You are on page 1of 111

REG 261 - BUILDING SERVICES

Topic 4: Building Security System

Sr Dr. Md Azree Othuman Mydin


azree@usm.my
04-6532813
www.hbp.usm.my/azree

1
LECTURE CONTENT
Building security system
1.0 Introduction to Building Security System
2.0 Purpose of Building Security System
3.0 Level of building security
4.0 Security system components
4.1 Outer Perimeter control
4.2 Lighting
4.3 Access control
4.4 Pedestrian traffic control
4.5 Intrusion detection (alarm)
4.6 Video Monitoring
2
GROUND RULES

Please interrupt immediately if you...


 Can’t hear

 Can’t see or read the slides

 Find the presentation confusing

 …Let’s address the situation ASAP!

3
What your first thought about
building security system?

4
What is Building Security System ?

• protect from unwanted incident


• safeguard personnel
• assures safety
• freedom from risk or danger

5
What are some of the
conventional building security
methods exist in Malaysia?

6
PADLOCK 7
SECURITY DOOR LOCK

8
Spikes atop a barrier wall

9
Defendius Labyrinth Security Lock
Every time you open the door that makes you solve a maze to unlock it 10
Do you know what is the most
common home security
method among the Chinese in
Malaysia?

11
12
Safety and security??

13
Safety vs security

There is a very thin line that separates safety from security in


buildings

Definition (safety and security)


“safety is taken to mean the protection of the occupants of the
building (and a lesser extent their possessions) from accident;
while security is assumed to mean protection from willful attack
those occupants, their possessions and the actual property they
occupy” – Marsh (1985)

14
Safety vs security

Therefore the difference between safety and security is


very much depending on situations – one is unintentional
while the other one is intentional.

e.g. In case of a fire


- Normally it is unintentional – therefore it involves safety
- If it is an inflammable (combustible) – it involves security

15
2.0 PURPOSE OF BUILDING SECURITY

- To control intruders from entering the buildings or the


properties
- To protect valuable belongings which the effectiveness
is dependable on the building design

16
3.0 LEVEL OF BUILDING SECURITY

Depends on several factors


- Location of buildings
- Purpose of buildings
- Socio economy of surrounding neighbourhood
- Equipment/system installed

3 levels of security
- Low level security
- Medium level security
- High level security
17
i. Low Level Security

- Normally for residential and small scale commercial buildings


- Additional locks at main entrance, chain etc. as well as for
windows
- Alarm system only for 1 or 2 zones within the premise
- Fire alarm is separated from the security systems since the
possibility of fire is higher compared to intrusion

18
ii. Medium Level Security

- Applied to medium size industrial and commercial buildings


- Use of keys in buildings is monitored and controlled
- Stand-alone card reader for certain areas in buildings
- Anti-vandal protection equipment & anti-bandit glazing at high risk area
such as exhibition area
- Use of CCTV at entrance point

19
iii. High Level Security

- Applied to big scale commercial buildings and industrial building complex


- Advance and extensive entrance monitoring system plus recording system
- Integrated & centralized security management & monitoring system
- Centralized system directly connected to authorities
- Automatic intruder sensors, fire alarm & comprehensive CCTV

20
What level of security needed?

High level 21
What level of security needed?

Medium level 22
What level of security needed?

Medium level
23
What level of security needed?
High level

24
What level of security needed?
Medium level Low level

25
This place need a security system?

?
Low level

26
What level of security needed?
High level

27
4.0 SECURITY SYSTEM COMPONENTS

 Outer Perimeter control


 Lighting
 Access control
 Pedestrian traffic control
 Intrusion detection (alarm)
 Video Monitoring

28
4.1 Outer Perimeter Control

Man-made structural protective barriers (such


as fences, walls, floors, roofs, grills, bars,
roadblocks, signs, or other construction)
used to protect a facility's potential access
ways, restrict, channel, or impede progress.

29
Why Perimeter Control?

• Control access to all building entrances


• Enhance perimeter security
• Restrict or to channel potential access ways

30
4.1 Outer Perimeter Control

 The most common type of structural outer perimeter barrier is the fence. 
 However, it isn’t good enough to simply throw up a fence and call it a day. 
 Instead, your fence, a preventive device, should be supported by one or
more additional prevention and detection controls. 
 The number of controls you implement and to what extent are dependent
upon the risks your building or property faces.

