CEN/TR 16705:2014
(Main)Perimeter protection - Performance classification methodology
Perimeter protection - Performance classification methodology
This Technical Report aims at providing information to be used for the design of the future activities for making a 'perimeter protection standard'.
This CEN Technical Report describes a performance classification methodology for the identification of the desired systems performance for perimeter protection systems. It also gives a conceptual framework for matching the desired performance and the capabilities of a possible solution.
Furthermore this CEN Technical Report presents the results of inventories that have been made on current systems and (generic type) products, relevant member states regulations, relevant documents from CEN, CEN/TC 325, ISO and other sources. It should be noted that these inventories cannot be considered complete and any values given should be considered indicative values.
The following subjects are not covered by this Technical Report:
− threats approaching from the sea side;
− threats approaching through the air.
It is recognized that with regard to vital infrastructure and very high risk objects the generic system approach indicated in this Technical Report may not suffice and additional checklists and risk assessment tools may be required.
Schutz von Grundstücksgrenzen - Methodologie für eine Leistungsklassifizierung
Protection périmétrique - Méthode de classification des performances
Perimetrijska zaščita - Metodologija razvrščanja zmogljivosti
CEN/TR 16705 zagotavlja informacije za uporabo pri načrtovanju prihodnjih aktivnosti za oblikovanje standarda perimetrijske zaščite. To tehnično poročilo CEN opisuje metodologijo razvrščanja zmogljivosti za identifikacijo želene zmogljivosti sistemov za sisteme perimetrijske zaščite. Prav tako zagotavlja konceptualni okvir za usklajevanje želene zmogljivosti in sposobnosti mogoče rešitve. Poleg tega to tehnično poročilo CEN predstavi rezultate popisov, ki so bili opravljeni na obstoječih sistemih in proizvodih generičnega tipa, ustrezne uredbe držav članic, ustrezne dokumente CEN, CEN/TC 325, ISO in druge vire. Treba je opozoriti, da se ti popisi ne morejo obravnavati kot popolni in da so vse navedene vrednosti indikativne. To tehnično poročilo ne zajema naslednjih tem: - nevarnosti pri približevanju z morja; - nevarnosti pri približevanju po zraku. Ugotovljeno je, da glede na ključno infrastrukturo in proizvode z zelo visokim tveganjem splošni sistemski pristop iz tega tehničnega poročila morda ne zadostuje in so morda potrebni dodatni kontrolni seznami in orodja za oceno tveganja.
General Information
- Status
- Published
- Publication Date
- 08-Apr-2014
- Technical Committee
- CEN/TC 388 - Perimeter Protection
- Current Stage
- 6060 - Definitive text made available (DAV) - Publishing
- Start Date
- 09-Apr-2014
- Due Date
- 07-Aug-2015
- Completion Date
- 09-Apr-2014
Relations
- Effective Date
- 28-Jan-2026
- Effective Date
- 28-Jan-2026
Overview
CEN/TR 16705:2014 - Perimeter protection: Performance classification methodology - is a CEN Technical Report prepared by CEN/TC 388 that defines a structured, generic approach for classifying the performance of perimeter protection systems. The document provides a conceptual framework to match required performance to available technical solutions and presents inventories of current systems, products and related standards. It is intended to support the development of a future European perimeter protection standard. Note: the report excludes threats from the sea and from the air, and inventories are indicative rather than exhaustive.
Key topics and technical requirements
- Performance classification methodology: A structured method to identify required system performance levels and translate risk into measurable functional requirements.
- Risk assessment methodology: Guidance on target identification, threat characterization, site and environment analysis, and defining the required level of protection.
- Functional requirements: Questions and checklists for establishing detection, delay and response needs for a site.
- Elements of possible solutions: Overview of solution building blocks including elements of delay (fences, walls, barriers, gates, bollards), detection (PIDS - perimeter intruder detection systems, sensors, lighting, access control) and external elements (lighting, communications, local law/regulations).
- Modus operandi and scenarios: Definitions of aggressor types, typical attack scenarios and toolsets to be considered in design and testing.
- Inventories & Annexes: Technology classification, inventories of PIDs, checklists, pictorial references and a framework for system evaluation and testing.
