Share on Google+Share on FacebookShare on LinkedInShare on TwitterShare on DiggShare on Stumble Upon
Custom Search
 
  
 


alarm control and monitoring location, ensure that the operator is not
over-loaded with supervisory functions for the electronic elements.  More
than likely, he will have several ancillary duties.  Limits have been
established on the effectiveness of this critical function.
3.4.8  Provide for Critical Area Sensor Zones to be Tied Into CCTV
Assessment.  The adequacy of security force response depends upon the
ability of the command and control function to reliably assess the nature of
the alarm and to communicate in near real time the circumstances in the
area.  The installation of localized CCTV cameras tied into the sensor
annunciation control network permits the operator to view immediately the
alarming sector, verify the threat as real, and communicate relevant
information to response forces.  This is also useful during periods when
nuisance alarms are being generated by environmental stimuli and as a check
on maintenance in these sensitive sectors.
3.4.9  Integrate Security Subsystems for Total Protection.  As discussed in
Section 2 of this manual, the truly effective security system totally
integrates barriers, equipment, people, and procedures into a functional
whole.  The system designer must identify the subsystem elements required
for the unique protection needs of each definable area of the site and then
build a total system to control each vulnerability.  Too much reliance on
electronics or any other subsystem will invariably overlook the dynamics of
threat or other constraints on system performance.
3.5  Security System Design Process.  It is imperative that the design
process proceed through a comprehensive requirements analysis and
preliminary design phase, despite how elementary the proposed application
may be.
3.5.1  NAVFAC Responsibility for Security Requirements Analysis.  This
design manual does not suggest or recommend that NAVFAC, its contracted A&E
firms, or system installation contractors be responsible for the gathering
of intelligence and other information essential to the security requirements
analysis.  HIS, Federal, state, and local investigative agencies, as well as
specific elements of DoD and Navy activities, have clear responsibilities in
these areas.  However, the integration of this information (at appropriate
classification levels) into the NAVFAC-directed design is clearly essential
to the MCON-related security system implementation process.
3.5.2  Consistency of the Security System and MCON Design Process.
Generally, the MCON process is divided into four phases of varying duration
and involves several deliverables: preliminary investigations and the
preliminary design phase (concept study) leading to the 35 percent design,
and the 100 percent design completion phase.  Then the project is bid for
construction/installation, checkout, and turnover.  Below, the system
implementation cycle is described in four phases from inception through
turnover, phases 1 and 2 comprising up through the MCON 35 percent design;
phase 3 leading to the 100 percent design and preparation for installation








Western Governors University
 


Privacy Statement - Copyright Information. - Contact Us

Integrated Publishing, Inc. - A (SDVOSB) Service Disabled Veteran Owned Small Business