31
Fence basics

 A fence is both a psychological and a physical barrier. 


 The psychology comes into play when casual passers-by encounter
it. 
 It tells them that the area on the other side is off-limits, and the
owner would probably rather they didn’t walk across the property. 
 A fence or wall of three to four feet is good enough for this.

32
4.1 Outer Perimeter Control
 For those who are intent on getting to your
data center or other collection of information
assets, fence height should be about seven
feet. 
 For facilities with high risk concerns, a top
guard is usually added. 
 The top guard consists of three to four
strands of barbed wire spaced about six inches
apart and extends outward at a 45 degree
angle. 
 The total height, including fence and top
guard, should reach eight feet.

33
Types of fence

34
Types of fence

35
Types of fence

36
Types of fence

37
Gothic Point 38
Regular point 39
Stockade 40
Fence - perimeter control
Fence - perimeter control
Blockers
Landscape berms
4.2 Lighting

One of the most basic (and cheapest)


components of a security system.
Carefully designed and coordinated interior
and exterior lighting systems can exert a
significant deterrent (prevention) effect

45
Purpose of Lighting?

Security lighting may be provided to aid:


1. Detection of intruders
2. Deter (prevent) intruders
3. Simply to increase the feeling of safety.

46
Types of Lamps

Types of Lamps Used in Outdoor/Indoor Lighting:


1) Incandescent
2) Fluorescent
3) Metal Halide
4) High Pressure-Sodium
5) Low Pressure Sodium
47
Types of Lamps

1) Incandescent

 most familiar to homeowners


 used for the majority of residential lighting, both indoor and outdoor.
 commonly used in applications where such low outputs are needed and
where the lighting is often switched off and on.
 Advantages: low capital cost for lamps and luminaries, wide availability,
wide variety of both lamp and fixture types, lack of hazardous wastes.
 Disadvantages: short lifetimes, low efficiency with resultant high per-lumen
energy use and life cycle cost, attraction of insects
48
Types of Lamps

2) Fluorescent

 predominate in indoor retail and office uses, and are occasionally seen in
outdoor area lighting
 available in the so-called "compact" styles
 Advantages: low life cycle costs, high efficiency compared to incandescent,
no warm-up period, good colour rendition, and long lifetimes
 Disadvantages: higher initial costs compared to incandescent lamps, large
lamp size, low efficiency, poor output maintenance
49
Types of Lamps

3) Metal-Halide

 Light is produced by the passage of an electrical arc through a small tube filled with
mercury vapour and metal halides at 2-4 times atmospheric pressure.
 Advantages: a wide variety of moderate to high luminous output lamps, high efficiency
compared to incandescent and mercury vapour, and good colour rendition.
 Disadvantages: lower efficiency and output maintenance compared to high- and low-
pressure sodium, shorter lamp lifetime compared to high-pressure sodium, colour
changes, ultra-violet output if not adequately filtered

50
Types of Lamps

4) High-Pressure Sodium (HPS)

 Light is produced by passing an electric arc through a small tube filled with sodium
vapour at about 1/4 atmospheric pressure
 Advantages: long lifetime, high efficiency and good maintenance of luminous output,
moderate colour rendition compared to low-pressure sodium, wide availability,
moderate cost of lamps and luminaries.
 Disadvantages: poorer colour rendition than metal halide, fluorescent and incandescent,
poorer output maintenance and efficiency than low-pressure sodium

51
Types of Lamps

5) Low-Pressure Sodium (LPS)

 Light is produced by the passage of an electrical arc through a tube filled with
sodium vapour at about 6 millionths of atmospheric pressure
 Advantages: the highest luminous efficiency and lowest energy use, low glare
associated with the large lamps, good visibility and low scattering
 Disadvantages: lack of colour rendition, shorter lamp lifetime and higher lamp
replacement costs compared to HPS, and large lamp size in the higher output
lamps
52
Types of Lamps

Which one is the best?? 53


4.2 Lighting
Lighting Efficiency Calculation:

Efficiency = Output (lumens)


Wattage (watt)

Efficiency - mean luminous efficiency for lamp output range

Wattage - Lamp wattages most commonly used in general outdoor lighting

Output - approximate mean luminous outputs of lamps most commonly used in outdoor lighting

