Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
8 views

Question 4

Uploaded by

fif28780
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Question 4

Uploaded by

fif28780
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

DCQ30112 ; BUILDING SERVICES 2

SESSION 1 : 2024/2025

REPORT GROUP DISCUSSION

NO. NAME REGISTRATION


NUMBER
1. ALI IMRAN BIN AZMI 03DUB23F1025
2. MUHAMMAD FIRDAUS BIN ARIFF FAZILA 03DUB23F1026
3. ADAM SYAHMI BIN RUSLI 03DUB23F1027
4. MUHAMMAD AZHAD BIN AHMAD SADLI 03DUB23F1011

PREPARED FOR: ASMAWATI BINTI MOHD YUSOP


Question 1
1. Identifying the Physical Security for a Building
Physical security in a building encompasses a range of measures and
technologies designed to protect the structure, its occupants, and
assets from potential threats. The primary purpose of physical security
is to prevent unauthorized access, ensure the safety of individuals, and
protect valuable property. Below are key elements of physical
security:
i. Lighting: Well-placed lighting deters criminal activity, provides
visibility during night hours, and supports surveillance systems.

ii. Perimeter Control: The use of fences, gates, walls, and barriers
to secure the building’s outer boundary and prevent
unauthorized access.

iii. Access Control: Systems designed to restrict and monitor who


can enter the building or specific areas using tools such as
keycards, biometrics, or passwords.

iv. Pedestrian Traffic Control: Mechanisms to manage the


movement of people in and around the building, preventing
crowding and unauthorized access.

v. Monitoring and Surveillance: The use of video surveillance


(e.g., CCTV cameras) to monitor activities inside and around the
building, allowing for real-time threat detection and response.
2. Concepts of a Security System
A building security system is built around several core concepts
aimed at ensuring comprehensive protection. Each concept is
designed to fulfil a specific security function, ensuring
deterrence, detection, and response to potential threats.

Deterrence: Security measures should discourage potential


intruders from attempting unauthorized access. Visible features
such as surveillance cameras, guards, and well-lit areas serve as
strong deterrents.

Detection: The system must detect security breaches or


suspicious activity promptly. Sensors, alarms, and surveillance
cameras help identify unauthorized access and potential risks.

Response: The system should activate appropriate responses


once a threat is detected, such as sounding alarms, alerting
security personnel, or notifying law enforcement.

Delay: Physical barriers (like fences and locks) are used to delay
potential intruders, providing time for a response.

