Integrated security systems.

Integrated security systems.

Integrated security systems

Integrated security systems

In recent years, in addition to traditional alarm, security and fire alarm systems, access control and management tools and closed-circuit television systems have been widely used to enhance the security of facilities.

The practice of using such a combination by leading companies in the form of integrated security systems (hereinafter referred to as ISO) allows us to consider the general technical requirements that, when implemented, can provide the most optimal solutions.

Based on the current principles of facility security, we can consider the impact of integrating technical security equipment on:

— strengthening the resistance to intruders entering the protected facility and/or committing any unauthorized, including criminal, actions;
— ensuring the access mode established at the facility;
— ensuring information security;
— improving remote monitoring and control over the state and changes in the protected area;
— increasing the reliability of information on attempted violations or unauthorized actions;
— improving the organization of security and safety services to eliminate violations and eliminate unauthorized actions and increasing the efficiency of decision-making.

Main characteristics of ISO

Integrated security systems are currently understood as a set of interconnected and technically, software-, information- and operationally compatible technical means and systems of alarm, security and fire alarm systems (hereinafter referred to as TS OPS) with means or systems of access control and management (hereinafter referred to as KUD) and/or closed-circuit television systems for security (hereinafter referred to as ZTO) to solve the organization of security of facilities (facility zones).

Technical, software, information and operational compatibility of ISO can be characterized by the unity of functions and technical characteristics aimed at enhancing the protection of the facility, with:

— interaction of technical means and devices of systems;
— operation of programs of one system in another and exchange of subroutines necessary for interaction;
— establishment of the type, methods of storage, registration, display and recording of information;
— use of standard sets of equipment, devices during operation and maintenance to monitor operability and repair.

When combining technical means and security systems, three main integration levels can be considered:

1 — application of OPS TS with KUD means and systems (symbol ISO-1);

2 — application of OPS TS with ZTO means and systems (symbol ISO-2);

3 — application of OPS TS with KUD and ZTO means and systems (symbol ISO-3).

In addition, integration by points (location) of unification of performance of certain functions of devices, instruments and other components of ISO can be considered.

Such points can be:

— hardware and software that provide control over the state and management of the facility's security from a post, a facility security point or a centralized observation point of non-departmental security;
— devices, for example, addressable security control panels or KUD system controllers that perform limited integration functions.

The formation of integration in the first version can also be performed in several versions, for example, in the form of a specialized system that provides functions and technical characteristics for one of the ISO levels with a set of devices, devices with a single software and with certain methods of protection against unauthorized access to information.

The system can be built from the subsystems of the TS OPS, KUD, ZTO, software and other possible subsystems, for example, the subsystem of the object configuration.

Another implementation can be performed by combining individual systems of the fire alarm system, control system and fire alarm system at the level of the central computer with specially developed software, which also has certain methods of protection against unauthorized access to information.

The formation of integration in the second version can be carried out at intermediate sections of the facility's security with subsequent transmission of signals and information to the security point or when organizing autonomous security.

The presented integration levels currently provide the levels of facility security that were discussed in detail in the article “Categorization and Security of Facilities” (Security, Communications and Telecommunications Systems, 1999, No. 26).

Depending on the type of security and composition of the TSO, the use of ISO for facility and centralized security of facilities presented in Tables 1 and 2 can be considered.

In the tables, the sign «+» — denotes the necessity, the sign «-» — the absence, and the sign «±» the possibility of the presence of ISO.

Table 1. Facility security

From Tables 1 and 2 it is clear that in the case of facility security, the issue of using ISO of different levels is determined mainly by the customer, while in the case of centralized security for groups of facilities 8-11, their use becomes mandatory.


Table 2. Centralized security

The central, main link in the ISO is the TS OPS, in connection with which the establishment of technical characteristics and the choice of parameters should be based on the regulatory documents in force for them and the practice of their application.

These include the following.

