Quantcast Design Activity Chart

Share on Google+Share on FacebookShare on LinkedInShare on TwitterShare on DiggShare on Stumble Upon
Custom Search
 
  
 


MIL-HDBK-1013/1A
3.4.3
Design Procedure
3.4.3.1
Design Worksheets.  Worksheets to aid the design are contained in
Appendix A.  Table A-1 applies to a new facility and Table A-2 to the
retrofit of an existing facility.  These worksheets provide a convenient
format for entering and evaluating site and building construction options
with corresponding penetration times and ingress/egress times to allow
comparison with the threat assessment and guard response times.
3.4.3.2
Design Activity Chart.  The paragraphs that follow describe each
element of the flow chart in Figure 9.  The identifying number within (< >)
appearing outside each box in the figure corresponds to the paragraph number
below:
<1>  Establish security system requirements.  The procedures
outlined in Section 2 of this handbook should to followed to establish the:
a)
Design threat the security system must protect against.  The
specific tactics and security levels should be checked under Item 3 of the
worksheet (Appendix A).
b)
Minimum delay time required if the design threat includes a
forced entry.  This should at least equal the maximum anticipated guard force
response time.  This time should be entered as Item 4 of the worksheet
(Appendix A).
c)
Other constraints and requirements.  Any physical, functional,
or budgetary constraints associated with the site or building that may affect
the security system design.  This includes the required area of the secured
area, etc. (see Section 2).
<2>  Complete a preliminary layout of the exterior site and
building interior.  Guidelines for the layout of the site are provided in
par. 4.2.3, and par. 5.3.2 for the building interior.  In general, although
an existing facility may already have a fixed site and interior layout, some
flexibility may still be possible in adjusting this layout.  If possible, new
buildings should be located on the site to enhance the visual observation by
guards, to limit or preferably block vantage points for line-of-site weapons,
to maximize the threat ingress/egress time from the outer perimeter of the
site, and/or to provide adequate blast standoff against vehicle-transported
bombs. Within the building, the critical assets should be located in the
smallest volume possible at a central point well within the interior of the
building away from exterior walls, etc. presenting as many intermediate
barriers to the intruder's path as possible (consistent with operational and
functional requirements).  For example, if there is a basement in the
facility, the secured area should be located there.  If the facility is
multistoried, the secure area should be located in the approximate center
away from all exterior walls roofs and floors.
42





 


Privacy Statement - Copyright Information. - Contact Us

Integrated Publishing, Inc.
6230 Stone Rd, Unit Q Port Richey, FL 34668

Phone For Parts Inquiries: (727) 493-0744
Google +