- Limitations: Recognizes that vital infrastructure and very high-risk sites may require additional, bespoke risk assessment tools beyond the generic approach.
Practical applications and users
This Technical Report is practical for:
- Security designers and systems integrators specifying perimeter protection systems (fences, sensors, gates, PIDS).
- Facility and site managers for airports, utilities, industrial sites and commercial compounds who need to determine required levels of protection.
- Consultants and risk assessors applying structured risk-to-requirement mapping for perimeter security.
- Public authorities and procurement teams seeking standardized evaluation criteria for perimeter solutions.
- Standards developers using the report as input to future European perimeter protection standards.
Related standards and context
CEN/TR 16705:2014 references relevant CEN, CEN/TC 325, ISO documents and national regulations. It complements technical standards for intrusion detection and physical security, and serves as a foundation for developing harmonized perimeter protection standards and test methods across Europe.
Get Certified
Connect with accredited certification bodies for this standard

NSF International
Global independent organization facilitating standards development and certification.

Kiwa BDA Testing
Building and construction product certification.
Sponsored listings
Frequently Asked Questions
CEN/TR 16705:2014 is a technical report published by the European Committee for Standardization (CEN). Its full title is "Perimeter protection - Performance classification methodology". This standard covers: This Technical Report aims at providing information to be used for the design of the future activities for making a 'perimeter protection standard'. This CEN Technical Report describes a performance classification methodology for the identification of the desired systems performance for perimeter protection systems. It also gives a conceptual framework for matching the desired performance and the capabilities of a possible solution. Furthermore this CEN Technical Report presents the results of inventories that have been made on current systems and (generic type) products, relevant member states regulations, relevant documents from CEN, CEN/TC 325, ISO and other sources. It should be noted that these inventories cannot be considered complete and any values given should be considered indicative values. The following subjects are not covered by this Technical Report: − threats approaching from the sea side; − threats approaching through the air. It is recognized that with regard to vital infrastructure and very high risk objects the generic system approach indicated in this Technical Report may not suffice and additional checklists and risk assessment tools may be required.
This Technical Report aims at providing information to be used for the design of the future activities for making a 'perimeter protection standard'. This CEN Technical Report describes a performance classification methodology for the identification of the desired systems performance for perimeter protection systems. It also gives a conceptual framework for matching the desired performance and the capabilities of a possible solution. Furthermore this CEN Technical Report presents the results of inventories that have been made on current systems and (generic type) products, relevant member states regulations, relevant documents from CEN, CEN/TC 325, ISO and other sources. It should be noted that these inventories cannot be considered complete and any values given should be considered indicative values. The following subjects are not covered by this Technical Report: − threats approaching from the sea side; − threats approaching through the air. It is recognized that with regard to vital infrastructure and very high risk objects the generic system approach indicated in this Technical Report may not suffice and additional checklists and risk assessment tools may be required.
CEN/TR 16705:2014 is classified under the following ICS (International Classification for Standards) categories: 13.310 - Protection against crime. The ICS classification helps identify the subject area and facilitates finding related standards.
CEN/TR 16705:2014 has the following relationships with other standards: It is inter standard links to EN ISO 13789:2007, EN ISO 13370:2007. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.
CEN/TR 16705:2014 is available in PDF format for immediate download after purchase. The document can be added to your cart and obtained through the secure checkout process. Digital delivery ensures instant access to the complete standard document.
Standards Content (Sample)
SLOVENSKI STANDARD
01-julij-2014
3HULPHWULMVND]DãþLWD0HWRGRORJLMDUD]YUãþDQMD]PRJOMLYRVWL
Perimeter protection - Performance classification methodology
Schutz von Grundstücksgrenzen - Methodologie für eine Leistungsklassifizierung
Protection périmétrique - Méthode de classification de performance
Ta slovenski standard je istoveten z: CEN/TR 16705:2014
ICS:
13.310 Varstvo pred kriminalom Protection against crime
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.
TECHNICAL REPORT
CEN/TR 16705
RAPPORT TECHNIQUE
TECHNISCHER BERICHT
April 2014
ICS 13.310
English Version
Perimeter protection - Performance classification methodology
Protection périmétrique - Méthode de classification de Schutz von Grundstücksgrenzen - Methodologie für eine
performance Leistungsklassifizierung
This Technical Report was approved by CEN on 25 March 2014. It has been drawn up by the Technical Committee CEN/TC 388.
