StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Gold Storage Facility Surveillance Design - Case Study Example

Cite this document
Summary
The author of the paper under the title "Gold Storage Facility Surveillance Design" will begin with the statement that an effective closed-circuit television (CCTV), is essential security for protecting property and people in the 21st century…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96% of users find it useful

Extract of sample "Gold Storage Facility Surveillance Design"

Gold storage facility surveillance design Student’s name Affiliate institution Introduction An effective closed-circuit television (CCTV), is an essential security for protecting property and people in the 21st century. Although so many installed CCTV systems do not deliver the role of identifying, deterring and preventing security crimes; it can do a lot better if a good thought is put into its design, configuration and installation (Valera et al, 2011). Albeit being a key security measure, CCTV surveillance is complemented by other security systems such as access control, intruder alarms and proper mechanical protection (Scott et al, 2007). The security area where the facility to be protected should be constructed is as important. The plan of the infrastructure in relation to the entrance, exit and to each other is also an important factor to be considered when setting up storage facility especially for such a sensitive commodity such as gold. The crime audit Conducting a primary crime audit on the site of the gold facility is a necessary prerequisite to installing the intrusion detection system. A complete analysis of the area surrounding the facility, called global analysis; macro surveillance of specific areas within the site of the facility and micro analysis, which involves a smaller area of interest (Doktor, 2010). A crime audit should compose of any crimes that occurred in the past either within or proximal to the area to be secured, argues Doktor. The dates of when they occurred, with exact times if available or an approximation if no records available should be noted (Doktor, 2010). The extend and frequency of the criminal acts should be noted and the direction or the exact area of most of the crimes should be taken into consideration (Doktor, 2010). For comparison purposes, getting information about the measures that led to the identification of suspects, including their accuracy and speed of the identification process should be noted (Cumming, 1992). This will serve as a gauge of the effectiveness of the CCTV system when in operation. A crime audit of the gold storage facility location using a nearby shopping mall over the past 24 months is as follows: 3 recorded criminal activities including: Mall break in with stolen property (1 incident), an attempted break in (2 incidences), Stolen clothing on the 2nd floor (1 incident). An extensive search of information on theft around the area should be conducted, including inquiring from the people around the place. This is because, some crimes go un_ reported or even unnoticed by many people (Doktor, 2010). Having such as extensive information about these sites, can help pinpoint the points where theft is most likely and hence serve as a guidance in the areas where the cameras should be better placed (Isnard &Council, 2001). The location should also be free from political and financial threats. It should be sited in a relatively safe geographical location with minimal natural disasters like floods. The site should have access to a convenient transportation system (Keval &Sasse, 2010). Risk assessment survey (RAS) This stage of CCTV design is as important as it augments the crime audit in noting the areas that are more susceptible to intrusion. It is categorized as global, macro and micro just like the crime audit (Doktor, 2010). Extensive area, speculation is not a priority, risk assessment focuses on details. For example, areas where people are more likely to pocket the gold cubes. RAS is an important aspect when considering health and safety like corners or shelves where the employees can fall accidentally (Doktor, 2010). These particular spots yield regions for proximal evidential quality recognition (EQR) especially for facial recognition (Doktor, 2010). With correct risk identification, it makes choosing the correct and most effective CCTV system. Identifying gateways, pinch points and routes that people have to navigate through on the site of the gold facility is part of the RAS composition (Doktor, 2010). CCTV system profile After an extensive crime audit and a thorough risk assessment survey, the next step is to compile a CCTV system profile. The CCTV system for the gold facility should be able to complete the following four functions: D- Deterrence, I-Incident monitoring, S-Site management and E-Evidential recording (Doktor, 2010). In most cases, a CCTV may cover one or more of these functions, but for this facility, it should cover all the four functions given the sensitivity of the commodity. Although it will be quite expensive, it is paramount that both the passive (deterrence and incident monitoring) and the active (Site management and Evidential recording be configured to work 24/7) (Doktor, 2010). This provides maximum monitoring around and within the site. The deterrence, incident monitoring, site management and evidential recording are 32%, 13%, 5% and 45%. Despite the low evidential recording of about 15% in most CCTV systems, I hope this number will increase given that the configuration percentage is set at 45%. Although the mere presence of a CCTV system deters more criminal acts, but the actual deterrence function is assessed via regular evaluation of its evidential deterrence (Magid et al, 2008). Despite this effect, a good quality camera should be used. For effective incident monitoring, the system should be able to observe the events as they occur and continuously elicit a response which is directly proportional to the gradient of the criminal act. The response coordinated for an attempted break-in should be bigger and more alarming than the one of suspected vehicles or human surroundings (Robinson, 1999). The incident monitoring is enhanced and complemented by other technologies and techniques including radio link communication and direct voice access (Doktor, 2010). They make it more efficient. Site management, although is additive in security; has a wide range of non security related functions like monitoring in and out flow of personnel or vehicles within the gold storage facility. It also acts to monitor health and safety within the facility. The CCTV of the gold storage facility should provide an evidential recording of the highest quality. The recording should be automatic and be recorded on a video tape to ensure their use in case of a criminal act or attempt. High quality HD cameras should be installed in all the hot points identified during the crime audit. The installation around the wall of the facility should be such that no areas are outside the camera’s area focus. Outdoor cameras should be able to deter any form of vandalism 24/7 while the indoor cameras combat internal theft (Valera & Velastin, 2005). The convert cameras eliminates any dishonest acts by the employees. The Pan, Tit and Zoom features are up close and personalized (Isnard & Council, 2001). A multiplex system of cameras enables the monitoring of many cameras converged in one place. The network cameras are viewable on the internet and the interactive and the digital recorder provide real time video surveillance and digital videos of very high clarity (Doktor, 2010). At the entrance, additional features should be included. Automatic number plate recognition should be installed alongside the cameras. The number plates of all the employee vehicles should be captured and saved within the facility’s personalized data (Magid et al, 2008). In the event that any of the already registered vehicle number plate vehicles reach the gate, they are allowed access. If, however, a strange number plate is detected, access is automatically denied. This would help prevent any suspicious vehicles which may have criminal agendas. It is possible that criminals may steal one of the employees’ vehicles to access the facility. To prevent this possible hazard, the number plate recognition should be coupled with the employee personalized work profile hence their photographs. In case of unrecognized number plates, or when the number plate is not matching with the online stored employee profile, an automatic alarm should be sent to all the relevant authorities immediately. The (ANPR) should be able to function independently without the hardware, e.g. cameras in the event that the hardware are tampered with. Metal detectors should be installed to monitor movement in high security areas. To prevent intrusion, especially around the wall guarding the facility, redundant devices that detect motion, sound and vibration are installed (Fennelly, 2012). These devices are also installed in very sensitive areas, especially in the facility where the bullion is stored. In combination with the CCTV system, redundant communication devices and power sources are employed (Doktor, 2010). These devices should be installed at all security units in the facility and an excellent communication among them be ensured. All these systems are supposed to work 24/7, throughout the year with frequent evaluation of the functional level. CCTV video system The CCTV video system should be connected to a computer system in the gold facility and its function evaluated on a daily basis. The video system should be connected extensively to high quality LCD within the facility at all the security points. The daily video recordings should be archived as both online and offline backup as well as the electronically captured data (Doktor, 2010). In case of disruption in wire connection, there should be automated backup system reinstitution by wireless systems. The wireless system is designed in such a way that it senses the disconnection of the wired connection and automatically takes over the monitoring and at the same time, send alarms to all the security points in the facility so that the reason behind the wireless malfunction can be identified and corrected immediately. The video system should regulate both the transit and personnel movement into the facility, within and out of the facility. Any abnormal or suspicious behavior should send out the alarms. Complementary security systems As I mentioned in the beginning, a CCTV system for it to be more effective, complementary security systems should be put in place. The wall surrounding the gold facility should be fortified, concrete wall build high enough to provide adequate mechanical security (Fennelley, 2012). The entrance to the gold facility should be one and number plate recognition software should be installed and function 24/7. Cameras should also be installed at the gate in addition to all the hot spots identified during criminal audit and risk assessment survey. The design of the parking lot should be close to the entrance and far from the storage. From the parking lot, the personnel should be screened and identified by matching their hand and face recognition to the personnel saved profiles on the facility’s data base. Any difference between the personnel stored data and the personnel should raise an alarm and access should not be allowed. The alarm system should be connected to the security management at every security unit. The employees should be monitored while at the place of work at all times. The doors of the facility should be strictly accessed by the authorized personnel and the access should be monitored and any suspicious acts automatically recorded and alarms coordinated. The interior of the facility should have vault panels using ultra high strength concrete (Keval &Sasse, 2010). The vault materials are tested on a regular basis to ensure consistency in quality. The standard 12” thick reinforced concrete panels, though require more space should be used. All the doors should be vault doors made of stainless steel clad with automatic re-locking design, for optimum appeal and durability (Doktor, 2010). For an added safety, a ventilator is constructed. Doors are made using steel backing, very high tensile strength reinforced concrete, and snap action of the highest quality (Fennelley, 2012).Secure gold shelves complement the operation of the vault doors to ensure maximum safety of the gold. To guard against natural disasters like fire and general safety, an on-site and remote video capability, are installed. The intruder alarms at the hot points around the concrete wall, the entrance or the exits offer very high integrity and precision without any false alarms going off (Scott et al, 2007). The installed communication links are securely supplemented with a diligent electronic system providing back up to ensure continued smooth operation of the facility (Scott et al, 2007). A close monitor of opening and closing hours of the facility is strictly monitored and tightly regulated since this is the time when vandalism might occur (Fennelley, 2012). Conclusion For the gold storage facility, the maximum security is not just a comprehensive CCTV surveillance system. Although it is a prime security measure, physical security of the storage comprising of a concrete wall build high enough with barbed loops of wire on the top and a properly build entrance and exit gates is so important (Fennelly, 2012). The electronic security is of utter importance as well as the propriety system. The internal control system enables the security team at the facility to monitor the facility from within. This is complemented by the legal and compliance of the facility to the terms and conditions of the operation. An extensive team of management, both lower and higher management are key to the smooth operation of the gold facility. They not only ensure the success of the facility as a business but also ensure that the security is up to date and that any suspicious information from the security system is followed and relevant convictions and consequences are executed by thorough follow up. The gold facility has a wide insurance coverage which provide financial security for its customers in the event of security breaches or natural disasters. References Cumming, N. (1992). Security: A guide to security system design and equipment selection and installation. Butterworth-Heinemann. Doktor, J. (2010, February 14). The use and application of CCTV and IP video systems. Retrieved from http://www.doktorjon.co.uk/ Fennelly, L. (2012). Effective physical security. Butterworth-Heinemann. Isnard, A., & Council, T. C. (2001, August). Can surveillance cameras be successful in preventing crime and controlling anti-social behaviours. Incharacter, impact and prevention of crime in regional Australia Conference, Australian Institute of Criminology, Townsville (pp. 2-3). Keval, H., & Sasse, M. A. (2010). “Not the Usual Suspects”: A study of factors reducing the effectiveness of CCTV. Security Journal, 23(2), 134-154. Magid, Y., Oren, D., Botzer, D., Adi, A., Shulman, B., Rabinovich, E., & Barnea, M. (2008). Generating real-time complex event-processing applications. IBM Systems Journal, 47(2), 251-263. Robinson, R. R. (Ed.). (1999). Issues in security management: Thinking critically about security. Butterworth-Heinemann. Scott, M., La Vigne, N., & Palmer, T. (2007). Preventing Vandalism. The Urban Institute Justice Policy Centre, Washington, DC. Valera, M., & Velastin, S. A. (2005, April). Intelligent distributed surveillance systems: a review. In Vision, Image and Signal Processing, IEE Proceedings- (Vol. 152, No. 2, pp. 192-204). IET. Valera, M., Velastin, S. A., Ellis, A., & Ferryman, J. (2011). Communication mechanisms and middleware for distributed video surveillance. Circuits and Systems for Video Technology, IEEE Transactions on, 21(12), 1795-1809. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Gold Storage Facility Surveillance Design Case Study, n.d.)
Gold Storage Facility Surveillance Design Case Study. https://studentshare.org/information-technology/2054955-surveillance-design
(Gold Storage Facility Surveillance Design Case Study)
Gold Storage Facility Surveillance Design Case Study. https://studentshare.org/information-technology/2054955-surveillance-design.
“Gold Storage Facility Surveillance Design Case Study”. https://studentshare.org/information-technology/2054955-surveillance-design.
  • Cited: 0 times

CHECK THESE SAMPLES OF Gold Storage Facility Surveillance Design

Clothing Department At The Supermarket: Change Management And Communication Strategies

An author of the essay "Clothing Department At The Supermarket: Change Management And Communication Strategies" presents the results of a study that was conducted to determine as to how the above change and the communication objectives can be achieved.... hellip; The business environment of the supermarket is undergoing rapid changes and the Store needs to keep pace with the changes....
16 Pages (4000 words) Assignment

Book Storage Design

As we are proceeding towards artificial intelligence and virtual reality the ready made book storage facility is becoming more high tech and user friendly.... The paper "Book Storage design" tells us about speculate about the storage facilities in libraries.... The Book Storage would be designed to actively involve the librarian in the design-planning process.... While placing the book storage full availability of light and space management should be kept in mind and calculated accordingly Advantage: This design puts a Premium on initiative and innovation A motivated public service Issues easily available on hand Enhanced Information tools easily available on hand Green color is selected to evolve the environment-friendly atmosphere as well as a sunny look and feel is outlined with bright yellow border....
3 Pages (750 words) Research Proposal

Video Compression

According to Video/Imaging design Line “Video compression algorithms” ("codecs") manipulate video signals to dramatically reduce the storage and bandwidth required while maximizing perceived video quality.... For example, Tec Encyclopedia refers to “Video Compression” as “encoding digital video to take up less storage space and transmission bandwidth....
10 Pages (2500 words) Essay

Revising a learning space

These laboratories must have a computers that belong to the facility as they tend to be interactive rooms.... Chairs may be designed in such a way that there is storage at the bottom of each chair where one may place their belongings.... Learning spaces are very important when it comes to School designing....
4 Pages (1000 words) Essay

The Physical Security Assessment

The discussion also focuses on the security systems such as surveillance cameras, door alarms and windows.... The strengths and weaknesses of the physical security of MFIC Restaurant property located in Eugene, OR have been assessed.... This entailed interviews, observation, photography, diagram development… d documentation of features of physical security including the internal and external lighting, landscaping, store entrances, store windows, parking lot, parts of the store interior and all the installed security systems. Important findings were made on employee safety and Of critical concern was the shed located behind the door at the back which provides a hiding place for strangers....
13 Pages (3250 words) Essay

Managing Uncertainty Business Plan

This research paper “Managing Uncertainty Business Plan” will discuss and devise a business plan for Electronic repair Services Company to be established in Birmingham, while taking into account how uncertainties in the new business will be managed.... hellip; The business plan will start by highlighting on the business concept, followed by the targeted market, products and services, pricing and sales, risk management, budget and financing, and lastly how marketing and advertising will be conducted....
11 Pages (2750 words) Coursework

The Scope and Nature of Physical Security Designing

hellip; The author says that the consultancy will be done in the most ethical manner and within the framework of physical security design guidelines.... In addition, his consultancy advice will give much priority towards areas of CPTED (crime prevention through environmental design), surveillance options, locks, alarm option, outdoor barrier among others.... Fennelly indicated the inevitable need to expand crime prevention through an environmental design (CPTED) method to include the entire neighborhoods and offer comprehensive data gathering efforts that would both describe the nature of crime forms and suggest suitable countermeasures....
5 Pages (1250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us