Share on Google+Share on FacebookShare on LinkedInShare on TwitterShare on DiggShare on Stumble Upon
Custom Search
 
  
 


MIL-HDBK-1013/1A
+))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))),
*
*
*
* 1.  Locate critical assets on interior of facility in smallest volume
*
*
possible.
*
*
* 2.  Minimize window area.
*
*
*
* 3.  Glass doors in foyers are to be backed by solid door or wall.
*
*
*
* 4.  Do not allow windows to be next to doors such that aggressors could
*
*
*
unlock the doors through them.
*
*
* 5.  Layout buildings to conceal assets and make access difficult for
*
*
*
intruders.
*
*
* 6.  Simplify building configuration to eliminate hiding places.
*
*
*
* 7.  Design circulation to provide unobstructed views from control points  *
*
*
or occupied spaces.
*
*
* 8.  Arrange building interiors to eliminate hiding places around asset
*
*
*
location.
*
*
* 9.  Locate assets in spaces occupied 24 hours/day where possible.
*
*
*
*10.  Locate activities with large visitor populations away from protected  *
*
*
assets where possible.
*
*
*11.  Locate protected assets in common areas where they are visible to more*
*
*
than one person.
*
*
*12.  Place mail room on perimeter of facility.
*
*
*
.)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))-
Figure 28
Checklist of Minimum Building-Related Layout Considerations
5.3.2
Building Layout and Barrier Design.  Section 3 describes the
building layout and design process in detail.  Figure 28 provides a summary
checklist of minimum building-related layout considerations.  In general, the
critical assets to be protected should be located in the smallest volume
possible at a central point well within the interior of a building presenting
as many intermediate barriers to the intruder's path as possible.  An example
of a building layout that involves multiple barriers or shells is illustrated
in Figure 6 (Section 3).  As noted in Section 3, the total delay time offered
by all these barriers should equal or exceed the anticipated guard response
time.  The total delay time, in turn, is the sum of the penetration times
associated with each barrier plus the intruder ingress/egress time between
all
95








Western Governors University
 


Privacy Statement - Copyright Information. - Contact Us

Integrated Publishing, Inc. - A (SDVOSB) Service Disabled Veteran Owned Small Business