CEN members are the national standards bodies of Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia,
Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania,
Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and United
Kingdom.
EUROPEAN COMMITTEE FOR STANDARDIZATION
COMITÉ EUROPÉEN DE NORMALISATION
EUROPÄISCHES KOMITEE FÜR NORMUNG
CEN-CENELEC Management Centre: Avenue Marnix 17, B-1000 Brussels
© 2014 CEN All rights of exploitation in any form and by any means reserved Ref. No. CEN/TR 16705:2014 E
worldwide for CEN national Members.
Contents Page
Foreword .5
0 Introduction .6
0.1 Purpose .6
0.2 Approach .6
0.3 Vital infrastructure .6
1 Scope .7
2 Normative references .7
3 Terms and definitions .7
4 Performance classification methodology . 15
4.1 Outline of the approach . 15
4.2 Determining the required the level of protection – picture of the methodology . 16
4.3 Assumptions and starting point making the calculation model . 18
4.4 The questionnaire of the calculation the model . 20
4.4.1 Introduction to the questionnaire . 20
4.4.2 Text of the questionnaire annex data entry sheet . 21
5 Modus operandi . 24
5.1 Introduction . 24
5.2 Aggressor types. 24
5.3 Scenarios . 25
5.4 Toolsets . 25
6 Risk assessment methodology . 25
6.1 General . 25
6.2 Risk – Target identification . 26
6.3 Threats . 26
6.4 Site characterization . 26
6.4.1 General . 26
6.4.2 Site and physical environment . 26
6.4.3 Human and social factors of the environment . 27
6.4.4 Use of the site . 27
6.4.5 Type of access . 27
7 Level of protection . 27
8 Determining functional requirements . 28
8.1 Introduction . 28
8.2 Questions for establishing the functional requirement . 28
9 Elements of possible solutions . 29
9.1 Introduction . 29
9.2 Elements of delay . 29
9.2.1 Overview of elements of delay . 29
9.2.2 Fences . 30
9.2.3 Walls . 31
9.2.4 Barriers . 32
9.2.5 Gates . 32
9.2.6 Roadblockers, Bollards . 32
9.3 Elements of detection . 32
9.3.1 Introduction . 32
9.3.2 Overview of elements of detection . 32
9.3.3 Detection . 33
9.3.4 Exterior sensors PIDS . 33
9.3.5 Lighting. 33
9.3.6 Entry/exit control . 33
9.4 External elements . 34
9.5 Local law and regulations. 34
10 Inventories . 34
11 On testing . 35
Annex A Security system operational requirements – Q and A . 36
Annex B Framework for perimeter protection systems evaluation . 39
Annex C An environmental and organizational checklist for perimeter protection . 41
C.1 Introduction . 41
C.2 Environmental checklist for perimeter protection . 41
C.3 Organizational checklist for perimeter protection . 45
Annex D A perimeter security technologies classification . 49
D.1 Introduction . 49
D.2 Four families for intrusion detection . 49
D.2.1 Structure of the annex . 49
D.2.2 Structure of the four main Tables D.3 to D.6 . 50
D.3 Stand-alone equipment . 54
D.4 Fence-mounted sensors . 58
D.5 Active Physical security . 59
D.6 Underground sensors . 62
Annex E Inventory of perimeter intruder detection systems (PIDs) . 64
E.1 Introduction . 64
E.2 Combination of two sensors . 65
Annex F Matrix of current systems and (generic type) products . 71
Annex G On Perimeter surveillance and burglary resistance . 86
G.1 Introduction . 86
G.2 Use of detection systems for perimeter protection . 86
G.2.1 Basic requirements for perimeter surveillance systems . 86
G.2.2 Basic principles of the detection systems. 88
G.2.3 Comparison of detection systems . 89
G.2.4 Summary . 89
G.3 Classification for burglary resistance . 90
G.3.1 Recommendations for the assessment of the resistance class. 90
G.3.2 DIN-Standards for burglar resistance . 91
Annex H Pictures of fences, gates and entrance barriers . 92
H.1 Introduction . 92
H.2 Different sorts of fences . 92
H.2.1 Vegetable fences . 92
H.2.2 Wood palisade . 93
H.2.3 Walls . 94
H.2.4 Metallic fences . 96
H.2.5 Combinations of systems . 99
H.3 Supplementary accessories . 100
H.3.1 Razor wire. 100
H.3.2 Sharp pins . 100
H.4 Gates and entrance barriers . 101
H.4.1 Gates . 101
H.4.2 Road obstacles . 102
Annex I CEN Workshop Agreement CWA 16221 . 104
I.1 Introduction . 104
I.2 Scope of CWA 16221:2010 . 104
I.3 Table of Content of CWA 16221:2010 . 105
Bibliography . 109
Foreword
This document (CEN/TR 16705:2014) has been prepared by Technical Committee CEN/TC 388 “Perimeter
protection”, the secretariat of which is held by NEN.
