developing the security system

12
DEVELOPING THE SECURITY SYSTEM DEVELOPING THE SECURITY SYSTEM FIELD SURVEY GATHERING INFORMATION Objects Adversary Environment SYSTEM DEVELOPMENT IMPLEMENTATION SUPERVISION ON GOING SUPPORT EVALUATION RISK ANALYSIS teps required in rder to develop comprehensive ecurity system

Upload: salma

Post on 07-Jan-2016

42 views

Category:

Documents


0 download

DESCRIPTION

DEVELOPING THE SECURITY SYSTEM. RISK ANALYSIS. Objects. FIELD SURVEY. GATHERING INFORMATION. Adversary. EVALUATION. Environment. SYSTEM DEVELOPMENT. Steps required in order to develop a comprehensive security system. IMPLEMENTATION SUPERVISION. ON GOING SUPPORT. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: DEVELOPING  THE  SECURITY  SYSTEM

DEVELOPING THE SECURITY SYSTEMDEVELOPING THE SECURITY SYSTEM

FIELD SURVEYGATHERINGINFORMATION

Objects

Adversary

Environment

SYSTEM DEVELOPMENT

IMPLEMENTATION SUPERVISION

ON GOING SUPPORT

EVALUATION

RISK ANALYSIS

Steps required inorder to developa comprehensivesecurity system

Page 2: DEVELOPING  THE  SECURITY  SYSTEM

2

1. Concentration of Efforts

2. Optimal balance of security elements

4. Creation of “Security Circles”

3. Elements of Deterrence

5. Attention to cost versus benefit

APPROCH & CONCEPTAPPROCH & CONCEPT

Page 3: DEVELOPING  THE  SECURITY  SYSTEM

Gatheringinformation

Procedures

Personal

Qualityassurance

INTEGRATEDSECURITY SYSTEM

TechnicalAnd Physical

means

Page 4: DEVELOPING  THE  SECURITY  SYSTEM

Gatheringinformation

Procedures

Personal

Qualityassurance

INTEGRATEDSECURITY SYSTEM

TechnicalAnd Physical

means

Reflects the optimal balance betweenthe five basic elements of security

Page 5: DEVELOPING  THE  SECURITY  SYSTEM

INTEGRATEDSECURITY SYSTEM

Gathering Information – Is a basic task that enables us to provide a suitable security concept and system that will optimally answer our client’s needs.

Technical Means – Equipment and systems are constantly being upgraded and developed. We aspire to use state-of-the-art equipment and systems in order to ensure that our client’s system will last for many years. In other words, the more sophisticated the system that we will provide, the less future investment will be required. Personnel – A good system without skilled people to operate and to maintain it will not accomplish the tasks for which it was designed. We will ensure training our client staff.

Procedures – A good system without usage procedures, guidelines and rules for the employees will defeat the purpose for which the system was designed. We will develop those procedures.

Quality Assurance – Ensuring that all elements of the system are working together as one system is a fundamental issue.

Click on mouse toadvance to next slide

Page 6: DEVELOPING  THE  SECURITY  SYSTEM

INTEGRATEDSECURITY SYSTEM

The ultimate security system will include all five elements. Our main target is to achieve an optimal balance between those five elements. This achievement ensures that our client will obtain the most effective system for his money.

Our idea is to achieve this balance specifically in relation to the cost. Thus, our client will acquire the most effective system for his output.

The Optimal Security SystemClick on mouse to

advance to next slide

Page 7: DEVELOPING  THE  SECURITY  SYSTEM

Procedures

Technical means

Personal

Controls, Supervision, Drills

SECURITY CIRCLESCreating security circles with the mentioned

security elements around the facility

Page 8: DEVELOPING  THE  SECURITY  SYSTEM

SECURITY CIRCLES

will eliminate getting toand penetrating the

core of facility

ANDAND

Adversary

Page 9: DEVELOPING  THE  SECURITY  SYSTEM

SECURITY CIRCLES

Adversary

Leading to capture or retreat!SISC uniqueExpertise

andExperience

Page 10: DEVELOPING  THE  SECURITY  SYSTEM

10

SISC, The Security ExpertSISC, The Security ExpertSample of system’s expertiseSample of system’s expertise

Security Control Command CenterPerimeter and Site SystemsBorder surveillance and Passages ControlCCTV (Close Circuit TV) SystemsThermal & Radar Imaging and DetectionAccess Control Systems:

LPR (License Plate Recognition)Hand and finger Biometric identificationFace recognitionSmart Card

Communication and Public Address systemsNon Conventional TreatsNetwork Data Communication Systems

Page 11: DEVELOPING  THE  SECURITY  SYSTEM

11

SISC, The Security ExpertSISC, The Security ExpertSpecial Perimeter ExpertiseSpecial Perimeter Expertise

Developed unique experience in perimeter protection systems– Designing and supervising perimeter security

concept• Using state of the art systems and devices

– Supervision of over 450 km of perimeter security system installations (led by IDF)

– Designing perimeter system of the Olympic Village, Athens 2004

• System included electronic fence detection system integrated with CCTV cameras system

Page 12: DEVELOPING  THE  SECURITY  SYSTEM

12

SISC, The Security ExpertSISC, The Security ExpertSpecial Perimeter ExpertiseSpecial Perimeter Expertise

Developing the security concept of army camps, air force bases, towns, villages and settlements– Systems used were electronic perimeter fence detection

systems & Electrical Shocking fencing systems– Special perimeter systems using long-range detection

systems such as:• Thermal detection systems• Radar systems• Video Motion Detection (VMD) systems• Acoustic detection systems• Seismic systems

– Borders Passages & Entrances to facilities – LPR, Biometric, Borders Passages & Entrances to facilities – LPR, Biometric, Smart card systems, etc.Smart card systems, etc.

– All systems were integrated and managed by integrated Command & Control security management system and supported by CCTV (Closed Circuit TV) for verifications

End of slide showPlease click here with

Your mouse here to end