Identifying Control Perimeters

Khairallah, Michael
April 2007
Security: Solutions for Enterprise Security Leaders;Apr2007, Vol. 44 Issue 4, p72
Trade Publication
The article provides information on how to evaluate and determine the protection zone and observations points after establishing the security perimeter. It is important to identify the control perimeter to effectively observe the presence of the intruder and classify their intent. The proper placement of security cameras and the establishment of a command center are some of the factors to consider. It is also important to conduct a physical survey to determine the valid access and exit points.


Related Articles

  • United Building Security: Urban Challenges, Diverse Solutions.  // Security: Solutions for Enterprise Security Leaders;Mar2004, Vol. 41 Issue 3, p22 

    Focuses on the employment by Martin Cramer, vice president of the Downtown Dallas Security Directors Association, of a security video system for the facility of Dallas, Texas-based United Building Security. Description of the facility; Availability of the video system on a local area network;...

  • Time-sensitive Upgrade to IP Video.  // Security: Solutions for Enterprise Security Leaders;Nov2006, Vol. 43 Issue 11, p52 

    The article discusses the upgrade on the security video system of Sho Ka Wah Casino in California. Terri Seigler implemented an advance Internet Protocol based digital surveillance system using intelligent and networking by Intelligent Edge Switches. The said installation comprised of 300...

  • CCTV traps McVeigh: Multi-media surveillance advances, succeeds. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Jul97, Vol. 34 Issue 7, p23 

    Focuses on advances in multi-media surveillance technology. Use of closed-circuit television in security applications; Computer-based surveillance technology; Use of Object Linking and Embedding; Security software; Products by different manufacturers.

  • Super Bowl Spurs Face Recognition Technology.  // Security: Solutions for Enterprise Security Leaders;Mar2001, Vol. 38 Issue 3, p13 

    Focuses on the use of facial recognition technology for surveillance, crime detection and counter-terrorism operations in the United States. Software technology and video surveillance systems used during the Super Bowl event; Companies offering the facial recognition technology; Concern over...

  • Five Minute Tech Quiz. Nelson, Ron // SDM: Security Distributing & Marketing;Feb2009, Vol. 39 Issue 2, p67 

    A quiz concerning control panel and monitoring technology of security systems is presented.

  • ON THE MARKET.  // Security: Solutions for Enterprise Security Leaders;Jan1999, Vol. 36 Issue 1, p52 

    Features several electronic security systems in the United States. Details of SWM Series Spectra Compact Wall Mount from Pelco; Functionality of Alligro LTC 4300 Series phoneline video transmission system from Philips Communication & Security Systems; Description of SWC40 surveillance system...

  • CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions. Black, John; Rogaway, Phillip // Journal of Cryptology;Spring2005, Vol. 18 Issue 2, p111 

    We suggest some simple variants of the CBC MAC that enable the efficient authentication of arbitrary-length messages. Our constructions use three keys, K1, K2, K3, to avoid unnecessary padding and MAC any message M ? {0,1}* using max{1, ? |M|/n?} applications of the underlying n-bit block...

  • Two for the price of One. Partyka, Paul // American Coin-Op (Crain Communications Inc. (MI));Feb2008, Vol. 49 Issue 2, p32 

    The article offers information on surveillance system for security and remote business management. It is stated that surveillance systems can be very cheap but important business investment as they offer a sense of security as well as an option to watch over the business and manage them...

  • On the record.  // European Power News;Mar2006, Vol. 31 Issue 2, p23 

    The article reports on the launch of ABB's SM videographic recorder series. It further reports that the recorders can be set to send email notifications to several recipients in the event of an alarm to ensure that any alarm conditions are promptly identified and addressed. It also reports that...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics