Threat Detection System Design and Integration
Threat Detection System Design and Integration
Module Synopsis Security engineering design
aims to provide mitigation strategies to protect assets, including people, information and property. Such development includes the design, installation and commissioning of physical security systems in-line with the overall objectives of the security strategy. Security system design must be undertaken from a holistic approach, with detailed plans that address the relationships among the constituent parts or components to ensure total subsystem integration and optimisation. Threat detection systems are one part of the overall security system. The foundation for the design process is an integrated performance-based system. Performance measures for various system components such as detection sensors, delay barriers, video or response time allow the use of models to predict system performance against the identified threat. This effectiveness measure can then be used to provide the business rationale for investing in the system, based on a measurable increase in system performance and an associated decrease in risk to the facility. The design, installation and commissioning of the security system is achieved through the integration of security risk management and the engineering design process. Engineering focuses on the practical use of scientific knowledge to solve problems related to physical infrastructure as economically and efficiently as possible. Accordingly, engineering involves considerable planning efforts being undertaken prior to design. The initial design and planning phases of any engineering project are crucial and usually lengthy, often so complex that they are carried out in an iterative manner; thus requiring a systems approach. The application of the systems approach in engineering involves a holistic review of varied design requirement initiated by discipline specialists participating in the project. The engineering design process involves separate, but interrelated phases including planning, design, implementation, operation and maintenance. Each of these phases is complex and can be broken down into many less complex, yet interrelated tasks that can be handled individually. The alignment of the engineering design process and the security planning process commences with the problem formulation phase to clarify the problem. This phase includes establishing the business context supported by security risk management, vulnerability assessment and defining the critical objectives of the security design. The feasibility phase follows, where options are explored for risk mitigation and the preliminary planning phase, leadings to the detailed design phase. Once design is completed, the procurement phase follows where the contractor’s is mobilisation and construction commenced. Once constructed, the commissioning to lead and practical completion and then maintenance phase implementation. Unit Learning Outcomes On completion of this unit, students should be able to: • Explain the theories, concepts and principles that underpin threat detection in the domain of electronic security technology. • Apply a systematic problem-solving technique to security threat detection that aligns with professional standards. • Design a threat detection system using electronic security technology. Module Objectives On completion of this module, students will be able to: • Demonstrate an engineering design and evaluation process for a security system. • Determine the assets targets in a facility that must be protected by the detection system. • Analyse a selection of performance measures for the effectiveness of the physical protection system of a facility. Graduate Attributes The following graduate attributes will be developed in this unit • Critical appraisal skills • Ability to generate ideas Module Tutorial You have been given the task of designing a detection system for an aviation fuel storage facility, located within the precinct of an international airport. Discuss the stages in the process of designing the detection system. Indicate how the process will proceed for the development of the design of the facility, and determine the security objectives for the protection of the facility. Conduct an assessment of potential adversaries against the facility and consider how these threats will be negated in the detection system design. What design criteria will be necessary to defeat possible intrusion into the fuel storage facility? Book Chapters & Readings Brooks, D.J. & Smith, C.L. (2014). Engineering Principles in the Protection of Assets. In Gill, M. (Ed.). The Handbook of Security (2nd Ed.). Houndmills, Basingstoke: Palgrave Macmillan. Grassier, R.P. (2003). Security Planning and Evaluation. Security Planning and Design: A Guide for Architects and Building Design Professionals. New York: Wiley. Supporting Readings Dandy, G., Daniell, T., Walker, D. & Warner, R. (2009). Planning and Design of Engineering Systems (2nd Ed.). London, CRC Press. Chapter 2 Engineering Systems Concept and Chapter 3-Engineering Planning and Design. Garcia, M.L. (2008). The Design and Evaluation of Physical Protection Systems. Boston: Butterworth-Heinemann. Chapter 13: Analysis and Evaluation. Norma, T. L. (2014). Integrated Security Systems Design: A complete Reference for Building Enterprise-Wide Digital Security Systems (2nd Ed.). Amsterdam: Butterworth Heinnemann. Chapter 8 The Security Design Process, Chapter 9 Preliminary Design Process Steps and Chapter 10 Getting Down to the Actial Design.