BS PD CEN TR 16705-2014 Perimeter protection Performance classification methodology《周边防护 性能分类方法》.pdf

上传人:terrorscript155 文档编号:397374 上传时间:2018-10-18 格式:PDF 页数:114 大小:7.98MB
下载 相关 举报
BS PD CEN TR 16705-2014 Perimeter protection Performance classification methodology《周边防护 性能分类方法》.pdf_第1页
第1页 / 共114页
BS PD CEN TR 16705-2014 Perimeter protection Performance classification methodology《周边防护 性能分类方法》.pdf_第2页
第2页 / 共114页
BS PD CEN TR 16705-2014 Perimeter protection Performance classification methodology《周边防护 性能分类方法》.pdf_第3页
第3页 / 共114页
BS PD CEN TR 16705-2014 Perimeter protection Performance classification methodology《周边防护 性能分类方法》.pdf_第4页
第4页 / 共114页
BS PD CEN TR 16705-2014 Perimeter protection Performance classification methodology《周边防护 性能分类方法》.pdf_第5页
第5页 / 共114页
亲,该文档总共114页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述

1、BSI Standards Publication PD CEN/TR 16705:2014 Perimeter protection Performance classification methodologyPD CEN/TR 16705:2014 PUBLISHED DOCUMENT National foreword This Published Document is the UK implementation of CEN/TR 16705:2014. The UK participation in its preparation was entrusted to Technica

2、l Committee B/201, Fences and gates. A list of organizations represented on this committee can be obtained on request to its secretary. This publication does not purport to include all the necessary provisions of a contract. Users are responsible for its correct application. The British Standards In

3、stitution 2014. Published by BSI Standards Limited 2014 ISBN 978 0 580 85061 5 ICS 13.310 Compliance with a British Standard cannot confer immunity from legal obligations. This Published Document was published under the authority of the Standards Policy and Strategy Committee on 30 April 2014. Amend

4、ments issued since publication Date Text affectedPD CEN/TR 16705:2014TECHNICAL REPORT RAPPORT TECHNIQUE TECHNISCHER BERICHT CEN/TR 16705 April 2014 ICS 13.310 English Version Perimeter protection - Performance classification methodology Protection primtrique - Mthode de classification de performance

5、 Schutz von Grundstcksgrenzen - Methodologie fr eine Leistungsklassifizierung This Technical Report was approved by CEN on 25 March 2014. It has been drawn up by the Technical Committee CEN/TC 388. CEN members are the national standards bodies of Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Re

6、public, Denmark, Estonia, Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and United Kingdom. EUROPE

7、AN COMMITTEE FOR STANDARDIZATION COMIT EUROPEN DE NORMALISATION EUROPISCHES KOMITEE FR NORMUNG CEN-CENELEC Management Centre: Avenue Marnix 17, B-1000 Brussels 2014 CEN All rights of exploitation in any form and by any means reserved worldwide for CEN national Members. Ref. No. CEN/TR 16705:2014 EPD

8、 CEN/TR 16705:2014 CEN/TR 16705:2014 (E) 2 Contents Page Foreword 5 0 Introduction 6 0.1 Purpose .6 0.2 Approach 6 0.3 Vital infrastructure .6 1 Scope 7 2 Normative references 7 3 Terms and definitions .7 4 Performance classification methodology 15 4.1 Outline of the approach . 15 4.2 Determining th

9、e required the level of protection picture of the methodology 16 4.3 Assumptions and starting point making the calculation model 18 4.4 The questionnaire of the calculation the model 20 4.4.1 Introduction to the questionnaire . 20 4.4.2 Text of the questionnaire annex data entry sheet . 21 5 Modus o

10、perandi 24 5.1 Introduction . 24 5.2 Aggressor types 24 5.3 Scenarios . 25 5.4 Toolsets . 25 6 Risk assessment methodology . 25 6.1 General . 25 6.2 Risk Target identification 26 6.3 Threats . 26 6.4 Site characterization . 26 6.4.1 General . 26 6.4.2 Site and physical environment 26 6.4.3 Human and

11、 social factors of the environment 27 6.4.4 Use of the site . 27 6.4.5 Type of access 27 7 Level of protection 27 8 Determining functional requirements . 28 8.1 Introduction . 28 8.2 Questions for establishing the functional requirement 28 9 Elements of possible solutions . 29 9.1 Introduction . 29

12、9.2 Elements of delay . 29 9.2.1 Overview of elements of delay 29 9.2.2 Fences 30 9.2.3 Walls . 31 9.2.4 Barriers 32 9.2.5 Gates 32 9.2.6 Roadblockers, Bollards 32 9.3 Elements of detection 32 9.3.1 Introduction . 32 9.3.2 Overview of elements of detection . 32 PD CEN/TR 16705:2014 CEN/TR 16705:2014

13、 (E) 3 9.3.3 Detection 33 9.3.4 Exterior sensors PIDS . 33 9.3.5 Lighting. 33 9.3.6 Entry/exit control . 33 9.4 External elements 34 9.5 Local law and regulations. 34 10 Inventories . 34 11 On testing . 35 Annex A Security system operational requirements Q and A 36 Annex B Framework for perimeter pr

14、otection systems evaluation 39 Annex C An environmental and organizational checklist for perimeter protection 41 C.1 Introduction 41 C.2 Environmental checklist for perimeter protection . 41 C.3 Organizational checklist for perimeter protection . 45 Annex D A perimeter security technologies classifi

15、cation 49 D.1 Introduction 49 D.2 Four families for intrusion detection . 49 D.2.1 Structure of the annex 49 D.2.2 Structure of the four main Tables D.3 to D.6 50 D.3 Stand-alone equipment . 54 D.4 Fence-mounted sensors . 58 D.5 Active Physical security . 59 D.6 Underground sensors . 62 Annex E Inve

16、ntory of perimeter intruder detection systems (PIDs) . 64 E.1 Introduction 64 E.2 Combination of two sensors 65 Annex F Matrix of current systems and (generic type) products 71 Annex G On Perimeter surveillance and burglary resistance . 86 G.1 Introduction 86 G.2 Use of detection systems for perimet

17、er protection . 86 G.2.1 Basic requirements for perimeter surveillance systems 86 G.2.2 Basic principles of the detection systems 88 G.2.3 Comparison of detection systems . 89 G.2.4 Summary 89 G.3 Classification for burglary resistance . 90 G.3.1 Recommendations for the assessment of the resistance

18、class. 90 G.3.2 DIN-Standards for burglar resistance . 91 Annex H Pictures of fences, gates and entrance barriers . 92 H.1 Introduction 92 H.2 Different sorts of fences . 92 H.2.1 Vegetable fences . 92 H.2.2 Wood palisade . 93 H.2.3 Walls . 94 H.2.4 Metallic fences . 96 H.2.5 Combinations of systems

19、 . 99 H.3 Supplementary accessories . 100 H.3.1 Razor wire. 100 H.3.2 Sharp pins 100 H.4 Gates and entrance barriers . 101 H.4.1 Gates . 101 H.4.2 Road obstacles 102 PD CEN/TR 16705:2014 CEN/TR 16705:2014 (E) 4 Annex I CEN Workshop Agreement CWA 16221 104 I.1 Introduction . 104 I.2 Scope of CWA 1622

20、1:2010 . 104 I.3 Table of Content of CWA 16221:2010 . 105 Bibliography . 109 PD CEN/TR 16705:2014 CEN/TR 16705:2014 (E) 5 Foreword This document (CEN/TR 16705:2014) has been prepared by Technical Committee CEN/TC 388 “Perimeter protection”, the secretariat of which is held by NEN. Attention is drawn

21、 to the possibility that some of the elements of this document may be the subject of patent rights. CEN and/or CENELEC shall not be held responsible for identifying any or all such patent rights. The elaboration of this Technical Specification has been financially supported by the European Commissio

22、n and the CIPS Programme (Grant Agreement N HOME/2009/CIPS/FP/CEN-001). PD CEN/TR 16705:2014 CEN/TR 16705:2014 (E) 6 0 Introduction 0.1 Purpose The increasing need for customers to be able to select and purchase perimeter protection solutions that fit their needs calls for a generic and structured a

23、pproach to the assessment of risks, to the identification of functional requirements, to the classification of perimeter protection solutions, including organizational measures, and to the design and test criteria for such perimeter protection solutions. This Technical Report is a step in the develo

24、pment of that approach. The general goal that has been set is to make a European Standard that is applicable to a wide range of perimeter protection solutions, covering the needs for basic barriers and entrance solutions to more complex, high security solutions. This Technical Report firstly describ

25、es the conceptual basis for further development of security performance requirements, technical specifications and test methods for use in perimeter protection systems in a European context. The report focusses on the performance classification methodology for the identification of the desired syste

26、ms performance. Secondly this Technical Report presents the results of inventories that have been made on current systems and (generic type) products that are available to the design engineer in both the public and private sector, relevant member states regulations, relevant documents from CEN, CEN/

27、TC 325, ISO and other sources. The results are presented in annexes to this report. This Technical Report therefore aims at providing information to be used for the design of future activities for making the perimeter protection standard. It is not intended as a guidance for the actual development o

