pptx
SECURITY UPDATE.pptx
 
Electronic security system
Electronic security systemElectronic security system
Electronic security system
 
Effective Human Detection & Tracking Security Using Machine Vision
Effective Human Detection & Tracking Security Using Machine VisionEffective Human Detection & Tracking Security Using Machine Vision
Effective Human Detection & Tracking Security Using Machine Vision
 
BLE 1213 MUST (SESSION 2).pptx-Student learning Guide
BLE 1213 MUST (SESSION 2).pptx-Student learning GuideBLE 1213 MUST (SESSION 2).pptx-Student learning Guide
BLE 1213 MUST (SESSION 2).pptx-Student learning Guide
 
Physical security primer - JURINNOV - Eric Vanderburg
Physical security primer - JURINNOV - Eric VanderburgPhysical security primer - JURINNOV - Eric Vanderburg
Physical security primer - JURINNOV - Eric Vanderburg
 
An electronic switch sensor with a point to-point intrusive monitoring system
An electronic switch sensor with a point to-point intrusive monitoring systemAn electronic switch sensor with a point to-point intrusive monitoring system
An electronic switch sensor with a point to-point intrusive monitoring system
 
Smart
SmartSmart
Smart
 
Perimeter Security: Explore the Importance of Security, Future Trends and Eme...
Perimeter Security: Explore the Importance of Security, Future Trends and Eme...Perimeter Security: Explore the Importance of Security, Future Trends and Eme...
Perimeter Security: Explore the Importance of Security, Future Trends and Eme...
 
Bms for security systems
Bms for security systemsBms for security systems
Bms for security systems
 
Types Of Proactive Security Solutions For Self-storage
Types Of Proactive Security Solutions For Self-storageTypes Of Proactive Security Solutions For Self-storage
Types Of Proactive Security Solutions For Self-storage
 

More from Ruchi Gandhi (10)

History of Architecture.ppt
History of Architecture.pptHistory of Architecture.ppt
History of Architecture.ppt
 
Urban Housing.pptx
Urban Housing.pptxUrban Housing.pptx
Urban Housing.pptx
 
POLICIES.pdf
POLICIES.pdfPOLICIES.pdf
POLICIES.pdf
 
Persian GARDEN[1].pptx
Persian GARDEN[1].pptxPersian GARDEN[1].pptx
Persian GARDEN[1].pptx
 
5_3j_pp_plumbing overview_v2.0.ppt
5_3j_pp_plumbing overview_v2.0.ppt5_3j_pp_plumbing overview_v2.0.ppt
5_3j_pp_plumbing overview_v2.0.ppt
 
ppt.pptx
ppt.pptxppt.pptx
ppt.pptx
 
HOSPITAL LIFT.pptx
HOSPITAL LIFT.pptxHOSPITAL LIFT.pptx
HOSPITAL LIFT.pptx
 
IBC-Feb-2020-1.pptx
IBC-Feb-2020-1.pptxIBC-Feb-2020-1.pptx
IBC-Feb-2020-1.pptx
 
St_unit_Intro_to_Acoustics.pptx
St_unit_Intro_to_Acoustics.pptxSt_unit_Intro_to_Acoustics.pptx
St_unit_Intro_to_Acoustics.pptx
 
St_unit_Intro_to_Acoustics.pptx
St_unit_Intro_to_Acoustics.pptxSt_unit_Intro_to_Acoustics.pptx
St_unit_Intro_to_Acoustics.pptx
 

Recently uploaded

TitleD,R Abortion Clinic In Bulawayo⋑ +263778731218,/////Abortion Pills In .B...
TitleD,R Abortion Clinic In Bulawayo⋑ +263778731218,/////Abortion Pills In .B...TitleD,R Abortion Clinic In Bulawayo⋑ +263778731218,/////Abortion Pills In .B...
TitleD,R Abortion Clinic In Bulawayo⋑ +263778731218,/////Abortion Pills In .B...
sisternakatoto
 