Protection: The ultimate goal of a security system is to protect


the building’s occupants, assets, and sensitive areas from harm
or theft.
3. Components of a Security System
The following sections describe the key components of a building
security system:
i. Lighting
Concept: Lighting plays a crucial role in maintaining security by
improving visibility and deterring criminal activity, particularly
at night or in low-traffic areas. Effective lighting eliminates
hiding spots and helps both security personnel and surveillance
systems monitor key areas of the building.
Components:
Exterior Lighting: Illuminates the perimeter, entrances, and
pathways to deter unauthorized access and facilitate monitoring
by CCTV cameras.
Interior Lighting: Ensures visibility in hallways, lobbies, and
critical areas such as vaults or server rooms.
Motion-Activated Lights: These lights activate when movement
is detected, serving as an energy-efficient deterrent and alerting
security personnel to unusual activity.
Emergency Lighting: Provides visibility during power outages,
guiding occupants to exits and allowing security measures to
function.
ii. Perimeter Control
Concept: Perimeter control focuses on securing the outer
boundaries of a property, serving as the first line of defense
against unauthorized entry. Effective perimeter control uses a
combination of physical barriers and electronic systems to
monitor and control access to the property.
Components:
Fences and Walls: Physical barriers such as fences, walls, or
gates that limit access to the property. These may be reinforced
with anti-climb measures or electric fencing.
Secure Gates: Controlled access points for both vehicles and
pedestrians, which may include keypads, biometric readers, or
security personnel checking credentials.
Surveillance Cameras: Monitors the perimeter for signs of
intrusions or suspicious activities.
Motion Detectors: Sensors placed along the perimeter that detect
unauthorized movement and trigger alarms.
iii. Access Control
Concept: Access control systems manage who can enter or exit a
building or specific areas within the facility. These systems are
designed to ensure that only authorized personnel have access to
restricted areas, thus safeguarding sensitive information,
valuable property, or high-risk zones.
Components:
Keycards and Biometric Readers: Employees and visitors are
required to scan a card or provide biometric data (fingerprint or
facial recognition) to gain access to restricted areas.
Security Checkpoints: Physical checkpoints where security
personnel verify identities and credentials before granting
access.
Smart Locks: Electronically controlled locks that can be
monitored and managed remotely to grant or revoke access as
needed.
Audit Logs: Record entry and exit events to track who accessed
specific areas and when, providing data for security reviews.
iv. Pedestrian Traffic Control
Concept: Pedestrian traffic control is the regulation of foot
traffic in and around a building to prevent overcrowding,
maintain orderly movement, and ensure that only authorized
individuals access secure areas.
Components:
Turnstiles and Gates: Automated barriers that control entry
points and ensure that only one person can enter at a time after
identity verification.
Barrier Systems: Physical barriers that channel people toward
specific entry and exit points, making it easier for security
personnel to monitor.
Flow Control: Signage, barriers, and paths that guide pedestrians
through the facility, preventing unauthorized entry into restricted
zones.
v. Monitoring and Surveillance
Concept: Monitoring and surveillance systems are critical for
providing real-time observation of the building’s interior and
exterior areas. These systems help detect, assess, and respond to
potential threats or incidents.
Components:
CCTV Cameras: Strategically placed cameras provide
continuous video surveillance, recording footage for later review
and allowing security personnel to monitor critical areas in real-
time.
Video Analytics: Advanced systems equipped with motion
detection, facial recognition, and other analytics to identify
potential threats automatically.
Central Monitoring Systems: A control center where security
personnel can view live video feeds, receive alerts, and
coordinate responses.
Sensors and Alarms: Motion detectors, door sensors, and glass-
break alarms that notify security teams when suspicious activity
occurs.
Conclusion
A comprehensive security system for a building integrates
multiple physical and technological components. Lighting,
perimeter control, access control, pedestrian traffic control, and
monitoring/surveillance work together to provide a secure
environment. Each component plays a specific role in deterring,
detecting, and responding to threats, ultimately ensuring the
safety of the building and its occupants.
Question 2
A domestic security system protects homes from various threats such
as burglary, intrusion, fire, and environmental hazards. It consists of
interconnected devices designed to monitor, detect, and respond to
security breaches. These systems range from basic alarm setups to
advanced, smart-home integrated solutions.

1. The purposes of home alarm system.


A home alarm system serves several key purposes:
1. Deterrence: The presence of an alarm system can discourage
potential intruders from attempting to break in, as they know it
increases the chances of getting caught.
2. Detection: It detects unauthorized access, such as when doors or
windows are forced open or when motion is detected inside the home.
3. Alerting: Once a breach is detected, the system triggers loud
alarms to alert the occupants and possibly scare off intruders. It may
also send alerts to the homeowner's phone or a monitoring service.
4. Emergency Response: In systems with professional monitoring,
the alarm can automatically notify emergency services like the police,
fire department, or medical responders in the event of a break-in, fire,
or other emergencies.
5. Peace of Mind: Homeowners feel more secure knowing their
home is protected, whether they are inside or away. The system can
also monitor other dangers like fire, carbon monoxide, or water leaks.
6. Insurance Benefits: Some insurance companies offer reduced
premiums for homes with alarm systems, as they lower the risk of loss
or damage.
Overall, a home alarm system enhances safety and security for the
property and its occupants.
2.Types of Domestic Security Systems
1. Monitored Systems:
- These systems are connected to a professional monitoring service
that tracks alerts 24/7 and notifies authorities if necessary.
- They typically require a subscription fee and offer faster response
times during emergencies.
2. Unmonitored Systems:
- These systems are self-monitored by the homeowner. They rely on
sirens and notifications (like smartphone alerts) to warn of intrusions.
- They are often less expensive but rely on the homeowner's
availability to respond.
3. Wired Systems:
- These systems use physical wires to connect sensors, cameras, and
other components to the central control panel.
- They are typically more reliable but harder to install and maintain.
4. Wireless Systems:
- Wireless systems use radio frequencies to communicate between
devices and the control panel.
- They are easier to install, often portable, and more scalable, though
potentially prone to signal interference.
5. Smart Home Security Systems:
- These systems integrate with smart home technology, allowing
homeowners to control and monitor their security through apps, voice
commands, and automation systems.
- They are customizable, and devices like cameras, smart locks, and
thermostats can work together for enhanced security.

