How to define and review security engineering grades

The qualification assessment of security engineering enterprises involves not only standards, norms, procedures, processes, work methods, and methods, but also “policy” and “strategicity”. At the same time, they are familiar with the connotation and characteristics of security projects, and they must be able For security project performance, it is the essence of the assessment work and the most important thing. On the basis of summing up past experience and deficiencies, a brief explanation is given on the part of the performance appraisal of security projects relating to the work of the assessors. It is hoped that this will be of benefit to the qualification assessment of security engineering enterprises.

I. Division and identification of security engineering performance

In the assessment work, to accurately define the performance of the security project, first of all, we must first understand the basic concepts, basic characteristics of the security technology prevention system, the development trend and development direction of the security system, and the relationship with the building weak current system security technology The basic concept of the prevention system: In order to maintain social and public safety, the intrusion alarm system, video security monitoring system, entrance/exit control system, explosion-proof safety inspection system, parking lot (library) management system made up of safety precaution products and other related products are used. An electronic patrol system or the like; or an electronic system or network in which these systems are combined or integrated as a subsystem.

Basic features of the security technology prevention system: It refers to the purpose of security precautions. The special equipment and software with the functions of anti-intrusion, anti-theft, anti-robbery, anti-vandalism, anti-explosion, etc. are effectively combined into an organic whole and constructed into one. An information technology network with integrated functions of detection, delay, and response, referred to as security system. Security prevention is a part of social public safety and it is a branch of social public safety science and technology. Security industry is a branch of the social public security industry. As far as prevention measures are concerned, security precautions include three categories: human protection, entity (material) prevention, and technology prevention. The "security project" discussed in this paper mainly refers to the security technology prevention system project.

With the development of information technology and the improvement of people's living standards, the current security system is developing in the direction of digitization, intelligence, and networking. The integrated, intelligent and coordinated security system has made great progress.

Network products (including network cameras, network video servers, etc.) are the mainstream of development in the past one or two years. The development of intelligence is reflected in the following aspects:

1) The alarm detection device will greatly reduce the false alarm rate (double-technology, dual-function detectors, etc.) through various intelligent ways;

2) Biometrics will increase the accuracy of recognition;

3) A variety of technical means to overcome the difficulty of detecting explosives;

4) Infrared and Doppler radar will track specific targets;

5) Infrared night vision system and laser night vision instrument and thermal imaging passive night vision system can realize night surveillance. (Border defense, oil field);

6) The GPS system can realize the real-time monitoring of the vehicle and realize the anti-robbery and theft prevention;

7) The 3G system will be able to navigate the vehicle and optimize the driving path.

Building weak current system: Weak current system is a relatively strong electric system. It refers to a system that operates below AC 36V and below 24V DC. Of course, sometimes a weak system cannot do without strong electricity. Many central equipments work at AC 220V voltage. . In general, the object of power processing is energy (electricity), which is characterized by high voltage, large current, large power, and low frequency. The main consideration is to reduce losses and improve efficiency. The target of weak current processing is mainly information, ie, information. The transmission and control are characterized by low voltage, low current, low power, and high frequency. The main considerations are the effect of information transmission, such as fidelity, speed, breadth, and reliability of information transmission.

Common weak current systems include: closed-circuit television monitoring systems, burglar alarm systems, access control systems, electronic patrol systems, parking management systems, video intercom systems, home intelligence and security systems, background music systems, LED display systems, plasma Splicing screen system, DLP large screen system, three-table copying system, building automation system, lightning protection and grounding system, paging intercom and professional intercom system, weak current piping system, UPS uninterruptible power supply system, computer room system, integrated wiring Systems, computer LAN systems, property management systems, multi-functional conference room systems, cable television systems, satellite television systems, satellite communication systems, fire protection systems, telephone communication systems, hotel management systems, video-on-demand systems, human resource management systems, etc. In addition, there are video conferencing systems, sound reinforcement systems, patrol systems, building intercom systems, and three-meter (water, electricity, gas meter) automatic meter reading systems. The weak electrical systems that are required for buildings with different functions are different. .

(1) Telephone communication system. Realize the communication function of the telephone (including the three types of facsimile machines, video telephones, etc.); the star topology; use three types (or more) of unshielded twisted pair cables, and the frequency of the transmission signal is within the audio range;

(2) Computer LAN system. It is the network foundation for office automation and various data transmissions; star topology; uses five types (or more) of unshielded twisted pairs to transmit digital signals with transmission rates of up to 100 Mb/s or more;

(3) Music/broadcasting system. Broadcast music through the loudspeakers installed in the field (such as shopping malls, restaurants, rooms, corridors, etc.), and broadcast to the site through the microphone; multi-bus structure; transmission of constant-voltage 120V/120Ω audio signals output from the power amplifier , to drive the sound of the live speakers, the transmission line uses copper insulated conductors;

(4) Cable television signal distribution system. The cable television signal is evenly distributed to all user points in the building. Branches and distributors are used for signal distribution. In order to reduce signal distortion and attenuation, the signal quality of each user site meets the requirements of the specifications and the wiring is a tree structure. And with the form of the building and the user's point of distribution varies; using 75Ω RF coaxial cable, transmission of multiple RF signals;

(5) Security monitoring system. Through the installation of cameras, anti-theft detectors and other equipment on the site, the building's various entrances and exits and some important places for surveillance and abnormal conditions alarm; video signal transmission using a star structure, the use of video coaxial cable; control signal transmission Adopt bus structure, use copper core insulated cable;

(6) Fire alarm system. The system consists of three parts: a fire alarm and fire linkage system, a fire radio system, and a fire alarm intercom system. The fire alarm and fire linkage system monitors the scene through fire detectors and manual alarm devices installed in various places in the building. When there is an alarm signal, according to the received signal, the linkage is made according to a preset program. Equipment to control the spread of fire, its signal transmission using multiple bus structure, but for the transmission of fire control equipment (such as fire pumps, spray pumps, positive pressure fan, exhaust fan, etc.) linkage control signal transmission, sometimes using star type Structure; Fire Broadcasting System is used to direct the safety evacuation of field personnel in the event of a fire, using a multi-bus architecture, using copper-core insulated conductors for signal transmission (this system can be used in conjunction with music/radio systems); fire alarm intercom system for command On-site firefighters perform fire extinguishing work using star-type and bus-type structures. Signal transmission uses shielded wires.

(7) Entrance and exit control system. Use computers, smart card door locks, card readers and other devices to set, monitor, control, and record the status of each entrance and exit to achieve unified management of entrances and exits of buildings and ensure the safety of buildings. The topology and transmission media vary from product to product. ;

(8) Parking fee management system. Through the induction coil installed under the ground of the entrance and exit, it can sense the entrance and exit of the vehicle, and realize the charge and control of the opening and closing of the electric railing through the manual/semi-automatic/automatic charge management system. The system wiring is limited to the entrance and exit of the building yard. Each entrance is controlled by a controller. The controller can work independently, or it can be networked with the superior management computer. Its wiring structure and transmission medium vary from product to product;

(9) Building automation system. Through the various detection and execution devices connected to the field controllers, various environmental parameters inside and outside the building and the working status of various equipments in the building (such as air conditioners, water supply and drainage, lighting, power distribution, elevators, etc.) are tested. , monitoring and control, and through the computer network to connect the various field controllers, reasonable allocation and management of resources and equipment in the building, to achieve the purpose of comfort, convenience, saving, and reliability; in the review practice, the engineering projects of various companies involved The scope of the project is very broad. Weak and light general contracting projects, single subcontracting projects, cable television projects, product sales services, project design, consulting, consulting, supervision services, etc., how to distinguish whether the declared performance is a security project?

