CCTV SYSTEM FOR A GOLD STORAGE FACILITY Essay Example

  • Category:
    Other
  • Document type:
    Assignment
  • Level:
    Undergraduate
  • Page:
    4
  • Words:
    2952

CCTV system for a Gold Storage Facility

Introduction

The report is provided as a proposal for installation of CCTV Surveillance installation and management. The best installation of the CCTV should be done in four steps. The first step requires the identification and definition of the problem that needs to be sought out [ CITATION Cha05 l 1033 ]. The security issues that are considered in this case include the threats, security of the items that need to be protected, public safety and the protection of vulnerable areas. This is considered the first level in the installation of the CCTV system.

The second level is the operational management of the system. This requires that four steps be followed for the operation to be effective [ CITATION Fay02 l 1033 ]. The first step is the definition of the areas of concern. Secondly, one needs to understand the issues of operation and the responses to the issues. This will help in the determination of the most suitable system requirement for institution. Finally, the identification of the managerial implication of the system is also an important undertaking for the project.

The third step involves the technical specification of the issue. Here a detailed CCTV system specification is provided on all the places that need to be secured. The system commissioning and validation is the fourth step [ CITATION Dam13 l 1033 ]. The management of the system is tasked with the requirement of assessing the performance of the installed CCTV system.

Objectives

The paper seeks to achieve a number of objectives. The main objective is to provide the correct installation of the CCTV within the gold storage facility in such a way that it has the ability to achieve a number of functions among them being;

  • The ability of the security system installed to prevent damage or theft

  • The ability of the security system to identify an intruder

  • The ability of the security system to improve the traffic flow at the checkout and at the parking bay

  • The ability of the security system to deter an activity from being undertaken that will undermine the independence and security of the institution [CITATION Clo l 1033 ].

The development of the right procedure for the installation of the CCTV within the storage facility is another objective that the report. The development of the right procedures in this case will be done in four different steps. These steps are the identification of the operational requirement. The operational requirement considers the security issues which include the threats, security of the items that need to be protected, public safety and the protection of vulnerable areas.

The third objective is to determine the technical requirements of the project. The technical guidance provides for technical details of the specification of the CCTV system that needs to be installed. The constituents of a typical CCTV system comprise of the lighting requirements and the camera system since the lighting provisions in this case are already installed, the camera system is the remaining activity that need to be considered for the gold storage facility. The validation of the system is the final objective and will comprise of the design specification of the system and the commissioning of the system. The CCTV system is designed to ensure that the operational requirements of the system are met.

Operational requirement

Before determining the operational requirement of the project, an investigative thought needs to be made on the nature of the problem. In this case, the threats and issues that the CCTV system needs to resolve should be identified and analyzed. A checklist in this case should be developed to ensure that the system is developed and its performance is made effective. The considerations of the checklist should involve the development of a plan for the site, the identification of the statement problem, issues regarding the stakeholders, risk assessment, the criteria to be used to ensure the project is successful and finally the determination of the most effective solution to the problem identified.

Checklist management

  1. Site planning

The site planning requires the drawing of the site plan. This will enable the determinantion of the sie weakness points. Therefore, it will be easy to mark the areas od concern as well as the proper planing of the cameras and the lights [ CITATION Joh00 l 1033 ]. In this case, it is also possible to dentify the posible environmental problems that may be associated with the project. In this case, the sites that need to be covered are the parking, the office, the workshop and workshop office, the gold storage, the receptiona and control room as well as the gate and processsing area
[ CITATION Rob09 l 1033 ].

Surveillance Design

  1. Statement of the problem

The statement of the problem is the identification of the problems, security issues and threats that needs to be resolved. While some of these issues may be general to the site as a whole, others may be specific to one location [ CITATION Sta08 l 1033 ]. Some of the common threats that are identified in this case are the issues of public safety, unauthorized entry, theft, crowd control and employee monitoring. At the entrances, the car parking area and at the gate, security should be improved to check all the flow of the people and the vehicles to identify them in case of theft.

  1. Stakeholders management

The management of gold is an expensive affair. It is however, more expensive when it comes to the security of the gold from theft. If the organization loses the gold from theft, then they are likely to incur bigger losses. Therefore, the security of the gold remains a key issue for the stakeholders to consider. The installation of the security system is likely to be complex. Therefore, it is common that it will involve several stakeholders. They should therefore, all be consulted at this stage to ensure that the site plan is in line with the welfare of all the stakeholders.

  1. Risk assessment

The risk assessment is usually provided in three levels. These are minor risks, moderate risks and severe risks. In this case, each of the areas that have been identified to require some level of security is analyzed for the severity of the risks. The higher the risk, the more the amount of investment is conducted on the area to ensure that the risks are reduced significantly [ CITATION Emi07 l 1033 ]. The risks assessment requires the priorities of the activities that one wishes to monitor to be identified and solved. The assessment also helps to determine the most cost effective method to tackle the problem since different sectors will call for different security systems to be used.

  1. Criteria for success

After the identification of the problem and the solutions determines, a measure of the success of the project will be done according to the following outcomes. These are;

  • The ability of the security system installed to prevent damage or theft

  • The ability of the security system to identify an intruder

  • The ability of the security system to improve the traffic flow at the checkout and at the parking bay

  • The ability of the security system to deter an activity from being undertaken that will undermine the independence and security of the institution.

[ CITATION Wal98 l 1033 ]

The success of the system in this case will be determine d by how effective and efficient it will be in meeting the operational requirement of the organization. The effectiveness of the system will be determined by the reliability of the security. Therein, it should be guided by three scenarios;

The ability of the system to perform

  • All of the time

  • On most occasions

  • Always during the day, but only occasionally after hours

[ CITATION Car08 l 1033 ]

  1. Solutions

The determination of the most effective solution is the final step in this case. It will require that the organization or management team to determine the potential threats that have been identified and marked in the plan. An assessment is made to determine the most effective solution to the problem. While the CCTV is the main issue that is considered in the management of the security and threats of the organization, there are other issues that need to be considered to make the performance of the system better [ CITATION Rob99 l 1033 ]. These considerations include the barriers and physical protection of the region, the proximity alarms and intruder detection system, the threat removal of the site through the improvement of the site design and finally the lighting of the institution.

The site plan identifies that the physical barriers are already well installed. The institution also already has an intruder detection system that has been installed. The lighting of the institution is perfectly done. The only remaining issue in question is the development of a CCTV system that will cover the threats and security requirement of the whole institution. The CCTV system will consequently, be designed to provide three main benefits that fall into three broad categories; safety and security, crime investigation and deterrence.

The gold storage facility is likely to encourage major organizational threats ranging from the threat of intrusion to that of theft from the employees themselves or from third parties. Therefore, the installation of the CCTV should be done to cover all these issues [ CITATION New12 l 1033 ].

Operational management

The purpose of the operational management is to provide the institution with a guide through the decision making process. The operation requirement answers the question of what the institution needs to see and the reason the institution needs to see what they need to see. Most cameras have been effectively designed to observe and understand the activities of humans. The operations of the CCTV cameras usually range from public safety to crowd control [ CITATION Gil14 l 1033 ]. The monitoring of the institution is done through the application of crown control and public safety to access control over the needs to monitor the crowd and identify any form of malicious activities within the institution [ CITATION Har15 l 1033 ].

The operational requirement is a situation whereby the system is developed to specifically cover for five different categories. These are monitoring and control, observation, recognition, identification and detection. Monitoring and control is a less detailed system. In this case, the figure being investigated covers about 5% of the total area being investigated. The monitoring and control will mainly be done in the workshop and in the processing area. This is because the institution will already have identified the individuals at the entrance. Therefore, at the workshop, the system will only be required to determine which individual is doing what, where and when. Monitoring and control provides details of the direction, speed, number and movement of the people across a wide area like through the workshop and the processing area.

Detection is done mostly for the employees and workforce within the institution. The system in this case is required to detect whether the person is available [ CITATION Par12 l 1033 ]. In this case, the system takes the image to cover at least 10% of the total screen size. This makes it easy for the system to play it role of detection in the institution. Observation is common in the office region, at the parking region and around the entrance of the gate. This will allow the institution through the system to identify some characteristic details of the individuals such as the color of the clothes that the individual is wearing while at the same time cover the activities within the surrounding areas.

Recognition on the other hand covers about 50% of the total image size of the screen. The system in this case covers a higher degree of details. The institution is therefore able to easily determine whether the individual that has been shown in the other screens is still the same individual. Finally, the identification CCTV system is the most detailed of them all. It comprises of an image that covers 100% of the total image and height of the screen. The picture quality is high and the details are sufficient to tell the identity of an individual beyond reasonable doubt. In the case of the gold facility, the identification system should be placed at the gate to facing the entrance in order to get the full details of the vehicles approaching the parking slot [ CITATION Fen17 l 1033 ]. Similarly, for the individuals entering the gate, the system should be installed to get the exact details of each individual. Finally, the gold storage facility is the most important part of the organization. The identity CCTV system should also be strategically placed around the storage to identify any form of malicious activities by the humans around the area.

The operational issues that should be considered are the location the people to be monitored, when they are supposed to be monitored, and responses to improvement in the monitoring of the region [ CITATION Hon01 l 1033 ]. The location site plan should be divided into zones according to the security requirement. Monitoring equipment should be installed to cover the blind spots and the high risk regions such as the gold storage facility, the car park and the control of those accessing the gate as well as the warehouse.

Technical guidance

The technical guidance provides for technical details of the specification of the CCTV system that needs to be installed. The constituents of a typical CCTV system comprise of the lighting requirements and the camera system since the lighting provisions in this case are already installed, the camera system is the remaining activity that need to be considered for the gold storage facility [ CITATION Dor11 l 1033 ]. The camera system comprises of three control and transmission options. These are the picture Archive, the switching or control and the picture display option.

The switch and control options of the camera system are comprised of the alarms and alerts that the facility receives from the high risks regions. The high risk regions in this case are the parking, the entrances and the gold storage facility inside the facility. When either of these places has unauthorized activities taking place, then the alarms are likely to be triggered and alerts provided to the controls. The picture display is for the cameras that are placed in all the risky regions within the facility [ CITATION Gre04 l 1033 ]. Each of the cameras installed in the facility provides the picture display. It is therefore, easy for the institution to identify and respond to different incidents any time of the day or night. Finally, the picture archive is the final aspect of the technical control. It provides for space for storage of the videos of the activities that are undertaken within the facility for future investigative options. In this case, the control room should host the picture archive with backups being stored in another region within the facility. The transmission of the images should also be determined for the facility. The organization has an option to choose between the wired transmission and the wireless transmission. The total storage requirement for the CCTV should be properly estimated before the installation is completed. The hard drive of an appropriate capacity should be specified during the installation.

System validation

The validation of the system comprises of the design specification of the system and the commissioning of the system. The CCTV system is designed to ensure that the operational requirements of the system are met [ CITATION Vel06 l 1033 ]. In case the contractor is supplied with contract, then the issue should be checked to ensure that the system addresses all the requirements of the contract. During the commissioning of the system the CCTV system, it is important that a verification of all the functions of the systems is in place.

Bibliography

Carli, V. (2008). Assessing CCTV as an effective safety and management tool for crime-solving, prevention and reduction. Montreal: International Centre for the Prevention of Crime.

Charles, A., & Bryan, M. (2005). NTC yellow book : CCTV system design & installation. Las Vagas: National Training center.

Cieszynski, J. (2003). Closed Circuit Television : CCTV Installation, Maintenance and Operation. Burlington: Elseiver.

Damjanovski, V. (2013). CCTV : From Light to Pixels. Burlington: Elseiver Science.

Dorn, W. A. (2011). Keeping Watch : Monitoring, Technology and Innovation in UN Peace Operations. Shibuya-ku: United Nations University Press.

Emily, H. (2007). Digital CCTV. Burlington: Elseiver Academic Press.

Fay, J. (2002). Contemporary security management. Boston: Butterworth-Heinemann.

Fennelly, L. J. (2017). Effective physical security. Waltham: Butterworth-Heinemann.

Gill, M. L. (2014). The handbook of security. New York: Palgrave Macmillan.

Green, G., & Fischer, R. J. (2004). Introduction to security. Boston: Butterworth-Heinmann.

Harrison, D. (2015). Handbook of research on digital media and creative technologies. Hershey: Information Science Reference.

Honey, G. (2001). Emergency and security lighting. Oxford: Newnes.

John, R. G., & George, R. (2000). Landscapes of defence by . New York: Prentice Hall.

Newburn, T., & Stephen, H. (2012). Policing, surveillance and social control : CCTV and police monitoring of suspects. London: Routledge.

Park, J. J. (2012). Future information technology, application, and service : FutureTech 2012. Volume 2. New York: Springer.

Robert, T. W. (2009). Basic security management. Morrisville: Lulu.com.

Robinson, R. R. (1999). Issues in security management : thinking critically about security. Boston: Butterworth-Heinemann.

Standards Association of Australia. (2008). Closed circuit television (CCTV). Part 1, Management and operation. Homebush: Standards Association of Australia.

Velastin, S., & Remagnino, P. (2006). Intelligent Distributed Video Surveillance Systems. Stevenage: Institution of Engineering and Technology.

Wallace, E., & Diffley, C. (1998). CCTV : making it work : recruitment and selection of CCTV operators. St Albans: Police Scientific Development Branch.