3. Components of a Burglar/Robbery Alarm System


A burglar or robbery alarm system consists of several key
components that work together to detect and respond to security
threats.
i. Input Devices
Input devices are sensors and detectors that monitor the home for
signs of intrusion or emergency. They include:
- Door/Window Sensors: Detect when doors or windows are opened
or broken.
- Motion Detectors: Sense movement in key areas of the house when
the system is armed.
- Glass Break Sensors: Detect the sound or vibration of breaking
glass.
- Smoke and Heat Detectors: Monitor the home for signs of fire or
excessive heat.
- Panic Buttons: Allow homeowners to manually trigger an alarm in
case of immediate danger.
- Pressure Mats: Placed under rugs or near doors to detect footsteps.
ii. Output Devices
Output devices are responsible for notifying the homeowner or
authorities once the system detects an intrusion. These include:
- Sirens/Alarms: Emit loud noises to alert the occupants and scare off
intruders.
- Strobe Lights: Flashing lights that provide a visual alert, often used
for exterior signalling.
- Phone Alerts/Notifications: Sends alerts via phone apps, text
messages, or emails to notify the homeowner of any events.
- Remote Monitoring Services: If the system is monitored, it sends
alerts to a professional service that can contact emergency responders.
iii. Alarm Panel
The alarm panel is the central control unit of the system. It manages
the system’s communication with input and output devices and
typically provides the following:
- Control Interface: Where the system can be armed or disarmed.
- Power Supply: Powers all components of the system, sometimes
with battery backup.
- Monitoring Hub: Acts as the primary point of connection for all
sensors, detectors, and devices in the home.
iv. Keypads
Keypads allow users to interact with the system by entering codes to
arm or disarm it. They can include features like:
- Touchscreen/Buttons: Traditional keypads use buttons, while newer
systems often feature touchscreens for easier navigation.
- Programmable Codes: Users can create unique passcodes for
different family members or service workers.
- Panic Button: Some keypads include an emergency panic button that
triggers the alarm immediately without entering a code.

These components work together to ensure comprehensive security


coverage, preventing break-ins and alerting homeowners in real-time.
Question 3
A. Control point of access control system
Introduction:

A control point is a critical part of access control systems, regulating


who can enter or exit secured areas. It combines technologies like
card readers, biometrics, and control panels to ensure only authorized
individuals gain access.

Main Body:

Control points verify credentials via readers and send data to an


access control panel to determine if access should be granted. If
approved, a locking mechanism is released. They also include exit
devices for safe egress and may integrate with CCTV and
communication systems for monitoring and logging activities.

Conclusion:

Control points are essential for security, providing a secure method of


managing access to restricted areas by ensuring only authorized
personnel can enter or exit.

B. Readers of access control system.


Introduction:
Readers are key components of access control systems, responsible
for verifying credentials to grant or deny access. They authenticate
users using methods like key cards, biometrics, or PIN codes,
ensuring only authorized individuals can enter restricted areas.

Main Body:

There are different types of readers:


• Card readers (RFID or magnetic stripe) are widely used for their
simplicity.
• Biometric readers (fingerprint, facial, or iris recognition) offer
higher security.
• Keypad readers use PIN codes, often combined with other
methods for added security.
• Mobile-based readers enable access via smartphones using NFC
or Bluetooth.

Readers communicate with the access control panel to process


credentials and control access efficiently.

Conclusion:

Readers are essential for secure access control, providing a reliable


way to verify credentials and manage entry to restricted areas, with
options ranging from simple card readers to advanced biometric and
mobile solutions.
C. Control panel of access control system.
Introduction:

The control panel is a central component of access control systems,


acting as the system’s brain by processing authentication requests and
managing access permissions to secured areas.

Main Body:

Control panels receive data from various readers and check credentials against a database of
authorized users. When credentials are verified, the control panel sends a signal to unlock
doors or gates. Key functionalities include:

• User Management: Allows administrators to add, modify, or revoke access.


• Event Logging: Maintains logs of access attempts for audits and investigations.
• Integration:Connects with other security systems, such as alarms and surveillance.
• Remote Access: Enables management of the system from anywhere.

Conclusion:
The control panel is essential for managing security in access control
systems, efficiently processing authentication requests and integrating
with other security measures to maintain a safe environment.
Question 4
A.Introduction To Monitor
The monitor is a display device that shows live footage or recordings
captured by the camera. It allows users to view monitored areas in
real-time or review recorded footage. Monitors come in various sizes
and resolutions and can be either analog or digital, depending on the
system used.

