Object Location (Site Position) And Environment - Analysis - Xtrails ADPRO PRO-18 Planning And Commissioning Manual

Table of Contents

Advertisement

ADPRO Passive-Infrared (PIR) PRO Series by Xtralis
For this purpose, the wiring (number of wires, cable length, cable channels, cable lengths,
interfaces) must match exactly. What information is needed for what system should be
specified.
5.1.5 Object Location (Site Position) and Environment – Analysis
5.1.5.1 Threats – Risk – Scenarios – Probabilities
Many commercial sites and industrial buildings, and related open spaces like distribution
centres and garages with large open spaces, goods and equipment storage areas, or scrap
yards, do not present too great a challenge to potential criminals.
In times of economic crisis, these outlying places present a particular incentive for criminal
enterprises, and can lead to risks if unauthorised and unnoticed access takes place. Due to
the increasing interdependency of modern business processes even small disruptions can
lead to considerable financial damage.
As part of a comprehensive security plan, building security focuses on the protection of the
contents. The use of mechanical perimeter security measures in combination with an
electronic security system is now well known and widely accepted. So a comprehensive
security plan begins right at the boundary of the property.
The concept of comprehensive security must now be analysed in detail.
1.
Threat Analysis
This includes the identification of possible threats and offender profiles, the assessment of
possible damage, and the estimation of the probability of an accident. Owners themselves,
landlords, lenders, police, the fire brigade and future insurers must be included in the
planning.
2.
Threat Scenarios
As part of these planning notes, the following scenarios are conceivable:
Theft of existing goods from the premises
Breaking into buildings
Sabotage or vandalism of operational facilities
Espionage
Arson
3.
Offender Profiles
With regard to the previously mentioned threats the following different offender profiles can
be assumed:
Opportunistic Offender
Who seizes an opportunity to gain something as a means of payment, or of value in
itself (drug-related crime), or who commits vandalism, such as spraying graffiti, setting
fires, or sabotage.
Professional Criminal
An individual, or gangs, which are characterised by their targeted approach (such as
the purchase of specialised car parts according to serial number, targeted theft of
recycling, sabotage or espionage).
4.
Offenders' "qualifications", or level of performance of a security system,
according to European Standard EN 50131-1
Grade 1: Low Risk
An intruder or robber has little admitted knowledge of the security system; he has a
limited number of readily available tools.
Doc. 20780_03
NOTE!
Risks to people's lives and hostage takings are not discussed in these
planning notes.
Planning and Commissioning Manual
7

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents