Shopping Cart

No products in the cart.

BSI PD CEN/TR 16705:2014

$215.11

Perimeter protection. Performance classification methodology

Published By Publication Date Number of Pages
BSI 2014 114
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

This Technical Report aims at providing information to be used for the design of the future activities for making a ‘perimeter protection standard’.

This CEN Technical Report describes a performance classification methodology for the identification of the desired systems performance for perimeter protection systems. It also gives a conceptual framework for matching the desired performance and the capabilities of a possible solution.

Furthermore this CEN Technical Report presents the results of inventories that have been made on current systems and (generic type) products, relevant member states regulations, relevant documents from CEN, CEN/TC 325, ISO and other sources. It should be noted that these inventories cannot be considered complete and any values given should be considered indicative values.

The following subjects are not covered by this Technical Report:

  • threats approaching from the sea side;

  • threats approaching through the air.

It is recognized that with regard to vital infrastructure and very high risk objects the generic system approach indicated in this Technical Report may not suffice and additional checklists and risk assessment tools may be required.

PDF Catalog

PDF Pages PDF Title
7 Foreword
8 0 Introduction
0.1 Purpose
0.2 Approach
0.3 Vital infrastructure
9 1 Scope
2 Normative references
3 Terms and definitions
17 4 Performance classification methodology
4.1 Outline of the approach
18 4.2 Determining the required the level of protection – picture of the methodology
19 Figure 1 —Subsequent steps in the assessment model
20 4.3 Assumptions and starting point making the calculation model
21 Figure 2 — Different perspectives of CEN/TC 388 and CEN/TC 325
22 4.4 The questionnaire of the calculation the model
4.4.1 Introduction to the questionnaire
Figure 3 — Data entry sheet calculation model (partial)
23 4.4.2 Text of the questionnaire annex data entry sheet
26 5 Modus operandi
5.1 Introduction
5.2 Aggressor types
27 5.3 Scenarios
5.4 Toolsets
6 Risk assessment methodology
6.1 General
28 6.2 Risk – Target identification
6.3 Threats
6.4 Site characterization
6.4.1 General
6.4.2 Site and physical environment
29 6.4.3 Human and social factors of the environment
6.4.4 Use of the site
6.4.5 Type of access
7 Level of protection
30 Table 1 — Nature of the problem and Level of protection
8 Determining functional requirements
8.1 Introduction
Table 2 — Level op protection and indicative solution
8.2 Questions for establishing the functional requirement
31 9 Elements of possible solutions
9.1 Introduction
9.2 Elements of delay
9.2.1 Overview of elements of delay
32 9.2.2 Fences
33 Table 3 — Tentative classes for fences
9.2.3 Walls
34 9.2.4 Barriers
9.2.5 Gates
9.2.6 Roadblockers, Bollards
9.3 Elements of detection
9.3.1 Introduction
9.3.2 Overview of elements of detection
35 9.3.3 Detection
9.3.4 Exterior sensors PIDS
9.3.5 Lighting
9.3.6 Entry/exit control
36 9.4 External elements
9.5 Local law and regulations
10 Inventories
37 11 On testing
38 Annex A Security system operational requirements – Q and A
41 Annex B Framework for perimeter protection systems evaluation
42 Figure B.1 — Framework for perimeter protection systems evaluation
43 Annex C An environmental and organizational checklist for perimeter protection
C.1 Introduction
C.2 Environmental checklist for perimeter protection
Table C.1 — Environmental checklist for perimeter protection
47 C.3 Organizational checklist for perimeter protection
Table C.2 — Organizational checklist for perimeter protection
51 Annex D A perimeter security technologies classification
D.1 Introduction
D.2 Four families for intrusion detection
D.2.1 Structure of the annex
52 D.2.2 Structure of the four main Tables D.3 to D.6
Table D.1 — List of technical features and their subdivision
54 Table D.2 — Definition of the technologies considered in Tables D.3 to D.6
56 D.3 Stand-alone equipment
Table D.3 — Stand-alone equipment
60 D.4 Fence-mounted sensors
Table D.4 — Fence-mounted equipment
61 D.5 Active Physical security
Table D.5 — Comparative of perimetric detection technologies
64 D.6 Underground sensors
Table D.6 — Buried Sensors
66 Annex E Inventory of perimeter intruder detection systems (PIDs)
E.1 Introduction
67 E.2 Combination of two sensors
68 Table E.1 — Information on perimeter intruder detection systems (PIDs)
73 Annex F Matrix of current systems and (generic type) products
74 Table F.1 — Information on systems and products for perimeter protection
88 Annex G On Perimeter surveillance and burglary resistance
G.1 Introduction
G.2 Use of detection systems for perimeter protection
G.2.1 Basic requirements for perimeter surveillance systems
89 Figure G.1 — Elements of a security analysis
90 G.2.2 Basic principles of the detection systems
Table G.1
91 G.2.3 Comparison of detection systems
Figure G.2 — Comparison of detection systems
G.2.4 Summary
92 G.3 Classification for burglary resistance
G.3.1 Recommendations for the assessment of the resistance class
Table G.3
93 Table G.4
G.3.2 DIN-Standards for burglar resistance
Table G.5
94 Annex H Pictures of fences, gates and entrance barriers
H.1 Introduction
H.2 Different sorts of fences
H.2.1 Vegetable fences
Figure H.1 — Vegetable fences
95 H.2.2 Wood palisade
Figure H.2 — Wood palisade
96 H.2.3 Walls
Figure H.3 — Concrete reinforced
Figure H.4 — Stone
97 Figure H.5 — Breezeblock
98 H.2.4 Metallic fences
Figure H.6 — Chainlink fences
99 Figure H.7 — Welded mesh fences
100 Figure H.8 — Palisades
101 H.2.5 Combinations of systems
Figure H.9 — Combinations of systems that include a vegetable fence
102 H.3 Supplementary accessories
H.3.1 Razor wire
Figure H.10 — Razor wire
H.3.2 Sharp pins
Figure H.11 — Sharp pins
103 H.4 Gates and entrance barriers
H.4.1 Gates
Figure H.12 — Swing Gates
Figure H.13 — Sliding Gate
Figure H.14 — Cantilever Gate
104 H.4.2 Road obstacles
Figure H.15 — Bollard
Figure H.16 — Road Block
Figure H.17 — Wedge barrier
105 Figure H.18 — Crash gate
Figure H.19 — Barriers lift system
Figure H.20 — Defence barrier
Figure H.21 — Tyre killer
106 Annex I CEN Workshop Agreement CWA 16221
I.1 Introduction
I.2 Scope of CWA 16221:2010
107 I.3 Table of Content of CWA 16221:2010
111 Bibliography
BSI PD CEN/TR 16705:2014
$215.11