GOST 4.188-85 «Means of security, fire and security and fire alarm systems. Nomenclature of indicators».

GOST 26342-84 «Security, fire and security and fire alarm systems. Types, main parameters and dimensions».

GOST 27990-88 «Security, fire and security and fire alarm systems. General technical requirements».

GOST R 50775-95 (IEC 839-1-4-88) «Alarm systems. Part 1. General requirements. Section 1. General provisions».

GOST R 50775-95 (IEC 839-1-4-89) «Alarm systems. Part 1. General requirements. Section 4. Guidelines for design, installation and maintenance».

From 1.01.2000, GOST R 51241-98 «Access control and management means and systems. Classification. General specifications and test methods» comes into force.

For the first time, the standard establishes a classification of means and systems by:

— functional characteristics;
— electromagnetic compatibility and immunity to electromagnetic interference;
— resistance to unauthorized actions, including the protection of systems from unauthorized access to information.

This standard can also become a starting point for developing requirements and creating an ISO standard.

When forming an ISO standard(s), the following general provisions should be taken into account.

1. Regulatory documents in the form of standards are created to improve the security system of objects of various purposes and various forms of ownership and establish general technical requirements and testing methods for devices, instruments included in the system, and the system itself.

2. The structure of a regulatory document may include state and departmental standards, guidelines of industry ministries, as well as technical conditions of manufacturers of technical security equipment.

3. The creation of the standard should be aimed primarily at solving issues of comprehensive protection of especially important objects such as banks, museums, storage facilities for material and cultural values, storage sites for especially dangerous substances and materials, and should facilitate the creation of conditions for their insurance by insurance companies.

4. The structure of the standard should provide for the possibility of developing new, missing standards for all devices, instruments and systems included in ISO, and promote the modular principle of their construction.

5. The standard should ensure interrelation with standards and other normative documents on detectors, devices, equipment, means and systems included in ISO.

Necessary factors for developing a standard on ISO

1. Use of the nomenclature of indicators according to GOST 4.188 and the main parameters according to GOST 26342 for ISO characteristics:

— dimensions of the protected area;
— range of supply voltages;
— power consumption in standby mode and in the «alarm» mode;
— current consumption from the backup power source in standby mode and in the «alarm» mode;
— probability of failure-free operation;
— probability of failure leading to false alarm;
— average service life;
— average time to restore working condition;
— indicators of resistance to external influencing factors;
— safety indicators.

The quality characteristics in the standard include:

— algorithm for servicing protected objects (manual, semi-automatic, automatic);
— availability of loop operability monitoring;
— availability of operability monitoring of individual units, means, devices;
— possibility of joint operation of a set number of devices of the same type;
— availability of reverse communication channels (remote control and signaling) in information transmission means;
— the ability to automatically change the configuration of communication lines;
— the ability to reserve certain units, means, devices.

The listed indicators can be supplemented with the main parameters according to GOST 26342, namely:

a) individual parameters of security and fire alarms, which can also characterize the parameters of TV cameras used in ISO;

b) a number of parameters of control and monitoring devices, control devices and information transmission systems, considering them in relation to ISO;

c) power supply parameters, taking into account the requirements of safety and power supply backup standards.

The parameters of group a) include:

— maximum value of the operating range (length of the detection zone);
— maximum value of the width of the detection zone;
— controlled areas and volume at the upper and lower limits of the speed of human movement;
— sensitivity as the value of human (detection object) movement at set speeds of movement in the detection zone;
— noise immunity as the value of the main interference parameter that does not lead to false alarms.

The following can be attributed to the parameters of group b):

— information capacity as the maximum possible number of protected objects or object zones, controlled alarm loops and/or connecting communication lines;
— information content as the number of types of notifications transmitted (received, displayed or registered) with or without indication of the location and/or time of occurrence of the event with or without display on the monitor screen — speed of information transfer via a group communication channel;
— number of monitored directions, alarm loops;
— maximum distance of information reception and transmission, resistance of the alarm loop, signal line.