28、f perimeter protection systems. Nonetheless the information in this report may function as an aid to practitioners in their choice of appropriate measures in order to meet the diverse requirements. 0.2 Approach Perimeter protection projects call for the interaction between suppliers of perimeter pro

29、tection solutions, their customers and other relevant stakeholders. Only the proper interaction between these parties will lead to valid analyses and a certified perimeter protection solution. A sequence of steps leading to the risk assessment, requested level of protection, functional requirements

30、and basic selection of perimeter protection solution is proposed. The choice of the measure(s) to be taken depends upon a number of factors which include but are not restricted to: the local environment, the purpose of the measure(s), type property to be protected and environmental and organizationa

31、l factors. Perimeter protection systems or components may be used independently such as a perimeter fence or in combination with other measures in order to provide a more holistic solution such as a fence and gate. This approach may be extended to include Closed-Circuit TV systems (CCTV) and Perimet

32、er Intruder Devices (PID). To determine the risk involved for a site requiring perimeter protection is, for the most part, comparable to the analysis required for any given asset. Therefore this Technical Report builds on the work done for risk analysis by CEN/TC 325 Crime prevention through buildin

33、g, facility and area design. 0.3 Vital infrastructure It is recognized that with regard to vital infrastructure and very high risk objects, the generic approach indicated in this Technical Report may not suffice and additional checklists and risk assessment tools may be required. There will be parti

34、cular threats and modus operandi that should be considered when assessing vital infrastructure and very high risk objects that are outside the scope of this TR. For this reference can be made to documents from national authorities, etc. PD CEN/TR 16705:2014 CEN/TR 16705:2014 (E) 7 1 Scope This Techn

35、ical Report aims at providing information to be used for the design of the future activities for making a perimeter protection standard. This CEN Technical Report describes a performance classification methodology for the identification of the desired systems performance for perimeter protection sys

36、tems. It also gives a conceptual framework for matching the desired performance and the capabilities of a possible solution. Furthermore this CEN Technical Report presents the results of inventories that have been made on current systems and (generic type) products, relevant member states regulation

37、s, relevant documents from CEN, CEN/TC 325, ISO and other sources. It should be noted that these inventories cannot be considered complete and any values given should be considered indicative values. The following subjects are not covered by this Technical Report: threats approaching from the sea si

38、de; threats approaching through the air. It is recognized that with regard to vital infrastructure and very high risk objects the generic system approach indicated in this Technical Report may not suffice and additional checklists and risk assessment tools may be required. 2 Normative references Not

39、 applicable. 3 Terms and definitions For the purposes of this document, the following terms and definitions apply. NOTE The terms have been divided into three main perimeter related security categories: General, Electronic Security and Physical Security. The definitions are taken from existing docum

40、ents as much as possible. Important sources are EN 14383-1:2006 1, the term and definition standard from CEN/TC 325 “Crime prevention through building, facility and area design“, and the Centre for Applied Science and Technology (CAST) 2. 3.1 General. 3.1.1 access control set of techniques, means or

41、 procedures to control the passage of people and vehicles into and out of protected areas SOURCE: EN 14383-1:2006 Note 1 to entry: Such systems allow levels of access rights and optionally the traceability of access, ranging from no entry to free traffic. The access control can be mechanical, human,

42、 electronic or a combination of these systems. 3.1.2 burglary action of breaking into any premises with the purpose of theft SOURCE: EN 14383-1: 2006, modified PD CEN/TR 16705:2014 CEN/TR 16705:2014 (E) 8 3.1.3 neighbourhood immediate surroundings of a secure site and their population SOURCE: EN 143

43、83-1:2006 3.1.4 operational requirement statement of needs based upon a thorough and systematic assessment of the problems to be solved and the desired solutions SOURCE: PAS 68:2013 3.1.5 perimetric space space in close vicinity of the building (from the perimeter to the building envelope, including

44、 the accesses) SOURCE: EN 14383-1:2006 3.1.6 peripheral space land and neighbourhood around one or several sites SOURCE: EN 14383-1:2006 3.1.7 risk analysis identification and evaluation of threats SOURCE: EN 14383-1:2006, modified 3.1.8 risk assessment categorization of risks and measurement of the

45、ir likelihood SOURCE: EN 14383-1:2006 3.1.9 safety freedom from unacceptable risk SOURCE: EN 14383-1:2006 3.1.10 secure area mechanically and/or electronically enclosed area protected for safety and/or security purposes 1 3.1.11 security freedom from an intended risk SOURCE: EN 14383-1:2006 Note 1 t

46、o entry: Security is the condition of being protected against danger or loss. It is achieved through the mitigation of adverse consequences associated with the intentional or unwarranted actions of others. See 7. PD CEN/TR 16705:2014 CEN/TR 16705:2014 (E) 9 3.1.12 standoff distance that threat (e.g.