54
4.2 Lighting
Exercise:
1. Calculate the efficiency of Low-Pressure Sodium (LPS) lamp which has lamp wattage of 95W and
luminous outputs of 14750lm? 155 lumen/watt

2. What is the average efficiency of a Metal Halide lamp with luminous outputs between 7000-
7600lm and lamp wattage between 100-140W? 61 lumen/watt

3. Figure out the wattage of Incandescent lamp which has luminous efficiency of 11lm/W and
luminous outputs of 400lm? 36 lumen/watt

4. Total luminous outputs of 2 fluorescent lamps are 5500ml. The lamp wattage for each lamp is
48W. Determine the efficiency of each fluorescent lamp? 57 lumen/watt

5. A building owner is looking for an external security lighting for his house. As a consultant, could
you assist this building owner on the selection of the lamp with best efficiency for his external
security lighting?
Option 1: HPS lamp with lamp wattage of 60W and luminous outputs of 4500lm Suggestion:
Option 2: Incandescent lamp with lamp wattage of 67W and luminous outputs of 1115lm
Option 3: Metal Halide lamp with lamp wattage of 80W and luminous outputs of 6000lm
Option 1
55
4.2 Lighting

Solution Q1:
Calculate the efficiency of Low-Pressure Sodium (LPS) lamp which has lamp
wattage of 95W and luminous outputs of 14750lm?

Efficiency = 14750lm / 95W


= 155 lumen/watt

56
4.2 Lighting

Solution Q2:
What is the average efficiency of a Metal Halide lamp with luminous outputs
between 7000-7600lm and lamp wattage between 100-140W?
Average luminous outputs = 7300lm
Average lamp wattage = 120W
Efficiency = 7300lm / 120W
= 61 lumen/watt

57
4.2 Lighting

Solution Q3:
Figure out the wattage of Incandescent lamp which has luminous efficiency of
11lm/W and luminous outputs of 400lm?

Wattage = 400W / 11lm/W


= 36 Watt

58
4.2 Lighting

Solution Q4:
Total luminous outputs of 2 fluorescent lamps are 5500ml. The lamp wattage
for each lamp is 48W. Determine the efficiency of each fluorescent lamp?
Luminous output for each fluorescent lamp = 5500W/2 = 2750W

Efficiency = 2750lm / 48W


= 57 lumen/watt

59
4.2 Lighting

Solution Q5:
A building owner is looking for an external security lighting for his house. As a consultant,
could you assist this building owner on the selection of the lamp with best efficiency for
his external security lighting?
Option 1: HPS lamp with lamp wattage of 60W and luminous outputs of 4500lm
Option 2: Incandescent lamp with lamp wattage of 67W and luminous outputs of 1115lm
Option 3: Metal Halide lamp with lamp wattage of 80W and luminous outputs of 6000lm

Efficiency Op1 (HPS) = 4500lm / 60W = 75 lumen/watt


Efficiency Op2 (Incandescent) = 1115lm / 67W = 17 lumen/watt
Efficiency Op3 (Metal Halide) = 6000lm / 80W = 75 lumen/watt
Suggestion: Although HPS and Metal Halide lamp have the same efficiency level,
HPS lamp will be recommended because it has better lamp life hours of 18000-
24000 compared to Metal halide which has lamp life hours of 10000-20000
60
4.2 Lighting

Types of outdoor security lighting:


• The type of lighting system used depends on the installation's overall
security requirements.
• Four types of lighting units are used for security lighting systems are:
- continuous
- standby
- movable (portable)
- emergency

61
4.2 Lighting

i. Continuous lighting
 is the most common security-lighting system.
 consists of a series of fixed lights arranged to flood a given area continuously
during darkness with overlapping cones of light

ii. Standby lighting


 has a layout similar to continuous lighting.
 however, the luminaries are not continuously lit but are either automatically
or manually turned on when suspicious activity is detected or suspected by the
security force or the alarm systems

62
4.2 Lighting

iii. Movable lighting


 consists of manually operated, movable searchlights that may be lit during
hours of darkness or only as needed.
 the system normally is used to supplement continuous or standby lighting.