1. Information network system, integrated cabling system, cable television system, three-table system, building control system, broadcasting system, fire protection system, video conference system, video on demand, etc., the definition of these systems or sub-projects and security systems Inconsistent characteristics, should not be included in the performance part of the audit, should be removed;

2. Installation and installation of sub-systems and equipments of security projects, especially the transmission and processing systems or equipments (such as optical transceivers and network servers) for monitoring, alarm, and access control, etc., can be treated as performance, but the prerequisite must be between the two parties. Construction and installation contracts, not sub-contracts; and there must be design documents, construction plans, acceptance documents and other related engineering documents as the basis;

3, For the main business is only engaged in security product sales, supply and service protection, the declared project can not be used as security performance;

4. The single design, consulting, consultant and supervision business of security engineering, the contract amount cannot be treated as security project performance;

5. Each user-end installation project of networked alarm engineering and networked alarm engineering can be treated as security project performance;

Second, security project performance review considerations

There are many types of project completion acceptance data for companies, including engineering contracts, equipment lists, design documents, construction organization documents, construction plans, completion reports, inspection reports, assessment reports, and acceptance reports. The contents of the key audit include: engineering contracts, equipment lists, in-depth design plans, construction organization documents, acceptance reports, and other process documents of the project.

1. Engineering Contract Review: Check the signing party of the contract, and pay attention to the authenticity of the signature and seal; check whether the contract content contains terms such as construction and completion acceptance; pay attention to the contract price and project content for the subcontract; Provide the general contract and the contractor does not use the project as proof of performance;

2. Equipment inventory review: The focus is to review the authenticity of the equipment list and the reasonableness of the quotation. For those parts of the contract that are described briefly or not in the construction content description, they should be carefully screened to prevent the contract from being real, but the equipment list is based on qualifications. The requirements of the review were forged. For those in doubt, read the design task book and design plan of the project, and determine the rationality of the equipment list and quotation according to the contract price and the scale of each subsystem. For example: a general contract for a weak project, with a contract price of 5 million yuan. The construction includes the building control system (Siemens), super five-category integrated cabling system (Simon), background music system, security monitoring system, parking lot management system, etc. . The cost of the security equipment system such as the monitoring system and the parking lot management system is more than 3 million yuan. It is obvious that this situation is extremely suspicious. By consulting the design documents of the project, according to the scale of each subsystem, it can be considered The list of equipment is forged;

3. Acceptance review of project completion: Mainly review the acceptance report or inspection report of the project. For the part-item project, as long as the acceptance content is security project, it is deemed to have the same effect as the inspection report or inspection report;

4. Check the integrity and standardization of engineering data so as to finally confirm the authenticity of the project performance.

Third, the security project level is determined

Level 1 project: First-level risk or investment ≥ 1 million yuan;

Secondary engineering: secondary risk or investment ≥ 300,000 yuan, less than 1 million projects;

Third-class engineering: Grade III risk or investment <300,000 yuan in the above project on the classification of security project rating, the investment amount is divided only for the security project of the sub-division project, non-security project part of the investment should be Excluding; the level of security engineering for cultural and banking systems, banking establishments, etc. can be determined according to the following principles.

1 The division of risk level and protection level of ICBC system: In actual operation, the risk level of both parties in the engineering data or acceptance documents shall prevail, or be implemented in accordance with GA27. The highest risk level of the unit, site and physical object shall be used to determine the risk level and protection level. Engineering project level.

2 Division of risk level and protection level of bank business premises: In actual operation, the risk level according to the classification of Party A and Party B in the engineering data or acceptance documents shall prevail, or be implemented in accordance with GA 38, and the highest risk level of unit, location and physical object shall be determined. The engineering grade of the project.

3 Division of risk class and protection class of important material storage repository: In actual operation, the risk grades of Party A and Party B in the engineering data or acceptance documents shall prevail, or be executed in accordance with GB50348, GA26, with the highest risk of the unit, site and physical object. Grade to identify the engineering grade of the project.

4 The division of risk levels and protection classes for civil airports is carried out in accordance with GB 50348. In actual operation, the engineering level of the project is determined on the basis of the highest risk level of the project. In the review work practice, on the one hand, the six subsystems of the security project (video security monitoring system, entrance and exit control system, intrusion alarm system, electronic inspection system, parking lot management system, explosion-proof safety inspection system, and safety management system) should be closely linked. At the same time, for systems engineering content that is rarely or initially exposed, it cannot be simply affirmed or denied, and correct judgments should be made on the basis of accurately understanding and grasping the definition and connotation of the security technology prevention system.

Elevator Components

Elevator Decoration,Electric Escalator Decoration,Moving Escalator Decoration,Elevator Decoration For Sale

MAURER TECHNOLOGIES CO., LTD. , https://www.maurer-elevator.com

This entry was posted in on