System security upgrade is a major factor in the security of a company’s network. The upgrade is necessary for better performance of the system. Constant maintenance of the security system is required for better security of the system. In this paper, the design of a facility security upgrade is done. Our facility is a money printing facility and the improvement on the various security issues on the system based on the three engineering aspects is done.
Objective
The objective of the system upgrades of our facility is to shield our facility from external intrusion. The upgrade will enhance employee security, awareness, improve on the asset protection of the system and mitigation of the current risks. The upgrade will also be to improve on the company goodwill.This upgrade will be of importance in crisis management, prevention of fraud, prevention of general theft by employees and outsiders, unethical business conduct and prevention of entrance of illegal drugs in the facility.
Study stage
After analysis of the security issues facing our facility, the following problems were identified and need to be solved.
The first is that the facility is prone to outside access especially with the increased rate of terrorism and burglary. This problem can be ascertained by the increased cases reported last year of intrusion and terrorism in our neighboring companies. There was also a case of breakages at night in our main fault where the electric copper cables were cut and stolen by unknown people. This happened because the facility surrounding the location of the cables had no lighting source thus the burglar made in undetected. Our facility is also prone to in-house security breaches and this is one of the issues that is to be addressed with the improvement of the security of the facility. To prevent this, a method of keeping burglars and intruders away need to be made and monitored every time. It will have alarms to alert the required party in case of any intrusion. This problem is solved by upgrading our existing system barriers, CCTV monitoring and intrusion detection system on our facility.
Another problem is cyber-attack witnessed by the recent attack on our servers that exposed our chief executive officer’s emails and photos. The main facility was not compromised but as a security measure, this will need to be dealt with to strengthen the security of our facility. The CCTV connections and other types of equipment’s are also IP based and thus securing them is necessary for security in our facility. This needs to be dealt with to completion to avoid any company material being lost or accessed by unauthorized personnel. This will be solved by adding another firewall to our security system and integration with biometric identification system in our protocols.
Preliminary design
The following will be the location of the various elements on the upgrade on the facility.
The upgrade will involve upgrading the walls and fences of the facility. The quality and number of CCTV cameras will be increased and installation of automatic vehicle number plate detection and recognition system at the gate. Also, various bumps and barriers are erected on the entrance path to the facility for users to slow down before reaching the gate. All these will improve on the monitoring of the entrance and exits of the facility. The equipment’s will be procured from the best manufacture in large quantities for subsidies. The cameras are to be added to the perimeter wall and a lighting system erected at various locations in the system. Some very restricted areas that intrusion can cause a huge loss in revenue will be armed every time and only disarmed by authorized persons.
Outside design of the facility 1
The requirements
The requirements for the upgrade is as below;
-A well-trained security staff will be needed to carry out the maintenance of the system and the upgrade of the facility.
-The various costs and materials for the upgrade of the facility need to be taken into consideration before any design completion
Design and Operation
The following are the areas that have been identified to be upgraded in our organization. This improvement in the security areas ensures better performance against intrusion whether physical or technological.
Barriers
Physical barriers on our facility will be fences and perimeter walls with doors under lock and key at designated entrances. This will channel the flow of people through designated entrances and thus reduce instances of intrusion. The walls will have an electric fence on top with broken bottle pieces to deter jumping over the fence. The barrier will prevent users from seeing inside the facility. It will also have various microphones at the specified location to amplify the sounds around the perimeter and for listening to the outside of the facility. They will prevent access to the facility through the unauthorized entrances and the fences will be two meters high to prevent jumping over. The barrier will have an outward transparent fence made up of barbed wire and sensors in between the outward fence and the inside wall. This will prevent any trespasser from entering the facility or finding a way of crawling under the fence.
The cost of constructing the barrier will be estimated at four thousand dollars. This will cater for the erection of an electric fence wire, concrete and barbed wire for the whole perimeter of the facility. Their cameras and intrusion detection systems will be located at various places along the perimeter walls.
Site hardening
The external windows will be bullet resistant. The facility will also have a power backup generator in case of loss of electricity. Very sensitive materials will be protected by an electric perimeter that will give any intruder an electric shock and trigger the alarm system. This will reduce the cases of intrusion into the facility.