47、 vehicle, person, any potential explosive effect) may be allowed to encroach upon a perimeter or asset SOURCE: PAS 38:2013 3.2 Electronic security. 3.2.1 active infrared infrared beams transmitted between a transmitter and receiver which are broken when an intruder passes through SOURCE: PAS 38:2013

48、 Note 1 to entry: The receiver detects this as a drop in signal level. 3.2.2 alarm transmission automatic transmission of alarm signals from an intrusion detection system to a monitoring centre or to a private individual SOURCE: EN 14383-1: 2006 3.2.3 dead zone area bounded by, or laying within the

49、detection zone where a target cannot be detected Note 1 to entry: That is either intrinsic to the detection system or due to some topographical feature within the detection zone (i.e. obstacle or hollow). 3.2.4 detection rate (DR) measure of a systems capacity to detect an intrusion attempt (true alarm) through the zone protected by the system SOURCE: Centre for Applied Science and Technology (CAST) 3.2.5 detection zone area over which a detection system is configured to monitor for intruders Note 1 to entry: The detection

展开阅读全文
相关资源
  • BS ISO IEC 29150-2011 Information technology Security techniques Signcryption《信息技术 安全技术 签密》.pdfBS ISO IEC 29150-2011 Information technology Security techniques Signcryption《信息技术 安全技术 签密》.pdf
  • BS ISO IEC 15408-1-2009 Information technology - Security techniques - Evaluation criteria for IT Security - Introduction and general model《信息技术 安全技术 IT安全评价准则 一.pdfBS ISO IEC 15408-1-2009 Information technology - Security techniques - Evaluation criteria for IT Security - Introduction and general model《信息技术 安全技术 IT安全评价准则 一.pdf
  • BS ISO 7295-1988+A1-2014 Tyre valves for aircraft Interchangeability dimensions《飞机轮胎汽门嘴 互换性尺寸》.pdfBS ISO 7295-1988+A1-2014 Tyre valves for aircraft Interchangeability dimensions《飞机轮胎汽门嘴 互换性尺寸》.pdf
  • BS ISO 15118-1-2013 Road vehicles Vehicle to grid communication interface General information and use-case definition《道路车辆 车辆到电力通讯接口 通用信息和使用案例定义》.pdfBS ISO 15118-1-2013 Road vehicles Vehicle to grid communication interface General information and use-case definition《道路车辆 车辆到电力通讯接口 通用信息和使用案例定义》.pdf
  • BS ISO 13765-2-2004 Refractory mortars - Determination of consistency using the reciprocating flow table method《耐熔灰浆 使用往复流动表法测定一致性》.pdfBS ISO 13765-2-2004 Refractory mortars - Determination of consistency using the reciprocating flow table method《耐熔灰浆 使用往复流动表法测定一致性》.pdf
  • BS ISO 10998-2008+A1-2014 Agricultural tractors Requirements for steering《农业拖拉机 操纵要求》.pdfBS ISO 10998-2008+A1-2014 Agricultural tractors Requirements for steering《农业拖拉机 操纵要求》.pdf
  • BS Z 9-1998 Space data and information transfer systems - Advanced orbiting systems - Networks and data links - Architectural specification《空间数据和信息传输系统 高级轨道系统 网络和数据链接 结构规范》.pdfBS Z 9-1998 Space data and information transfer systems - Advanced orbiting systems - Networks and data links - Architectural specification《空间数据和信息传输系统 高级轨道系统 网络和数据链接 结构规范》.pdf
  • BS Z 7-1998 Space data and information transfer systems - ASCII encoded English《空间数据和信息传输系统 ASCII 编码英语》.pdfBS Z 7-1998 Space data and information transfer systems - ASCII encoded English《空间数据和信息传输系统 ASCII 编码英语》.pdf
  • BS Z 5-1997 Space data and information transfer systems - Standard formatted data units - Control authority procedures《航天数据和信息发送系统 标准格式数据单元 控制授权程序》.pdfBS Z 5-1997 Space data and information transfer systems - Standard formatted data units - Control authority procedures《航天数据和信息发送系统 标准格式数据单元 控制授权程序》.pdf
  • BS Z 4-1997 Space data and information transfer systems - Standard formatted data units - Structure and construction rules《航天数据和信息传输系统 标准格式数据单元 结构和构造规则》.pdfBS Z 4-1997 Space data and information transfer systems - Standard formatted data units - Structure and construction rules《航天数据和信息传输系统 标准格式数据单元 结构和构造规则》.pdf
  • 猜你喜欢
    相关搜索

    当前位置:首页 > 标准规范 > 国际标准 > BS

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1