Parameters of group c) — power supply parameters — must be extended to the devices and systems included in the ISO, adjusted according to the values ​​of permissible deviations and supplemented with the following technical characteristics:

— backup power supply, types of backup power sources;
— ensuring automatic transition to backup power supply and back without disrupting the established operating modes and functional state of the ISO equipment and systems;
— electrical insulation resistance and permissible values ​​depending on operating conditions;
— electrical insulation strength in accordance with the requirements of GOST 12.2.006-87.

The given indicators and parameters are largely used and sufficiently specified by types or subgroups of homogeneous products of security, fire and security and fire alarm systems in GOST R 27990, as well as GOST R 50775 for alarm systems.

2. Implementation of continuity and interrelation with GOST 27990, GOST R 50775 and GOST R 50776 during the development of the ISO standard.

3. Technical requirements should also include characteristics of software and hardware at ISO points.

Considering the diversity of types of objects and proposed levels of protection, the following provisions can be considered when developing technical requirements for ISO:

— conditions for outputting information to one or more personal computers from ISO devices and systems;
— ensuring priority output of information about attempts and when unauthorized actions are committed, indicating the location of the action;
— ensuring a minimum delay time for displaying alarm information when a number of messages are received simultaneously, with mandatory indication of their presence;
— the ability to provide output of alarm, service information to one personal computer with several computers and its recording;
— output to the computer screen of the facility plan indicating security zones and locations of TSO;
— ensuring identity when displaying information about alarm messages from various components of the ISO;
— ensuring equal protection from unauthorized access to alarm information received from the components of the ISO; if necessary, for certain types of messages of higher protection, the incoming information should be stored on a separate computer.

5. A special section should be made up of requirements for resistance to destructive and non-destructive unauthorized actions. The following main indicators may be specified in the section:

— types of destructive and non-destructive effects;
— types of devices, means to which requirements should be imposed on the types of effects;
— levels and classes of resistance on the types of effects;
— reflection of stability levels and classes in the designation of means, systems or their individual devices, as well as in design, technical documentation and when ordering them.

The ISO standard should take into account the introduction of GOST R 51241 classes for the functional characteristics of the KUD systems, as well as the proposed introduction of classes for closed-circuit television systems for the protection of facilities. The need to introduce classes in ISO automatically arises. System classes should not be established by a simple combination of functions included in the systems, but should be characterized by the most important, qualitative indicators that determine the interaction in matters of:

— ensuring the protection of the facility at specified security levels;
— increasing the reliability of unauthorized access and the efficiency of taking measures to eliminate them;
— monitoring the condition and functioning of devices, devices, and ISO tools;
— ensuring the stability of software and hardware ISO tools to unauthorized access;
— conditions for the presentation, storage, recording and current information and ensuring access to it and protection from unauthorized access;
— power supply and power backup.

Among the characteristics of the KUD systems that determine the requirements for ISO, the following can be distinguished:

— programming of the support implemented at the facility of the operating mode;
— ensuring the reliability of identification;
— ensuring the required throughput at access points and compliance of the control system devices with the number of users and security zone;
— the need and possibility of separating the passage of personnel and clients;
— control of the passage status at access points;
— registration and storage of information about events;
— tactics, a set of user actions when passing;
— type of control of actuators: manual, semi-automatic, automatic;
— ensuring blocking and unblocking of passages from the control panel;
— remote control of actuators;
— ensuring free passage in emergency situations and blocking passages in case of unauthorized actions with the issuance of an alarm signal;
— eliminating the possibility of unauthorized passage of two or more persons with one pass;
— the need and possibility of creating a combined or separate passage with inspection.

