You are on page 1of 32

Security Systems

Submitted by , Aditya . D
1001052 VIITH SEM
B . Arch Sec “B”
SPA JNAFAU
Definition

 An electrical device that sets off an alarm


when someone tries to break in.
 Security is the degree of resistance to, or
protection from, harm.
 It applies to any vulnerable and valuable
asset, such as a person, dwelling, community,
nation, or organization.
Security concepts
Certain concepts recur throughout different fields of security:
 Assurance - assurance is the level of guarantee that a security
system will behave as expected
 Countermeasure - a countermeasure is a way to stop a threat from
triggering a risk event
 Defense in depth - never rely on one single security measure alone
 Exploit - a vulnerability that has been triggered by a threat - a risk of
1.0 (100%)
 Risk - a risk is a possible event which could cause a loss
 Threat - a threat is a method of triggering a risk event that is
dangerous
 Vulnerability - a weakness in a target that can potentially be
exploited by a security threat.
Security Devices
 Security Camera (CCTV):  the use of video cameras to
transmit a signal to a specific place, on a limited set of
monitors. It differs from broadcast television in that the
signal is not openly transmitted, though it may employ point
to point (P2P), point to multipoint, or mesh wireless links.
 Though almost all video cameras fit this definition, the term
is most often applied to those used for surveillance in areas
that may need monitoring such as banks, casinos, airports,
military installations, and convenience stores.
  Video telephony is seldom called "CCTV" but the use of
video in distance education, where it is an important tool, is
often so called.
 Metal Detector: A metal detector is a portable electronic
instrument which detects the presence of metal nearby.
 Metal detectors are useful for finding metal inclusions hidden
within objects, or metal objects buried underground.
 They often consist of a handheld unit with a sensor probe which
can be swept over the ground or other objects.
 If the sensor comes near a piece of metal this is indicated by a
changing tone in earphones, or a needle moving on an indicator.
 Usually the device gives some indication of distance; the closer
the metal is, the higher the tone in the earphone or the higher the
needle goes.
 Another common type are stationary "walk through" metal
detectors used for security screening at access points in prisons,
courthouses, and airports to detect concealed metal weapons on a
person's body.
Electronic Article Surveillance (EAS):

 Electronic article surveillance (EAS) is a technological method


for preventing shoplifting from retail stores, pilferage of books
from libraries or removal of properties from office buildings.
Special tags are fixed to merchandise or books
 . These tags are removed or deactivated by the clerks when the
item is properly bought or checked out
 . At the exits of the store, a detection system sounds an alarm or
otherwise alerts the staff when it senses active tags.
 Some stores also have detection systems at the entrance to the
bathrooms that sound an alarm if someone tries to take unpaid
merchandise with them into the bathroom.
 When the alarm sounds to ensure that employees respond to
the alarm. The keypad keeps beeping until an employee
responds to it. For high-value goods that are to be manipulated
by the patrons, wired alarm clips may be used instead of tags.
Tiger teeth - Traffic control:

 Tiger Tooth Traffic controllers enforce “One


Way” traffic flow for parking facilities or other
single direction vehicle lanes.
 The torsion spring actuated Tiger Teeth
positively control traffic in one direction while
permitting free flow in the other direction.
 The Tiger Teeth will puncture all pneumatic tires
including steel belted radial and large truck tires.
Barriers and Barricades:
Barricade, from the French barrique (barrel), is any object
or structure that creates a barrier or obstacle to control,
block passage or force the flow of traffic in the desired
direction.
Adopted as a military term, a barricade denotes any
improvised field fortification, most notably on the city
streets during urban warfare.
Barricades also include temporary traffic
barricades designed with the goal of dissuading passage
into a protected or hazardous area or large slabs of
cement whose goal is to actively prevent forcible passage
by a vehicle.
Stripes on barricades and panel devices slope downward in
the direction traffic must travel.
Guard Tour System :
The system uses a reader that the guard carries along and
uses every time he walks by a checkpoint
. Upon each contact made, a date and time stamped along
with the checkpoint information is recorded into the
device.  
 If event reporting is desired (for example, broken window,
lights left on, etc) then they can be easily reported with the
use of an event table (included with the system) by just
touching the appropriate event within the table, after a
checkpoint it relates to.  
 The information stored in the reader (holds 28,675
transactions) can the easily downloaded to the computer
with the use of the communication cable included with the
system.   The information then becomes available for
printing or screen viewing through multiple types of
available reports.
Perimeter Protection:
Outdoors mechanical and/or electronic systems
conceived to protect the external perimeter of a
facility.
Intercom
Audio and Video: An intercom (intercommunication
device), talkback or door phone is a stand-alone
voice communications system for use within a
building or small collection of buildings, functioning
independently of the public telephone network.
Intercoms are generally mounted permanently in
buildings and vehicles.
Intercoms can incorporate connections to public
address loudspeaker systems, walkie
talkies, telephones, and to other intercom systems.
Some intercom systems incorporate control of
devices such as signal lights and door latches.
Counterfeit Detection Pen:
Counterfeit banknote detection pens are used to
detect counterfeit Swiss franc, euro and United States
banknotes amongst others.
Typically, genuine banknotes are printed on paper based on
cotton fibers, and do not contain the starches that are
reactive with iodine.
When the pen is used to mark genuine bills, the mark is
yellowish or colourless. Counterfeit pens are most effective
against notes printed on standard printer
or photocopier paper.
Assets and Personnel Control:

