Chapter 6: Intrusion and Contraband Detection Systems Flashcards
Key Point 1
An Intrusion Detection System (IDS) generally includes 1) sensors, 2) annunciators, and a 3) communications or transmission mechanism.
Key Point 2
Three main characteristics of intrusion sensor performance are:
Probability of Detection (PD)
Nuisance Alarm Rate (NAR)
Vulnerability to Defeat
Key Point 3
NAR is any alarm signal that is not caused by an adversary. Many times, the source of the nuisance alarm condition is known. A False Alarm Rate (FAR) occurs when the source of the alarm is unknown.
Key Point 4
There are two ways to defeat a sensor. One was is to bypass, which is where an adversary goes around or beyond a sensor’s capabilities. The second way is to spoof, which is where an adversary goes through the protected zone without an alarm being generated.
Key Point 5
At least two continuous lines of protection should be used in high-security applications.
Key Point 6
The probability of detection decreases as the time to assess each alarm increases.
Key Point 7
Line supervision is the detection communication lines being cut or altered. This is typically accomplished using end-of-line resistors.
Key Point 8
PD and Confidence Level (CL) are used to describe the effectiveness of the sensor.
Key Point 9
In a dual technology sensor, both sensors have to be activated for the alarm to trip, which reduces the percentage of nuisance alarms, making these sensors a great choice for reliability.
Key Point 10
The drawback to dual technology sensors is that the individual technology probability of detection (PD) is reduced because the adversary only needs to defeat one sensor instead of two separate devices.
Key Point 11
Microwave sensors use Doppler shift technology. They penetrate most areas and materials and nuisance alarms can be generated from adjacent areas. To limit coverage, use a variable range cut-off circuit.
Key Point 12
The higher the resolution of the VMD, the greater the accuracy and performance of the VMD. VMDs typically operate better for interior applications.
Key Point 13
nterior sensors may be characterized by three main applications:
Boundary Penetration Sensors
Interior Motion Sensors
Proximity Sensors
Key Point 14
In high security applications, a dual technology sensor should not be used in place of two separately mounted sensors due to the reduced PD.
Key Point 15
Ultrasonic sensors are susceptible to air movement and should not be installed near stairwells or hallways, but rather into rooms or areas where only infrequent access occurs.