Professional Documents
Culture Documents
Building Automation: Security Systems
Building Automation: Security Systems
MODULE 3
SECURITY
SYSTEMS
SECURITY SYSTEM FUNDAMENTALS:
INTRODUCTION TO SECURITY SYSTEMS
• The most basic definition of any security system is found in its name.
• Security has always remained a core and focued subsystem of entire BAS .
•Control Panel: The control panel is the computer that arms and disarms the security
systems, communicates with each installed component, sounds the alarm when a
security zone is breached, and communicates with an alarm monitoring company.
•Door and Window Sensors: Door and window sensors are comprised of two parts
installed adjacent to each other. One part of the device is installed on the door or
window and the other on the door frame or window sill. When a door or window is
closed, the two parts of the sensor are joined together, creating a security circuit.
alongside a fence.
Security design
Security design refers to the techniques and methods that position those hardware
and software elements to facilitate security.
Sensors: Devices which detect intrusions. Sensors may be placed at the perimeter of
the protected area, within it, or both. Sensors can detect intruders by a variety of
methods, such as monitoring doors and windows for opening, or by monitoring
unoccupied interiors for motions, sound, vibration, or other disturbances.
Alerting devices: These indicate an alarm condition. Most commonly, these are bells,
sirens, and/or flashing lights. Alerting devices serve the dual purposes of warning
occupants of intrusion, and potentially scaring off burglars. These devices may also be
used to warn occupants of a fire or smoke condition.
Concept of automation in access control system
for safety
Building automation and control systems (BACS) are an important part of
modern automated buildings. More and more they are also responsible
for functions affecting people’s safety, security and health. Thus the
respective technology is supposed to work reliably, securely, safely and
efficiently.
The two important features of such a BACS are functional safety and
system security (short safety and security) of both the network nodes and
the communication protocols.
Up to now little effort has been made to specify a life cycle for a safe and
secure BACS that defines requirements for the different stages of the
product life of a BACS.
Magnetic door contacts, which are tested on a regular schedule, are used to monitor
door alarms. Should there be a failure or undetected tampering, security personnel
performing routine integrity testing of the door and its alarms will detect the failure.
A card access system is installed to restrict access to authorized card holders. Any
unauthorized use of the card is recorded by CCTV, which provides a video audit trail
of the activity.
as an RFID reader or interrogator.
•As such, all access to resource objects is strictly controlled by the operating system
based on system administrator configured settings. It is not possible under MAC
enforcement for users to change the access control of a resource.
•Roles differ from groups in that while users may belong to multiple groups, a user
under RBAC may only be assigned a single role in an organization. Additionally, there
is no way to provide individual users additional permissions over and above those
available for their role. The accountant described above gets the same permissions as
all other accountants, nothing more and nothing less
THANKYOU