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent
rights. CEN [and/or CENELEC] shall not be held responsible for identifying any or all such patent rights.
The elaboration of this Technical Specification has been financially supported by the European Commission
and the CIPS Programme (Grant Agreement N° HOME/2009/CIPS/FP/CEN-001).
0 Introduction
0.1 Purpose
The increasing need for customers to be able to select and purchase perimeter protection solutions that fit
their needs calls for a generic and structured approach to the assessment of risks, to the identification of
functional requirements, to the classification of perimeter protection solutions, including organizational
measures, and to the design and test criteria for such perimeter protection solutions. This Technical Report is
a step in the development of that approach.
The general goal that has been set is to make a European Standard that is applicable to a wide range of
perimeter protection solutions, covering the needs for basic barriers and entrance solutions to more complex,
high security solutions.
This Technical Report firstly describes the conceptual basis for further development of security performance
requirements, technical specifications and test methods for use in perimeter protection systems in a European
context. The report focusses on the performance classification methodology for the identification of the
desired systems performance.
Secondly this Technical Report presents the results of inventories that have been made on current systems
and (generic type) products that are available to the design engineer in both the public and private sector,
relevant member states regulations, relevant documents from CEN, CEN/TC 325, ISO and other sources. The
results are presented in annexes to this report.
This Technical Report therefore aims at providing information to be used for the design of future activities for
making the 'perimeter protection standard'. It is not intended as a guidance for the actual development of
perimeter protection systems. Nonetheless the information in this report may function as an aid to practitioners
in their choice of appropriate measures in order to meet the diverse requirements.
0.2 Approach
Perimeter protection projects call for the interaction between suppliers of perimeter protection solutions, their
customers and other relevant stakeholders. Only the proper interaction between these parties will lead to valid
analyses and a certified perimeter protection solution.
A sequence of steps leading to the risk assessment, requested level of protection, functional requirements
and basic selection of perimeter protection solution is proposed. The choice of the measure(s) to be taken
depends upon a number of factors which include but are not restricted to: the local environment, the purpose
of the measure(s), type property to be protected and environmental and organizational factors.
Perimeter protection systems or components may be used independently such as a perimeter fence or in
combination with other measures in order to provide a more holistic solution such as a fence and gate. This
approach may be extended to include Closed-Circuit TV systems (CCTV) and Perimeter Intruder Devices
(PID).
To determine the risk involved for a site requiring perimeter protection is, for the most part, comparable to the
analysis required for any given asset. Therefore this Technical Report builds on the work done for risk
analysis by CEN/TC 325 'Crime prevention through building, facility and area design'.
0.3 Vital infrastructure
It is recognized that with regard to vital infrastructure and very high risk objects, the generic approach
indicated in this Technical Report may not suffice and additional checklists and risk assessment tools may be
required. There will be particular threats and modus operandi that should be considered when assessing vital
infrastructure and very high risk objects that are outside the scope of this TR. For this reference can be made
to documents from national authorities, etc.
1 Scope
This Technical Report aims at providing information to be used for the design of the future activities for making
a 'perimeter protection standard'.
This CEN Technical Report describes a performance classification methodology for the identification of the
desired systems performance for perimeter protection systems. It also gives a conceptual framework for
matching the desired performance and the capabilities of a possible solution.