iv. Emergency lighting


 system of lighting that may duplicate any or all of the above systems.
 its use is limited to times of power failure or other emergencies that render
the normal system inoperative.
 It depends on an alternative power source such as installed or portable
generators or batteries
63
Movable Outdoor Security Lighting
4.1 Lighting

64
Outdoor Security Lighting: Solar Panel

65
Floodlight Outdoor Security Lighting
66
4.3 Access Control

 way of restricting entrance to a property,


a building, or a room to authorized persons
 access control is a matter of who, where,
and when

67
4.3 Access Control

 Includes the immense variety of card-readers, chip-readers, and electronic


locks that read information encoded on the cards, disks, or keys carried by
employees.
 Popular systems incorporate insertion- or swipe-readers that interpret
magnetic-stripe cards, or proximity-readers that do not require physical
contact with the cards they read.
 Some more sophisticated systems incorporate biometric devices based on
fingerprints, voiceprints, retinal patterns and the like to allow or forbid
access to restricted areas

68
4.3 Access Control

Access control can be achieved by 2 means:


 a human (a guard, bouncer, or receptionist),
 through mechanical means such as locks
and keys, or through technological means such
as access control systems

69
Access Control – Card Reader

Access control card readers are used in physical security


systems to read a credential that allows access through access
control points, typically a locked door. There are 5 types of
access control reader:
 magnetic stripe reader
 bar code reader
 proximity reader
 smart card reader
 biometric reader.
70
i. Magnetic Stripe Reader

 also known as mag-stripe because of the stripe of magnetic


oxide tape that is laminated on a card.
 A mag-stripe card is cheap compared to other card
technologies and is easy to program.
 The magnetic stripe holds more data than a bar code in the
same space.
 Magnetic stripe technology is also vulnerable to misreads,
card wear and data corruption.
Magnetic Card Reader 72
Magnetic Card Reader
ii. Bar Code Reader

 A barcode is a series of alternating dark and light stripes that are


read by an optical scanner.
 Sometimes the digits represented by the dark and light bars are
also printed to allow people to read the number without an optical
reader.
 Advantage: cheap and easy to generate the credential, and it
can easily be applied to cards or other items.
 However the same affordability and simplicity makes the
technology susceptible to fraud, because fake barcodes can also be
created cheaply and easily
i. Magnetic Stripe Reader

Bar Code Card Reader


iii. Proximity Reader

 One of the first card reader technology used previously


 This method was abandoned in favor of other technologies
 When a card is presented to the reader, the reader's electrical
field excites a coil in the card. The coil charges a capacitor and in
turn powers an integrated circuit (IC).
The integrated circuit outputs the card number to the coil which
transmits it to the reader.
i. Magnetic Stripe Reader

Proximity Card Reader


iv. Smart Card Reader

 There are two types of smart cards: contact and contactless.


Both have an embedded microprocessor and memory.
 The smart card differs from the card typically called a proximity
card in that the microchip in the proximity card has only one
function: to provide the reader with the card's identification
number.
The processor on the smart card has an embedded operating
system and can handle multiple applications such as a cash card, a
pre-paid membership card, and even an access control card.
i. Magnetic Stripe Reader

Contactless Smart Card Raeder


i. Magnetic Stripe Reader

Contact Smart Card Raeder


v. Biometric Reader

 There are several forms of biometric identification


employed in access control: fingerprint, hand
geometry, iris and face recognition.
 The use of biometric technology significantly
increases security level of systems because it
eliminates such problems as lost, stolen or loaned ID
cards, and forgotten or guessed PINs
i. Magnetic Stripe Reader

Biometric: Card Reader plus fingerprint


i. Magnetic Stripe Reader

Biometric Reader: Hand Geometry


Biometric Reader: Face recognition
4.4 Pedestrian Traffic Control

 Closely related to access control, covers devices


such as electronic turnstiles equipped with card-
readers.
 Banks of turnstiles often include larger
gateways, also equipped with card readers, for
wheelchair access.
ROUND-E turnstile. This turnstile is suitable solution for
entrance halls and lobby where a high performance and
aesthetics is required
Full Height Turnstiles
Tripod Turnstiles
4.5 Intrusion Detection

