Quantcast Security Design Procedure

Share on Google+Share on FacebookShare on LinkedInShare on TwitterShare on DiggShare on Stumble Upon
Custom Search
 
  
 


MIL-HDBK-1013/1A
3.3.7
Intrusion Detection System.  This is a system designed to detect
and alarm the approach, intrusion, or presence of an intruder by reaction of
a mechanical or electronic detector.
3.3.8
Restricted Area.  A restricted area is an area to which entry is
subject to special restrictions or control for security reasons, or to
safeguard property or material. This does not include those designated areas
restricting or prohibiting overflight by aircraft. Restricted areas may be of
different types depending on the nature and varying degree of importance of
the security interest, or other matter contained therein. Restricted areas
must be authorized by the installation/activity commander, properly posted,
and shall employ physical security measures.
3.4
Security Design Procedure
Overview.  Figure 9 presents a design activity flow chart outlining
3.4.1
a recommended procedure for designing an integrated physical security system
for a facility.  This procedure is intended to be used with the information
and data contained in Sections 4 through 8. With the exceptions noted, the
same general procedure applies to the design of a security system for a new
facility or the retrofit of an existing facility.  Note that a single box in
the flow chart represents a design activity, while one or more boxes preceded
by a circle (an "or") means an either/or design option.  Finally, a diamond
represents a decision point.  The number appearing at the top of a box or
diamond is the section (or paragraph) number in this handbook containing
related guidelines and data.  Since the more severe design threats are likely
to control the selection of building elements, the procedure focuses first on
the vehicle bomb, standoff weapon, and ballistic weapon attacks, followed by
the forced and covert entry threats.  The forced-entry design segment
addresses the exterior site security elements first, followed by building
security elements.  These security elements include barrier construction,
intrusion detection sensors, CCTV, lighting, etc.  The covert threat segment
addresses the selection of sensors and entry control to counter these
threats.
Design Approach.  The objective is to identify an integrated
3.4.2
physical security system design that achieves a cost-effective application of
security system resources.  This usually means identifying and securing the
innermost and smallest volume possible.  In general, securing large extended
volumes of a building or a fenced-in site perimeter around a building is
necessary only:  (1) if required by a DoD regulation, (2) to establish an
adequate blast zone for a vehicle bomb attack, or (3) as a sacrificial area
for standoff weapon protection.  In most other situations, the  design should
harden and secure the smallest volume comprising the innermost interior shell
layer surrounding the critical asset.  Outer security hardened barriers are
included in the design only if necessary to achieve additional required delay
time.
33





 


Privacy Statement - Copyright Information. - Contact Us

Integrated Publishing, Inc.