Paper
29 January 1997 Security systems engineering overview
Basil J. Steele
Author Affiliations +
Proceedings Volume 2934, Security Systems and Nonlethal Technologies for Law Enforcement; (1997) https://doi.org/10.1117/12.265404
Event: Enabling Technologies for Law Enforcement and Security, 1996, Boston, MA, United States
Abstract
Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at 70 billion dollars in direct costs and up to 300 billion dollars in indirect costs. Health insurance fraud alone is estimated to cost American businesses 100 billion dollars. Theft, warranty fraud, and counterfeiting of computer hardware totaled 3 billion dollars in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies; industrial espionage detection and prevention; security barrier technology.
© (1997) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Basil J. Steele "Security systems engineering overview", Proc. SPIE 2934, Security Systems and Nonlethal Technologies for Law Enforcement, (29 January 1997); https://doi.org/10.1117/12.265404
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Information security

Computer security

Security technologies

Telecommunications

Safety

Systems engineering

Imaging systems

Back to Top