 Also known as alarm system


 Intrusion detection monitors for unauthorized
access.
 It is less a preventative measure and more of a
response trigger, although some would argue that it
is a deterrent.
 Intrusion detection has a high incidence of false
alarms.
4.5 Intrusion Detection
 In many jurisdictions, law enforcement will not respond to alarms from
intrusion detection systems.For example, a motion sensor near a door could
trigger on either:

or

 The sensor itself does not do identification and as far as it is designed,


anything moving near that door is unauthorized
4.5 Intrusion Detection

 Includes many types of sensors and alarm


systems.
 Infrared motion sensors can be ceiling- or wall-
mounted where such detectors are mostly used to
protect interior spaces
 There are motion detectors available for exterior
use as well
4.5 Intrusion Detection
4.5 Intrusion Detection

External motion detector


4.6 Video Monitoring

 Very popular and vital building security system


 Security cameras (CCTV) can be a deterrent in many cases,
but their real power comes from incident verification and
historical analysis
 For example, if alarms are being generated and there is a
camera in place, the camera could be viewed to verify the alarms.
 In instances when an attack has already occurred and a
camera is in place at the point of attack, the recorded video can
be reviewed.
Types of CCTV cameras

There are 7 types of CCTV cameras:


1. Indoor camera
2. Outdoor camera
3. IR Day/Night Camera
4. Dome Camera
5. Bullet Camera
6. Vandal Proof Camera
7. Hidden Camera
1. Indoor Camera

 Indoor camera as the name suggests are used


for indoor security mechanism.
 Depending upon your security needs, you can
mount it at any suitable location inside the
building.
 These are suitable for security in homes,
schools, offices, hotels, etc.
1. Indoor Camera

Indoor CCTV Camera


2. Outdoor Camera

 Outdoor CCTV Camera is used for outdoor


places.
 They are mostly used for entry and exit points
with limited night lighting.
 Outdoor cameras typically have hard shell
vandal-proof casings and a variety of lens
options. 
1. Indoor Camera

Outdoor CCTV Camera


1. Indoor Camera

Outdoor CCTV Camera


3. IR Day/Night Camera

 used for high alert security areas where surveillance needs to


happen throughout day and night.
 In the daytime the camera functions like a normal camera with
standard colors and at night it switches to low-lux black and white
mode.
 When visibility decreases due to no-light at night, Infrared LEDs are
automatically illuminated providing full security.
 These cameras are used by military personals, in parking lots, and
high security zones
1. Indoor Camera

IR day/night CCTV camera


1. Indoor Camera

IR day/night CCTV camera


4. Dome Camera

installed inside a dark dome and are designed in a way that


they go unnoticed by visitors.
 They come in compact design for a discreet appearance.
 The thief does not know if the camera is recording.
 These cameras can also be rotated and tilted manually.
 Dome type cameras are used in public places like railway
station, bus terminals, casino and other areas where there is
huge gathering of people.
5. Indoor Camera

Dome CCTV camera


5. Bullet Camera

 Bullet cameras are placed inside a bullet shaped


housing, and they are used in residential places as well as
commercial places.
 They are small in size, have an integrated design, and
are really effective.
 Offer illuminate viewing even in darkness and are
weatherproof as well.
1. Indoor Camera

Bullet CCTV camera


6. Vandal Proof Camera

 used as outdoor security cameras.


 these cameras are sheltered within solid material and are
covered by a "hub" of break-proof glass which doesn't hinder
the quality of the video camera streams.
 it is difficult to break these cameras and this makes them
perfect for high security.
 they are suitable for wall or ceiling mounting and are rain and
fog resistant.
1. Indoor Camera

Vandal Proof CCTV camera


7. Hidden Camera

 Hidden cameras are compact in size and are used for secret
monitoring.
 They are usually installed in public places like department
stores, theatres, clubs, etc.
 Hidden cameras have a built-in recorder that records and
broadcasts simultaneously.
 By using a large number of security cameras and networking
them various strategic views of the place can be obtained.
References

 Greeno, R. (1997). Building Services Technology and


Design. Essex: Longman.
 Marsh, P. (1985). Security in Building. London:
Construction Press.
 Tan Hong Guan (2003). Kajian Sistem Sekuriti
Bangunan: Kawalan Akses Orang Awam di Lapangan
Terbang. B. Arch. Dissertation, USM.
 Various internet sources

You might also like