Islamabad No 1 Amil Baba In Pakistan amil baba kala ilm.docx
Islamabad No 1 Amil Baba In Pakistan amil baba kala ilm.docxIslamabad No 1 Amil Baba In Pakistan amil baba kala ilm.docx
Islamabad No 1 Amil Baba In Pakistan amil baba kala ilm.docx
amilabibi1
 

Recently uploaded (20)

TitleD,R Abortion Clinic In Bulawayo⋑ +263778731218,/////Abortion Pills In .B...
TitleD,R Abortion Clinic In Bulawayo⋑ +263778731218,/////Abortion Pills In .B...TitleD,R Abortion Clinic In Bulawayo⋑ +263778731218,/////Abortion Pills In .B...
TitleD,R Abortion Clinic In Bulawayo⋑ +263778731218,/////Abortion Pills In .B...
 
Are Gutters Necessary? Explore the details now!
Are Gutters Necessary? Explore the details now!Are Gutters Necessary? Explore the details now!
Are Gutters Necessary? Explore the details now!
 
Reliable Logistics Solutions - Truxcargo
Reliable Logistics Solutions - TruxcargoReliable Logistics Solutions - Truxcargo
Reliable Logistics Solutions - Truxcargo
 
Delightful Finds: Unveiling the Power of Gifts Under 100
Delightful Finds: Unveiling the Power of Gifts Under 100Delightful Finds: Unveiling the Power of Gifts Under 100
Delightful Finds: Unveiling the Power of Gifts Under 100
 
New Portal - Task - Create Backlinks.docx
New Portal - Task - Create Backlinks.docxNew Portal - Task - Create Backlinks.docx
New Portal - Task - Create Backlinks.docx
 
Chandigarh call garal serives 9512450098
Chandigarh call garal serives 9512450098Chandigarh call garal serives 9512450098
Chandigarh call garal serives 9512450098
 
Top Email Marketing Trends to Watch in 2024
Top Email Marketing Trends to Watch in 2024Top Email Marketing Trends to Watch in 2024
Top Email Marketing Trends to Watch in 2024
 
BEst VASHIKARAN SPECIALIST 9463629203 in UK Baba ji Love Marriage problem sol...
BEst VASHIKARAN SPECIALIST 9463629203 in UK Baba ji Love Marriage problem sol...BEst VASHIKARAN SPECIALIST 9463629203 in UK Baba ji Love Marriage problem sol...
BEst VASHIKARAN SPECIALIST 9463629203 in UK Baba ji Love Marriage problem sol...
 
ANTIVIRUS IS A SOFTWARE|basics protection
ANTIVIRUS IS A SOFTWARE|basics protectionANTIVIRUS IS A SOFTWARE|basics protection
ANTIVIRUS IS A SOFTWARE|basics protection
 
Waikiki Sunset Catamaran ! MAITAI Catamaran
Waikiki Sunset Catamaran !  MAITAI CatamaranWaikiki Sunset Catamaran !  MAITAI Catamaran
Waikiki Sunset Catamaran ! MAITAI Catamaran
 
SECUREX UK FOR SECURITY SERVICES AND MOBILE PATROL
SECUREX UK FOR SECURITY SERVICES AND MOBILE PATROLSECUREX UK FOR SECURITY SERVICES AND MOBILE PATROL
SECUREX UK FOR SECURITY SERVICES AND MOBILE PATROL
 
Hire RoR Developers - ☎ +1 9177322215
Hire RoR Developers  -  ☎  +1 9177322215Hire RoR Developers  -  ☎  +1 9177322215
Hire RoR Developers - ☎ +1 9177322215
 
Business Solutions with .NET Development in Quantum Computing.pdf
Business Solutions with .NET Development in Quantum Computing.pdfBusiness Solutions with .NET Development in Quantum Computing.pdf
Business Solutions with .NET Development in Quantum Computing.pdf
 