Access control
For access control, there will be a biometric identification system and vehicle number plate recognition system at the gate. Every vehicle passing by will have to go through the identification process and referenced with the national government’s database. This will weed out the instances of stolen vehicles gaining access to the facility. Also, the automatic number plate recognition system will take automatic pictures of any moving vehicle into the system and store it in the local database . The users will then be required to get out of their cars and swipe their identification cards on the card reader. They will then input their passwords before being granted access. The system will also have a place where our security personnel will check the vehicles for any unpermitted objects and bombs. People who do not have a pass to the facility will need to get a gate pass and leave any other form of identification with our security at the gate. The whole system will have a central monitoring room. The security personnel will have to view activities at the gate and any suspicious activities will be weeded out. The risk of access of unauthorised persons is hindered and thus, the security of access will be improved. The access by employees to any section of the facility will require authentication thus there will be several card readers within the facilities at the doors.
The system will need a vehicle number plate authentication system, motion sensing cameras for vehicles and a card reader for user access. This will be linked to a central monitoring system which will save all events happening at the two gates. The estimated cost of installation of this access control network is five thousand US dollars
Access control barriers-This will include physical barriers and site hardening of doors and turnstiles
Electronic access control system-It has a credential system, credential reader, central database and alarm monitoring
Also to prevent hacking of the various system, the systems will be protected by another firewall with an electronic authorization dongle. This will make it hard to get into the system by unauthorized people.
Access control layout 1
Personal access control- The users will, in addition, be authenticated using other access control methods. This will include swiping cards, photo identification, password input and biometric features’ of the persons.
Locks
The facility will have card operated locks and biometric locks thus will only allow authorized personnel to access the facility.
Lighting
The security upgrade will avoid areas with poor lighting that often causes accidents and crimes. The lights will enable security personnel on patrol to see the immediate surroundings to the facility. Lighting will avoid creating shadows that can offer concealement, provide light that assists in the detection of intruders .
Current lighting system 1
There will also be event activated lights which will only come on when an intruder is detected. They will be activated by perimeter intruder detection system and will use the passive infra-red detector for easier identification of the position of intruders especially at night.
There will be checkpoint lighting at the entrance which will use LED lamps in flood light luminaires. The glaring light will force the driver to slow down before entering through the gate for further scrutiny.
Search area lighting for searching vehicles will have a camera to assist guards to carry out search in the vehicles using mirroring
The lighting of the office will utilize a controlled glazing film that prevents people from looking into the office.
Also, since our facility has a number of neighboring parking lots, an eye has to be kept on these parking lots. This is to avoid the spots being used to plan an attack on the facility. More surveillance cameras are put near these parking lots to monitor any unusual activity that might impact negatively on our facility.
Intrusion detection system/alarms
It will have various sensors that will trigger alarms. Various warning posts of protected area zones will deter access to these areas. They will have motion sensors that can detect the presence of movement in a restricted area and will be able to activate other systems like the alarming of the electric fence around the facility. The monitoring system can view where the intruders will have moved and where the intrusion happened for easier location
The devices for intrusion detection
In the proposed upgrade, the following devices will be used for intrusion detection
Position detection devices which will detect the deviation from the current location of physical devices. It triggers the alarm for the opening of doors that are supposed to be locked totally at any given time.
Motion detectors and in the upgrade will use infrared detectors which will absorb energy compared to the surrounding energy. They will be especially integral in our night monitoring operation of our perimeters and will be situated in restricted areas.
Sound detectors in protected facility like where the private documents are stored.
Vibration sensors especially on doors where they will detect the presence of physical tampering of the doors
And heat sensors which will detect the presence of unauthorized personnel in restricted areas. This is due to the heat released by people which interfere with the ambient temperature of the surrounding and thus can locate them.
And glass break sensors which will sound the alarm in case any glass like that of windows is broken. The sensors on the gate in case a car hits the gate with an aim of forcing its way into the facility will also trigger an alarm.
CCTV
The current CCTV will be replaced with cameras that have a wider field of view and clearer lens. Their recording equipment and real-time video and picture taking capabilities will be good. The CCTV will have control equipment that will include switches, motion detectors and devices for camera views like tilting, panning and zooming. For CCTV camera installation we will need cameras of 360 degrees spaced at an interval of ten meters from each other. We will also need camera poles and network cable installations throughout the camera location for IP connectivity.
CCTV process designs 1
Patrol
The requirement of the patrol is to employ twenty more security guards. Three vehicles will be purchased for constant a patrol through the perimeter of the facility. The security guards will have guns and also put barriers at the entrance of the facility since it is a very sensitive facility. The cost of the upgrade in patrol will be four thousand U.S dollars. The guards will have a ten-hour shift rotation to other places. A private security company will be contracted to provide security and patrols in the facility.
Training of personnel
Training of security officers on the operation of the installed security devices and in firearm equipment will better equip the facility. The security officers will be trained to look for narcotics and bombs in cars and the procedures of handling any security situation to avoid harm to self. Also, since the facility is run both in the course of the day and at night, more caution has to be made in protecting it at night. The facilities patrons need to switch on all the sensor networks and anti-burglar alarms in the course of the night for easy detection of where the intrusion happens. In the course of the day, they can switch off some facilities to save on power and the cost but monitor them physically. This should also be the case for Fridays where more employees stay behind to finish the backlog for the week.
Contraband detection
Well trained sniffer dogs will be deployed at all entrances to prevent drug entry into the facility.
The interior of the building will have the following security
The control room
The control room of our facility will house many monitoring tools and software for better performance. The control room will have a central database for storage of information on entries and exits to the facilities captured by the various CCTV cameras. The control room will have a live broadcast of activities on the facility with an option of looking for various areas and changing sizes. It will also have additional communication devices using different secured frequencies for prompt communication with various security personnel. This increases security response time to the facility. It will have also a manual override for the closing of gates in case of internet failure. The entrance can be closed and opened manually using this system which runs on its own dedicated power source.
Final design
Project timelines for the security upgrade
Architecture of the whole system 1
Bidding and negotiation
The designed criteria for the upgrade of the system will be given to the best company with the least charges for the entire project. The company should have the appropriate facilities and equipment to install all the required security upgrade on its own. It should give an assurance on the quality of performance of the system for a period of two years before moving all the operational activities fully to our security team.
The company should also carry out necessary training to our staff for that period of time and assist in upgrades and maintenance from time to time.
Level of Estimates
-Concept planning stage will take only 40 % of the total project. It will have vendor supply estimate
-Intermediate stage will need an estimate of 60% since drawings are made here, vendor estimates quotations
-Final design will be 100% since refined drawings will be made here. The vendor equipment and labour and will have a minimum contingency
Detailed estimates
Minimizing costs
Some of the barriers and security details will be constructed by our security personnel.
Also, the cost of training will not be incurred since only the chief security officer will be required to train team leaders of various departments who will then train their team members. The company contracted to do anything will also carry out training to various security personnel.
Also, some equipment will just be improved on like the duct routes for electricity installation and poles for CCTV installation.
Fence 1
Crash sliding gate 1
Control room with several
Communication
Microwave intrusion detection
Trespassing warning at perimeter 1
Personnel area searches 1
References
ASIS, I. (2008). Facilities Physical Security Measures Guideline. USA: ASIS International.
Carpency, F. (n.d). SYSTEMS DESIGN and ENGINEERING (Security Architecture & Engineering -Part 2). Gaitheesburg: Carpency and Associates.
Cochran, J. K. (2002). Auto Burglaries in an Entertainment District: Patron Perceptions of Risks and Precautionary Behaviors. Journal of Security Administration, 1.
CPNI. (2015). Security Lighting: Guidance for Security Managers. London: Centre for the Protection of National Infrastructure (CPNI ).
Gaikwad, D. a. (2014). A Review Paper on Automatic Number Plate Recognition (ANPR) system. International Journal of Innovative Research in Advanced Engineering (IJIRAE), 88-92.
Groff, E. a. (2012). The Role of Neighbourhood parks as crime generators. Security Journal, 1-24.
McCrie, R. D. (2007). Security Operations Management. New York: Elsevier Inc.
Scarfone, K. a. (2007). Guide to Intrusion Detection and Prevention System (IDPS):. Gaithersburg: National Institute of Standards and Technology.
UFC. (2010). Selection and Application of Vehicle Barriers. USA : Unified Facilities Criteria(UFC).
UFC, 4.-0.-0. (2013). Eletronic Security Systems. Unified Facilities Criteria.
USNRC. (2011). Intrusion Detection Systems and Subsystems. United States Nuclear Regulatory Commission (USNRC).
Whittle, T. a. (2008). The Security System Development Process. Charleston: ASIS.