Automatic Identification system offer tools designed to identify


locate and track your people and assets right from the desktop.
From protecting office computers to monitoring personnel and
inventory movements, these system now bring total visibility to
your operations. 

Based on its patented RFID (Radio Frequency Identification)


line, the product provides a single-system approach to a variety
of automatic monitoring and tracking applications, including:
 Asset Management
 Personnel & Vehicle Access Control
 Personnel Monitoring
 Production and Process Control
 Inventory Tracking
Security Alarms:
 A security alarm is a system designed to detect intrusion –
unauthorized entry – into a building or area. Security alarms are
used in residential, commercial, industrial, and military properties
for protection against burglary (theft) or property damage, as well
as personal protection against intruders.
 Car alarms likewise protect vehicles and their
contents. Prisons also use security systems for control of inmates.
 Some alarm systems serve a single purpose of burglary
protection; combination systems provide both fire and intrusion
protection.
 Intrusion alarm systems may also be combined with closed-circuit
television surveillance systems to automatically record the
activities of intruders, and may interface to access control systems
for electrically locked doors. Systems range from small, self-
contained noisemakers, to complicated, multi-area systems with
computer monitoring and control.
Audio Recorders:
Sound recording is an electrical or mechanical inscription and
re-creation of sound waves, such as spoken voice,
singing, instrumental music, or sound effects.
This device can be used for security purpose.
Vehicle Inspection:
 Vehicle inspection is a procedure mandated by national or
subnational governments in many countries, in which a
vehicle is inspected to ensure that it conforms to
regulations governing safety, emissions, or both.
Inspection can be required at various times, e.g.,
periodically or on transfer of title to a vehicle.
 Utilizing dual periscopic mirrors, two powerful fluorescent
lights and rugged castored wheels, this system works
together to provide an extraordinary field of view
unmatched by any other method
 . While standing erect at the side of the vehicle, the
operator can conduct a detailed inspection of half the
undercarriage at a single glance.
 Moving along the center line, the entire chassis, engine
compartment, power units and any newly welded
X-ray Scanner - X ray Machine
 - X Ray Scanners: An X-ray generator is a device used to
generate X-rays.
 It is commonly used by radiographers to acquire an x-
ray image of the inside of an object (as in medicine or non-
destructive testing) but they are also used
in sterilization or fluorescence.
Smoke detector:
 A smoke detector is a device that detects smoke, typically as an
indicator of fire.
 Commercial, industrial, and mass residential devices issue a signal
to a fire alarm system, while household detectors, known as smoke
alarms, generally issue a local audible or visual alarm from the
detector itself.
Smoke detectors are typically housed in a disk-shaped plastic
enclosure about 150 millimetres (6 in) in diameter and 25 millimetres
(1 in) thick.
Most smoke detectors work either by optical detection (photoelectric)
or by physical process (ionization), while others use both detection
methods to increase sensitivity to smoke. Sensitive alarms can be
used to detect, and thus deter, smoking in areas where it is banned
such as toilets and schools
. Smoke detectors in large commercial, industrial, and residential
buildings are usually powered by a central fire alarm system, which is
powered by the building power with a battery backup.
 Fire fighting systems, fire fighting equipment, fire
fighting equipment and accessories like wet riser
system, Co2 flooding system, water spray
system, fire hydrant systems, fire sprinkler
systems, fire alarm systems, fire detection
systems are important to be applied in buildings for
the safety of citizens.
THE END

THANK YOU 

You might also like