1. Introduction
- Risk Management
- Who Are You, and Why Are You Here?
- Finding a Solution
2. Problem Definition
- What Needs Protecting?
- Who is Allowed Where?
3. Methods of Identification
- Reliability vs. Cost
- Combining Methods to Increase Reliability
- Security System Management
4. Access Control
- What You Have
- What You Know
- Who You Are
5. Other Security Systems Elements
- Building Design
- Piggybacking and Tailgating: Mantraps
- Camera Surveillance
- Security Guards
- Sensors and Alarms
- Visitors
6. The Human Element
- People: The Weakest Link
- People: The Strongest Backup
7. Site Design
- Layers
- Components
- Tactics
8. Controlling Site Access
- Entry Control Facility
- Zones of an Entry Control Facility
- Utilities and Automatition
9. Chosing the Right Solution
- Risk Tolerance vs. Cost
- Security System Design Considerations
- Building Security Design Considerations
|
|
Sensors and Alarms
Everyone is familiar with traditional house and building alarm systems and their sensors motion sensors, heat sensors, contact (door-closed) sensors, and the like. Data center alarm systems might use additional kinds of sensors as well laser beam barriers, footstep sensors, touch sensors, vibration sensors. Data centers might also have some areas where a silent alarm is preferred over an audible one in order to catch perpetrators in the
act.
If the sensors are network-enabled, they can be monitored and controlled remotely by a management system, which could also include personnel movement data from access-control devices (see earlier section, Security System Management.)
To receive your Physical Vulnerability Assessment, please submit your payment of $999.00
B E T T E R: Please submit your payment of $1999.00 for a complete Physical Vulnerability Assessment or Design covering a single location.
|