WORK PERMIT IN BULGARIA | Work Visa Services
WORK PERMIT IN BULGARIA | Work Visa ServicesWORK PERMIT IN BULGARIA | Work Visa Services
WORK PERMIT IN BULGARIA | Work Visa Services
 
Maximizing Efficiency with Integrated Water Management Systems
Maximizing Efficiency with Integrated Water Management SystemsMaximizing Efficiency with Integrated Water Management Systems
Maximizing Efficiency with Integrated Water Management Systems
 
Are Seamless Gutters Worth It? Explore now
Are Seamless Gutters Worth It? Explore  nowAre Seamless Gutters Worth It? Explore  now
Are Seamless Gutters Worth It? Explore now
 
The Jamstack Revolution: Building Dynamic Websites with Static Site Generator...
The Jamstack Revolution: Building Dynamic Websites with Static Site Generator...The Jamstack Revolution: Building Dynamic Websites with Static Site Generator...
The Jamstack Revolution: Building Dynamic Websites with Static Site Generator...
 
Islamabad No 1 Amil Baba In Pakistan amil baba kala ilm.docx
Islamabad No 1 Amil Baba In Pakistan amil baba kala ilm.docxIslamabad No 1 Amil Baba In Pakistan amil baba kala ilm.docx
Islamabad No 1 Amil Baba In Pakistan amil baba kala ilm.docx
 
UbiBot Pricing Flexible Purchase Options And Transparent Prices - UbiBot.pptx
UbiBot Pricing Flexible Purchase Options And Transparent Prices - UbiBot.pptxUbiBot Pricing Flexible Purchase Options And Transparent Prices - UbiBot.pptx
UbiBot Pricing Flexible Purchase Options And Transparent Prices - UbiBot.pptx
 
Elevate Your Brand with Digital Marketing for Fashion Industry
Elevate Your Brand with Digital Marketing for Fashion IndustryElevate Your Brand with Digital Marketing for Fashion Industry
Elevate Your Brand with Digital Marketing for Fashion Industry
 

