Professional Documents
Culture Documents
Introduction
Chapter 1 provides an overview of the fundamental
aspects of the industries that influence electronic safety
and security (ESS) design.
Chapter 1: Introduction
Table of Contents
Introduction to Safety and Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
Industry Changes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2
Electronic Safety and Security (ESS) Bodies of Knowledge. . . . . . . . . . . . . . . . . . . . 1-3
2012 BICSI
1-i
Chapter 1: Introduction
2012 BICSI
1-1
Chapter 1: Introduction
Industry Changes
Prior to 1996, security systems were viewed as an option to most architectural projects.
With the specialized cabling and equipment required for installation, not many changes were
made to the products offered within the industry for a number of years. That changed when
the first Internet protocol (IP) camera was introduced to the industry in 1996.
The opportunity to use standards-based telecommunications cabling and cabling
infrastructure was tempered with other complex issues. IP cameras tended to have extremely
high bandwidths. Users also had to consider whether to maintain or abandon the analog
systems they had previously implemented.
As late as 2002, there was some speculation that hybrid systems would remain very popular
over the use of pure IP systems. In spite of this speculation, the IP camera market expanded
dramatically. ESS equipment suppliers, system integrators, and users began to consider the
integration and implementation of entire safety and security systems on an IP platform.
This discipline has grown from the early human guarding of objects to sophisticated
surveillance cameras and building automation systems (BAS). Each began as a stand-alone
system, but the rise of networks and ITS has lead to an increased need to converge multiple
systems. As technology develops at a rapid pace, its influence in the relatively stable world of
security is ongoing and ever changing.
Advancements in common infrastructure have enabled manufacturers to create systems
based on similar network protocols, allowing different systems to communicate with one
another. The simple beginnings, exemplified by the employment of guards and patrols,
have progressed to complex advancements in surveillance that have enabled the addition of
intelligence to electronic security systems and BAS.
The cost benefits of cabling infrastructure convergence can be seen with lower cabling costs;
easy modifications for moves, adds, or changes (MACs); unified integration with other
information technology (IT) environments; elimination of specialized equipment; and space
savings by using ITS servers and storage devices instead of video cassette recorder (VCR)
tapes and video recorders.
1-2
2012 BICSI
Chapter 1: Introduction
2012 BICSI
1-3
Chapter 1: Introduction
1-4
2012 BICSI
Chapter 1: Introduction
2012 BICSI
1-5
Chapter 1: Introduction
1-6
2012 BICSI
Chapter 1: Introduction
2012 BICSI
1-7
Chapter 1: Introduction
Manual Overview
This third edition of the ESSDRM comprises 12 chapters and two appendixes that contain
information intended to assist both security specialists and IT professionals in understanding
the systems and the convergence that occurs between the industries. The following is a brief
description of what the reader can expect to find in each chapter of this reference manual.
Chapter 2: Principles of Security
Chapter 2 discusses security planning and applications that pertain to the integration of a
system of deterrence and detection by electronic means, including the:
Basics of security theory.
Fundamentals of security design.
Roles of practitioners involved in electronic security systems.
Skills and experience required for each role.
Chapter 3: Electronic Safety and Security (ESS) Design Process
Chapter 3 introduces the ESS design process by discussing the various types of contractual
relationships and the following design process phases:
Schematic design
Design development
Construction documentation
Bidding
Construction administration
Postconstruction
Chapter 3 also provides guidance to the ESS designer to adequately address the information
from the client as prepared by a consultant, including:
Threat assessment.
Client interview.
Facility location analysis.
Additionally, the roles of team members and the interaction between those individuals during
the various design process phases are explored.
Chapter 4: Access Control Systems (ACS)
Chapter 4 explores the purpose and application of ACS. The various types of systems are
discussed, including a review of the hardware and software requirements. RFID and IP
integration are included in this chapter.
1-8
2012 BICSI
Chapter 1: Introduction
2012 BICSI
1-9
Chapter 1: Introduction
1-10
2012 BICSI
Chapter 1: Introduction
2012 BICSI
1-11