U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Intrusion Detection Systems - Principles of Operation and Application

NCJ Number
79370
Author(s)
R L Barnard
Date Published
1981
Length
334 pages
Annotation
This book explains how to design and use an integrated intrusion detection system and how the system can be integrated with other components of a security operation -- fences, access controls, etc. -- to provide the user with the most effective security possible.
Abstract
Before a security system can be designed, a threat analysis is required. Design considerations are then established to encompass asset value, location of assets, physical barriers (walls, fences, and operable openings), and deterrents (both physical and psychological). Next, components of the security system can be assembled. This involves selecting the delay elements and the alarm response force, if required, establishing the system maintenance concept, and selecting the appropriate intrusion detection sensors and the alarm transmission and monitoring equipment. The book describes basic principles of operation and application of exterior sensors, interior sensors, and alarm transmission systems. The discussions on sensor operation describe how the sensors function and identify many of the stimuli that cause sensors to alarm. The discussions on applications give guidance on how the sensors should be deployed and describe typical applications for each type of sensor. Types of available alarm transmitters and monitors are described, as well as how the alarm information can be displayed so that the monitoring operator can effectively alert and direct the response force to the scene of the intrusion. In addition, the book presents some specific design ideas by describing the design considerations and equipment selection for three hypothetical facilities: a school complex, a nuclear power reactor, and a high-rise office building. All three examples illustrate how an intrusion detection system must be totally integrated with all other necessary security functions to satisfy the security requirements. Figures, an index, and about 50 references are supplied. (Author summary modified)

Downloads

No download available

Availability