• The monitor acts as the display device, showing recorded video or


live footage from the surveillance area. The size and resolution of the
monitor vary depending on user needs and installation locations.
Large, high-resolution monitors are commonly used in security
control centers to ensure clear and detailed monitoring. Monitors can
be analog, used in older CCTV systems, or digital, offering higher-
quality images with additional features such as zoom and colour
control. Monitors may also have multiple inputs to display footage
from several cameras simultaneously (split-screen).

Conclusions
The monitor is a display device that allows users to view live or
recorded video footage. It can be either analog or digital, depending
on the CCTV system used, and can display footage from multiple
cameras simultaneously.
B.Introduction To Camera
The camera is the primary component responsible for capturing video
footage in a CCTV system. There are various types of cameras,
including analog, IP (Internet Protocol), dome, bullet, and PTZ
(Pan-Tilt-Zoom), which are tailored to different surveillance needs.
Cameras often come equipped with additional features like night
vision and motion detection to enhance their capabilities.

• Cameras are the most critical components in the CCTV system,


responsible for capturing video footage of the monitored area. There
are various types of cameras suited for specific needs, such as analog
cameras commonly used in older systems and IP (Internet Protocol)
cameras, which offer high-quality recordings over the internet. Dome
cameras are typically used indoors due to their discreet design and
wide coverage, while bullet cameras are often used outdoors because
they are more durable and weather-resistant. PTZ (Pan-Tilt-Zoom)
cameras offer remote control, allowing the camera to move left, right,
up, and down, as well as zoom in for clearer footage. These cameras
may also come with additional features such as night vision, enabling
recording in low-light conditions, and motion detection, which helps
activate automatic recording when there is activity in the monitored
area.
Conclusions
The camera is the primary component responsible for capturing video
footage. It comes in various types, including analog, IP, dome, bullet,
and PTZ (Pan-Tilt-Zoom), with additional features such as night
vision and motion detection tailored to specific surveillance needs.
C.Introduction To Coaxial Cable
Coaxial cable is the main transmission medium in analog systems,
connecting the camera to the recording device (DVR) or monitor. It
ensures high-quality video signal transmission without interference,
even over long distances.

• Coaxial cable is the primary transmission medium in traditional


CCTV systems, especially in analog systems. It is used to connect
cameras to recording devices such as DVRs (Digital Video Recorders)
and sometimes to monitors, depending on the system. One of the
advantages of coaxial cables is their ability to transmit video signals
over long distances without significant loss in quality. The cable
consists of a copper conductor insulated by layers of shielding and an
outer protective cover. In most analog systems, RG59 coaxial cable is
used as it is specifically designed for long-distance video
transmission, typically up to 300 meters. However, modern CCTV
systems are more inclined to use network cables or fiber optics,
especially for IP-based systems, which require faster and more stable
data transmission.

Conclusions
Coaxial cable is used in analog CCTV systems to transmit video
signals from the camera to the recording device or monitor. It ensures
high-quality video transmission even over long distances, but it is
often replaced by network cables in modern systems.
D.Introduction To Digital Video Recorder (DVR)
The DVR is a device that converts analog video signals into digital
format, compresses the recordings, and stores them on a hard drive.
Additionally, the DVR allows for playback, remote access, and
backup features. In more advanced systems, the DVR is replaced by a
Network Video Recorder (NVR), which is used in IP-based CCTV
systems to record video from digital cameras.

• The DVR functions as a recording device that receives video signals


from cameras and converts them to digital format for storage on a
hard drive or other storage devices. DVRs are typically used in analog
CCTV systems, where video signals from analog cameras are
converted to digital before being recorded. DVRs also offer functions
such as video playback, automatic recording scheduling, and motion
detection-based recording. Some DVR models allow remote access
via the internet, enabling users to view live or recorded footage from
anywhere. Additionally, more advanced DVR systems provide
automatic backup and integration with other security systems, such as
alarms. In IP-based systems, DVRs are often replaced by NVRs
(Network Video Recorders), which are designed specifically to
receive footage from IP cameras and store data directly on network
servers or cloud storage. NVRs offer many advantages, including
easier maintenance, higher recording quality, and support for
recording in HD resolution or higher.
Conclusions
The DVR converts and stores video recordings in digital format,
offering features such as playback and remote access. In IP systems,
DVRs are replaced by more advanced Network Video Recorders
(NVRs), which provide higher recording quality and the ability to
capture footage in better resolutions.

You might also like