The following functional characteristics can be highlighted from the requirements for the purpose of the ZTO systems:

— image generation from all devices with the required recognition and display method;
— priority display of alarm events and sound or light notification of the presence of such events;
— notification of unauthorized access attempts;
— manual or automatic control of image display modes;
— control of the state of connecting lines, communication lines;
— programming when controlling display modes;
— selection of the scale and section of the image;
— selection of the display mode;
— display on the screen and recording of service information;
— selection of the recording mode;
— recording of the image in real time or in standby mode with playback of previously recorded events;
— implementation of a visual check of the reliability of the operation of technical means and security systems when issuing an alarm signal;
— the possibility of introducing an audio channel.

The form of presentation of requirements in the ISO standard should provide for the possibility of their unambiguous application in lower-level regulatory documents with formulations such as: «Requirements for immunity to electromagnetic interference according to GOST R XXXXX-99», ISO standard is assumed.

It can be assumed that the instruction on fulfilling the requirements of GOST R XXXXX-99 will be in the first paragraphs of the technical requirements of any normative document on devices, systems included or intended for use in ISO.

Analysis of the standards considered shows the absence of issues that are extremely important for ISO on the selection and use of computer equipment, establishing requirements for software and the class of protection against unauthorized access to information, and requirements for electromagnetic compatibility.

Developed and current regulatory documents, such as a set of standards and guidelines for automated systems, standards for the unified system of program documentation (USPD), guidelines for protection against unauthorized access to information and standards for electromagnetic compatibility, have not yet found sufficient application in the development of standards for technical security equipment and should be used in the development of the ISO standard.

Particular attention should be paid to the set of standards and guidelines for automated systems, the structure of which, the types and completeness of documents for systems, terms and definitions, general provisions, technical requirements are largely similar to ISO and can provide significant assistance in developing the standard.

An important point is the establishment of indicators for ensuring comprehensive protection of ISO objects, which include the following:

a) the level of certified products as the minimum permissible number of non-certified devices, instruments;

b) integrated reliability indicator;

c) minimum service life without replacement of devices, instruments and with possible replacement of individual ones according to the established maintenance regime, without additional installation and adjustment work;

d) provision of the possibility of ensuring local or centralized control of the object's condition by security services;

d) ensuring the protection of the required number of objects, zones with the established access control regime;

e) ensuring protection against predictable unauthorized actions;

g) type of communication channel, communication line monitoring;

h) ensuring monitoring of operability, ISO modes;

i) ensuring the required volume and type of information presentation with mandatory registration and storage of measures to protect against unauthorized access;

k) information transmission range;

l) compliance with electromagnetic compatibility requirements;

m) power consumption in the main operating modes and power backup;

n) compliance with safety and electrical safety requirements.

Indicators for ensuring integrated security should be used when: — establishing technical indicators of all devices, equipment, and tools included in integrated security systems;

— developing methods and techniques for testing integrated security systems and their components;
— selection and evaluation of technical means of security alarms, means and systems of protection against fire and emergency situations;
— development of indicators for the insurance of facilities equipped with integrated security systems.

Indicators for ensuring comprehensive security should also be used when:

— selecting and evaluating technical means and systems of security alarms, means and systems of protection against fire and emergency situations when organizing comprehensive security of facilities;
— preparation and implementation of design solutions for equipping facilities with integrated security systems;
— evaluation of technical and economic indicators during implementation of integrated security systems;
— evaluation of the possibility of insuring a facility by insurance companies;
— evaluation of integrated security systems in the system of comprehensive security of facilities.

The above three detection levels can be used to establish characteristics for facility security levels when meeting the requirements for ISO security equipment classes.

The proposals presented concern an important issue of developing technical requirements for integrated security systems, which are essential for their certification, and are subject to review and discussion by specialists and organizations interested in their creation.


Table 3. Application of ISO levels by object protection levels

Мы используем cookie-файлы для наилучшего представления нашего сайта. Продолжая использовать этот сайт, вы соглашаетесь с использованием cookie-файлов.
Принять