Importance of.pdf

  • 1. BB Arch –IV Sem VII Advanced Building Services
  • 2. BB Arch –IV Sem VII Advanced Building Services Definition of Security: Security systems are generally divided into three sub-components: 1. • Access control 2. • Intrusion and 3. • Surveillance Effective security systems integrate these three areas, allowing the building mode, function and operation to be pre- scheduled or controlled by individual access requests. A typical system will involve: • access card • elevator interface • door interface • intrusion detection • sensor detection, such as temperature, moisture, glass breakage, etc. • guard tours • parking controls The prevention of and protection against assault, damage, fire, fraud, invasion of privacy, theft, unlawful entry, and other such occurrences Life safety systems •Known as “fire systems", are typically driven by code considerations. Security systems are required to release doors per code constraints under emergency conditions. •HVAC systems are also driven by life safety needs, e.g., smoke extraction, stairwell pressurization and elevator recall
  • 3. Three concepts are important when developing effective building security programs: 1. Learn from the past:- Previous acts of terrorism, violence, and disasters are instructive because they point out what happens due to lack of preparedness, when risks are not fully considered or addressed. During the twentieth century, most building codes and standards did not anticipate the range or likelihood of terrorist threats, or the magnitude of destruction from natural disasters. The examination of what happened and why brings about important changes to building codes and industry standards, thereby improving public health, safety, and welfare, and preventing loss of life. 2. Integrate design, technology, and operations. Building owners and project teams determine security requirements by conducting a risk assessment and vulnerability analysis. This information is used to establish priorities and solutions for protecting sites and facilities. The most successful security programs integrate good design and appropriate technology with building operational policies and emergency procedures. 3. Plan and design transparent security. Security need not be obtrusive, obvious, or restrictive to be effective. Installing concrete barriers in front of buildings may discourage vehicular bomb threats, but will not necessarily ensure greater security within buildings unless other elements are addressed. Transparent security, not visible to the public eye, can be achieved through informed planning, design, and facility operations. Building Security Theory: BB Arch –IV Sem VII Advanced Building Services
  • 4. BB Arch –IV Sem VII Intelligent Buildings 1. Definition Access Control System A system to prohibit the entry of unwanted agents or limited agents in a desired place.
  • 5. •The Main panel is the brain of the system as it supports all the wireless detectors, door sensor, PIR etc. •The users can arm/disarm the alarm system by dialing the telephone number connected to the main panel. •The in built hooter gets the information from the sensors, it then raises an audible alarm and panel simultaneously sends a single to the Central Monitoring Service. BB Arch –IV Sem VII Intelligent Buildings Components of Access Control Wireless Main Panel Wired Main Panel The Main Panel supports all the wireless detectors,PIR,door sensors etc. The built-in hooter gets the information from sensors, to raise an alarm and the panel simultaneously sends a signal to the Monitoring Service.
  • 6. Magnetic Door Sensor is used to monitor closed entry points such as door and windows. It is designed to send signals to main panel, when the contact between the transmitter and corresponding magnetic sensor is broken. Magnetic Door Sensor •Motion sensor is equipped with passive infrared sensors that detect unauthorized movement in the house when the Alarm System is in armed condition. •The motion sensor can distinguish between the movement of a pet and a human, eliminating the possibility of a false alarm. •In case of High traffic ,the sensors shutdown can detect pet immunity up to 27 kgs. Motion Sensor Glass Break Detector is a sensor that detects if a pane of glass is shattered or broken. The sensors are placed near glass window, which detect any glass breakages and instantly triggers a signal to the Main Panel. Glass Break Detector BB Arch –IV Sem VII Intelligent Buildings
  • 7. BB Arch –IV Sem VII Intelligent Buildings The Smoke detector is configured to detect smoke emanating from short circuit or any other negligence causing fire. Even before fire starts, the detector warns people in the vicinity avoiding any possibility of fire out-break. Smoke detector Hooter is on the key components of the alarm system. It sends a strong hooter warning and alerts the neighbors/ security guards. Hooter Key Fob enables arming and disarming of the system. The panic button helps to activate the alarm and allows to protect premises and call for emergency. Key Fob
  • 8. BB Arch –IV Sem VII Intelligent Buildings •Intrusion detection is the act of detecting unwanted traffic on a network or a device. •An IDS can be a piece of installed software or a physical appliance that monitors network traffic in order to detect unwanted activity and events such as illegal and malicious traffic, traffic that violates security policy, and traffic that violates acceptable use policies •There are namely two types of IDS: 1. Network Intrusion Detection system 2. Wireless Intrusion Detection System Agencies into Intrusion System • McAfee • Integrit • Lumension 2. Definition of Intrusion system: NIDS WIDS
  • 9. •Server protection —Designed to protect the underlying operating system by helping prevent attackers from exploiting operating system and application vulnerabilities. •Web application protection —encrypted application layer intrusion monitoring, analysis, and response capability for both Apache and IIS Web servers •Advanced intrusion prevention/blocking —Monitors all traffic to and from the server or network in order to detect and prevent inbound attacks as well as block new and unknown outbound attacks such as buffer overflows, Trojans, brute force attacks, unauthorized access and network worms Benefits of Intrusion Detection System BB Arch –IV Sem VII Intelligent Buildings
  • 10. • Closed-circuit television (CCTV) cameras can produce images or recordings for surveillance purposes, and can be either video cameras, or digital stills cameras. Surveillance is the monitoring of the behavior, activities, or other changing information. 3. Definition of Surveillance: BB Arch –IV Sem VII Advanced Building Services Application of Surveillance: •Security: surveillance of car parks, hotel lobbies, building halls, buildings, public places etc. •Industry: surveillance of stock, car parks, ware-houses, receptions etc. •Data Center: surveillance of network equip-ment, access control for staff etc •Private property: surveillance of houses, yachts, garages etc.