Key aspects of ensuring comprehensive security at electric power enterprises.

klyuchevie aspekti obespecheniya kompleksnoi bezopasnosti

Key aspects of ensuring comprehensive security at electric power enterprises..

Key aspects of ensuring comprehensive security at electric power enterprises.

Key aspects of ensuring comprehensive security at electric power enterprises.

 

First of all, it is necessary to highlight the basic principles of building security systems:

  • the principle of legality. This principle is implemented through careful observance and fulfillment of the requirements of current legislation during the development and construction of security systems;
  • the principle of timeliness. It is implemented by taking preventive measures to ensure security.
  • the principle of combining complexity and efficiency and economic feasibility;

It is implemented by building a security system that ensures reliable protection of the complex of resources available at the enterprise from a complex of possible threats with the minimum possible costs, but not exceeding 20% ​​of the cost of the protected resources.

  • modularity principle. It is implemented by building a system based on flexible hardware and software modules. The modularity of the program allows it to operate in two modes — standby and installation, allows you to expand, change the configuration of the system and make other changes without replacing the main equipment;
  • hierarchy principle. It is implemented by building a multi-level structure consisting of Center equipment, mid-level equipment and facility equipment. Modularity and hierarchy allow developing security systems for the highest organizational — structural level;
  • the principle of predominantly software configuration. It is implemented by using the method of introducing new control programs – modules for reconfiguring equipment;
  • the principle of compatibility of technological, software, information, design, energy and operational elements in the technical means used.

Technological compatibility ensures technological unity and interchangeability of components. This requirement is achieved by unifying the production technology of the system's constituent elements. Information compatibility of security system subsystems ensures their optimal interaction when performing specified functions. To achieve this, standard communication blocks are used, strict regulation of input and output parameters of modules at all hierarchical levels of the system, input and output signals for control actions is maintained.

Integrated security systems are a set of interrelated organizational measures (measures, methods) and technical means, united by communication channels; and a set of measures ensuring the maintenance of a safe state of the facility, detection and elimination of the most complete list (complex) of threats to life, health, habitat, property and information; a set having common means of collecting and processing information and management.

The composition, as technical means of ensuring security, includes a comprehensive system of technical means of protection — a set of technical means and/or systems (alarm, security and fire alarm systems, access control and management, video surveillance, etc.), ensuring the implementation of a set of security system tasks.

The typical composition of the equipment of energy facilities includes the following technical means and systems:

  • collection, processing and display of information (CPDI);
  • security and alarm signaling (SA and TS);
  • access control and management (ACS);
  • television video surveillance and video recording (TSV);
  • security and fire alarm (SFA);
  • fire alarm and smoke removal (FAS);
  • fire extinguishing (FE);
  • protection against unauthorized information retrieval (PIT); ​​
  • uninterruptible power supply (UPS);
  • operational communication, notification and radio broadcasting;
  • technical fortification means (STU);

The number and composition of subsystems may vary depending on the needs of the facility.
Typical tasks:

  • protection of life and health of persons at the facility;
  • protection of material and information assets;
  • protection of own resources and technical means in case of unauthorized access attempts to them;
  • organization of access of employees and visitors to the territory of the facility and to restricted areas;
  • timekeeping;
  • detection and registration of facts of unauthorized entry of an intruder into the territory of the facility, into buildings and restricted areas, as well as notification of security or safety services about emergency situations; organization of alarm and emergency operational notification;
  • monitoring the territory adjacent to the buildings of the facility and the traffic flows on it with the creation of a video archive;

The security of energy facilities, especially from the penetration of unauthorized persons, must be high.

Special attention should be paid to the safety of hydraulic structures, since any production cycles in this industry are dangerous and can pose a threat to the environment, health and life of people. In addition, ensuring the safety and reliability of hydroelectric power plants (HPPs) is a requirement of the legislative framework of the Russian Federation.

Currently, the comprehensive protection of HPPs is built mainly on the basis of sensor security tools based on various physical principles, which do not always and not in all conditions guarantee reliable operation in HPP conditions.

For example, changes in water levels often lead to unstable operation of sensor systems that are tuned to a certain water level, and a potential intruder can enter the facility using the ebb or flow of the tide.

Currently, the security systems market has a Radar System (RS) for perimeter and territory protection of facilities, which meets high requirements and will improve the safety of hydroelectric power plants. The radars are designed for round-the-clock, all-weather protection of facilities through radar surveillance of the perimeter and territory, detection of moving targets, measurement of their coordinates and speed, recognition of the class and automatic tracking of detected targets. The radar can be integrated with a rotating video camera (thermal imager) and perform target designation functions, while the video (thermal imaging) image received by the operator is sufficient to verify the intruder (or situation) and make the right decision. A feature of the radar is the work in places of constant presence of people, therefore the level of electromagnetic radiation must be extremely low and comply with the requirements of SanPiN.

The radar allows to ensure the protection of the spillway, lock and adjacent territory of the hydroelectric power station. The system automatically informs the operator about the penetration of an intruder into the facility both from the land side and from the adjacent water area.

Radar stations can be used to create networks of radar stations to protect large areas and perimeters. The system can also include fixed and rotating video cameras and thermal imagers, any sensor systems. Information about the target environment is displayed on the operator's automated workstation from all radar stations, video cameras and thermal imagers, which allows monitoring the entire perimeter and territory of the facility from a single center.

The overall level of security of facilities depends not only on the use of high-tech systems, but also on the ability of these systems to exchange information in a single database, providing a fundamentally higher level of protection.

A new direction in ensuring the security of energy facilities is interaction with developers of exclusive security systems in order to provide comprehensive security systems.

Television video surveillance and video recording (TSV)
At the moment, many enterprises, installing TSV systems, do not take into account the expanding needs and capacity increases. The best are offered to use video servers. Since the video server system allows you to organize and expand systems to infinity, which is implemented at the Bashkirenergo facility.
The system is built on Russian-made Pandora video servers, which allow not only to work with video arrays, but also to broadcast real video to the enterprise computer network. To differentiate access and viewing rights. And also, if necessary, to transmit a signal to remote terminals via Ethernet networks. In this case, the video quality is determined only by the technical characteristics of the networks.

Security and alarm signaling (OS and TS)
Fire alarm and smoke removal (OP and DU), fire extinguishing (PT)

Security and alarm signaling, fire alarm and smoke removal are built on equipment manufactured in Russia by Bolid, which significantly reduces the cost of OS, TS, OP and DU. Simplifies work during installation, further maintenance and service support.

Access control and management (ACM)

Access control and management are mainly organized on the Forsec platform. ACM is not only a system that allows you to control the passage into a building or travel to the territory of an enterprise, but also a system that allows you to organize access to individual rooms, floors and corridors. ACM is not only access control, but also a system that allows you to systematize and take into account the working hours of employees of the enterprise, the entry and exit of vehicles. When using Senesys-Avto software, we provide not only license plate recognition, but also vehicle recognition by appearance, to eliminate cases of changing license plates on vehicles.

A new direction in ensuring enterprise security is the unification of all systems into a single Situation Center, which could monitor all systems simultaneously and make decisions on emerging situations.

    Мы используем cookie-файлы для наилучшего представления нашего сайта. Продолжая использовать этот сайт, вы соглашаетесь с использованием cookie-файлов.
    Принять