Furthermore this CEN Technical Report presents the results of inventories that have been made on current
systems and (generic type) products, relevant member states regulations, relevant documents from CEN,
CEN/TC 325, ISO and other sources. It should be noted that these inventories cannot be considered complete
and any values given should be considered indicative values.
The following subjects are not covered by this Technical Report:
− threats approaching from the sea side;
− threats approaching through the air.
It is recognized that with regard to vital infrastructure and very high risk objects the generic system approach
indicated in this Technical Report may not suffice and additional checklists and risk assessment tools may be
required.
2 Normative references
Not applicable.
3 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
NOTE The terms have been divided into three main perimeter related security categories: General, Electronic
Security and Physical Security. The definitions are taken from existing documents as much as possible. Important sources
are EN 14383-1:2006 [1], the term and definition standard from CEN/TC 325 "Crime prevention through building, facility
and area design", and the Centre for Applied Science and Technology (CAST) [2].
3.1 General.
3.1.1
access control
set of techniques, means or procedures to control the passage of people and vehicles into and out of
protected areas
[SOURCE: EN 14383-1:2006]
Note 1 to entry: Such systems allow levels of access rights and optionally the traceability of access, ranging from no
entry to free traffic. The access control can be mechanical, human, electronic or a combination of these systems.
3.1.2
burglary
action of breaking into any premises with the purpose of theft
[SOURCE: EN 14383-1: 2006, modified]
3.1.3
neighbourhood
immediate surroundings of a secure site and their population
[SOURCE: EN 14383-1:2006]
3.1.4
operational requirement
statement of needs based upon a thorough and systematic assessment of the problems to be solved and the
desired solutions
[SOURCE: PAS 68:2013]
3.1.5
perimetric space
space in close vicinity of the building (from the perimeter to the building envelope, including the accesses)
[SOURCE: EN 14383-1:2006]
3.1.6
peripheral space
land and neighbourhood around one or several sites
[SOURCE: EN 14383-1:2006]
3.1.7
risk analysis
identification and evaluation of threats
[SOURCE: EN 14383-1:2006, modified]
3.1.8
risk assessment
categorization of risks and measurement of their likelihood
[SOURCE: EN 14383-1:2006]
3.1.9
safety
freedom from unacceptable risk
[SOURCE: EN 14383-1:2006]
3.1.10
secure area
mechanically and/or electronically enclosed area protected for safety and/or security purposes [1]
3.1.11
security
freedom from an intended risk
[SOURCE: EN 14383-1:2006]
Note 1 to entry: Security is the condition of being protected against danger or loss. It is achieved through the mitigation
of adverse consequences associated with the intentional or unwarranted actions of others. See [7].
3.1.12
standoff
distance that threat (e.g. vehicle, person, any potential explosive effect) may be allowed to encroach upon a
perimeter or asset
[SOURCE: PAS 38:2013]
3.2 Electronic security.
3.2.1
active infrared
infrared beams transmitted between a transmitter and receiver which are broken when an intruder passes
through
[SOURCE: PAS 38:2013]
Note 1 to entry: The receiver detects this as a drop in signal level.
3.2.2
alarm transmission
automatic transmission of alarm signals from an intrusion detection system to a monitoring centre or to a
private individual
[SOURCE: EN 14383-1: 2006]
3.2.3
dead zone
area bounded by, or laying within the detection zone where a target cannot be detected
Note 1 to entry: That is either intrinsic to the detection system or due to some topographical feature within the
detection zone (i.e. obstacle or hollow).
3.2.4
detection rate (DR)
measure of a system’s capacity to detect an intrusion attempt (true alarm) through the zone protected by the
system
[SOURCE: Centre for Applied Science and Technology (CAST)]
3.2.5
detection zone
area over which a detection system is configured to monitor for intruders
Note 1 to entry: The detection zone can also have upper and lower bounds: the detection ceiling and the detection
floor.
3.2.6
doppler microwave
unit that emits a microwave field and monitors reflections
[SOURCE: Centre for Applied Science and Technology (CAST)]
Note 1 to entry: Motions from an intruder cause a change in the reflected signal received by the detector.
3.2.7
dual technology
combination of two separate technologies
[SOURCE: Centre for Applied Science and Technology (CAST)]
Note 1 to entry: For free-standing applications these technologies tend to be passive Infrared combined with doppler
microwave, though other combinations exist.
