TITLE

Identifying Control Perimeters

AUTHOR(S)
Khairallah, Michael
PUB. DATE
April 2007
SOURCE
Security: Solutions for Enterprise Security Leaders;Apr2007, Vol. 44 Issue 4, p72
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article provides information on how to evaluate and determine the protection zone and observations points after establishing the security perimeter. It is important to identify the control perimeter to effectively observe the presence of the intruder and classify their intent. The proper placement of security cameras and the establishment of a command center are some of the factors to consider. It is also important to conduct a physical survey to determine the valid access and exit points.
ACCESSION #
24829248

 

Related Articles

  • United Building Security: Urban Challenges, Diverse Solutions.  // Security: Solutions for Enterprise Security Leaders;Mar2004, Vol. 41 Issue 3, p22 

    Focuses on the employment by Martin Cramer, vice president of the Downtown Dallas Security Directors Association, of a security video system for the facility of Dallas, Texas-based United Building Security. Description of the facility; Availability of the video system on a local area network;...

  • Time-sensitive Upgrade to IP Video.  // Security: Solutions for Enterprise Security Leaders;Nov2006, Vol. 43 Issue 11, p52 

    The article discusses the upgrade on the security video system of Sho Ka Wah Casino in California. Terri Seigler implemented an advance Internet Protocol based digital surveillance system using intelligent and networking by Intelligent Edge Switches. The said installation comprised of 300...

  • ON THE MARKET.  // Security: Solutions for Enterprise Security Leaders;Jan1999, Vol. 36 Issue 1, p52 

    Features several electronic security systems in the United States. Details of SWM Series Spectra Compact Wall Mount from Pelco; Functionality of Alligro LTC 4300 Series phoneline video transmission system from Philips Communication & Security Systems; Description of SWC40 surveillance system...

  • CCTV traps McVeigh: Multi-media surveillance advances, succeeds. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Jul97, Vol. 34 Issue 7, p23 

    Focuses on advances in multi-media surveillance technology. Use of closed-circuit television in security applications; Computer-based surveillance technology; Use of Object Linking and Embedding; Security software; Products by different manufacturers.

  • Super Bowl Spurs Face Recognition Technology.  // Security: Solutions for Enterprise Security Leaders;Mar2001, Vol. 38 Issue 3, p13 

    Focuses on the use of facial recognition technology for surveillance, crime detection and counter-terrorism operations in the United States. Software technology and video surveillance systems used during the Super Bowl event; Companies offering the facial recognition technology; Concern over...

  • Five Minute Tech Quiz. Nelson, Ron // SDM: Security Distributing & Marketing;Feb2009, Vol. 39 Issue 2, p67 

    A quiz concerning control panel and monitoring technology of security systems is presented.

  • Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security. Hoi-Kwong Lo; Chau, H.F.; Ardehali, M. // Journal of Cryptology;Spring2005, Vol. 18 Issue 2, p133 

    We devise a simple modification that essentially doubles the efficiency of the BB84 quantum key distribution scheme proposed by Bennett and Brassard.We also prove the security of our modified scheme against the most general eavesdropping attack that is allowed by the laws of physics. The first...

  • CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions. Black, John; Rogaway, Phillip // Journal of Cryptology;Spring2005, Vol. 18 Issue 2, p111 

    We suggest some simple variants of the CBC MAC that enable the efficient authentication of arbitrary-length messages. Our constructions use three keys, K1, K2, K3, to avoid unnecessary padding and MAC any message M ? {0,1}* using max{1, ? |M|/n?} applications of the underlying n-bit block...

  • SUCCESS STORIES IN ALARM INTEGRATION. Engebretson, Joan // SDM: Security Distributing & Marketing;Aug2005, Vol. 35 Issue 8, p44 

    Describes how alarm integration improves the effectiveness of access control and video surveillance at three separate facilities in the U.S. Features of the integrated security system installed at beverage manufacturer Bacardi Bottling Corp.; Advantages of the integrated system at Northeaster...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics