Quick Details
- Processing Time:-
- Port:-
- Supply Ability: -
- Brand Name:-
Key Principles of an
Effective Perimeter Security Program
Deterrence: Fortifications
are the best deterrent to attackers. Often, perimeter fencing/barriers and other visible mechanisms such as Perimeter Intrusion Detection Systems (PIDS), lighting, and cameras serve as deterrents
to potential attackers.
Detection: The
implementation of detection sensors enhances the ability to identify intruders and avoid attacks. It is recommended that at least a single layer of PIDS technology be introduced to detect
intruders at the perimeter. Often, a two-layer approach is required to protect facilities with higher security requirements (i.e., potential theft or damage to higher value assets). Layered
complementary technologies, such as fence sensors and video analytics, can reinforce the perimeter layer. For the highest security applications (i.e., where there is a threat to critical
infrastructure or human life), multi-layered systems utilizing a range of technologies further increase the level of protection.
Latency: Maximizing the time
span from entry to attackable assets is critical so that security teams have time to respond. Physical barriers at the perimeter, PIDS on and inside the perimeter fence, internal barriers
(ideally with PIDS), and the distance between the barrier and the attackable asset are all delay mechanisms that slow down the attacker.
Assessment: introduce an
integrated system that includes alarm communications and CCTV/video intrusion assessment. Operators need to see what the system detects.
Response: Design scenarios
and deploy response forces to stop threats/attacks or intruders.