3.2.8
environmental information / conditions
data pertaining to both weather and wildlife events in the vicinity of the perimeter
[SOURCE: Centre for Applied Science and Technology (CAST)]
3.2.9
electrified fence
detection system comprising horizontal electrical conductors which are energized approximately every 2 s with
typically a 10,000 volt pulse
[SOURCE: Centre for Applied Science and Technology (CAST)]
Note 1 to entry: This pulse voltage will decrease if the fence is touched or is short circuited to ground and an alarm
condition can be raised.
3.2.10
electrostatic field disturbance
arrays of wires create an electromagnetic field and sense either the current induced in neighbouring wires or
the capacitance between the transmitter and the ground
[SOURCE: Centre for Applied Science and Technology (CAST)]
Note 1 to entry: The capacitancy varies when an intruder approaches the barrier. Ported coax and leaky feeder
systems come under this definition.
3.2.11
fabric-mounted PIDS
detection systems that are attached directly to the barrier material (as opposed to the fence posts)
[SOURCE: Centre for Applied Science and Technology (CAST)]
3.2.12
false alarm
alarm not caused by a human breaching the detection zone
[SOURCE: Centre for Applied Science and Technology (CAST)]
Note 1 to entry: Typically, false alarms are caused by animals, the effects of the weather or may have no obvious
cause.
Note 2 to entry: Alternative definition:
alarm condition which has not resulted from:
a) a criminal attack, or attempt at such, upon/to the supervised premises, the alarm equipment or the line carrying the
alarm signal; or
b) damage, or attempt at such, to the supervised premises, the alarm equipment or the line carrying the alarm signal; or
c) actions by emergency services in the execution of their duties.
3.2.13
false alarm rate
FAR
measure of a system’s capacity to avoid generating alarms which are not caused by human activity
[SOURCE: Centre for Applied Science and Technology (CAST)]
Note 1 to entry: False alarm rate (FAR) is expressed as the number of false alarms per day per kilometre (ADK).
3.2.14
fibre optic – interferometric
deformation of the detection cable causes a change in the path length in the fibre and hence the phase of
laser light transmitted within the fibre
[SOURCE: Centre for Applied Science and Technology (CAST)]
3.2.15
fluid-filled tubes
parallel tubes typically filled with liquid are pressurized and connected via a piezoelectric membrane producing
a balanced system
[SOURCE: Centre for Applied Science and Technology (CAST)]
Note 1 to entry: Differential pressure on the ground forces the fluid between the tubes and generates a voltage at the
piezoelectric element. Requires access pits to pressurize the tubes and house the sensors.
3.2.16
geophone (point sensor)
series of low frequency microphones or accelerometers connected together and their outputs analyzed
[SOURCE: Centre for Applied Science and Technology (CAST)]
Note 1 to entry: Addressable point sensors can attribute alarms to a particular sensor.
3.2.17
height of detection zone
nominal maximum height of the detection zone relative to ground level
3.2.18
inductive cable
cable with conductive wires suspended in a magnetic field
[SOURCE: Centre for Applied Science and Technology (CAST)]
Note 1 to entry: Small currents are induced when the barrier and cable are disturbed.
3.2.19
maximum speed of crossing
maximum speed (metres per second) at which a target crossing the detection zone can travel and be
successfully detected
3.2.20
microphonic
use of piezoelectric or triboelectric cables to detect audio frequency vibrations effectively acting as a
microphone
[SOURCE: Centre for Applied Science and Technology (CAST)]
3.2.21
minimum target dimensions
minimum dimensions of a target that can cross the detection zone and be successfully detected
3.2.22
minimum target mass
minimum mass of a target that can cross or interact with the detection zone and be successfully detected
3.2.23
minimum speed of crossing
minimum speed (metres per second) at which a target crossing the detection zone can travel and be
successfully detected
3.2.24
monitoring centre
private or public place staffed 24 h which takes action on receiving the remote alarm transmissions from
automatic intrusion or fire detection systems
[SOURCE: EN 14383-1: 2006]
3.2.25
passive infrared
detectors sense the temperature contrast between an intruder and the background environment [2]
3.2.26
perimeter intruder detection system (PIDS)
external detection systems configured to detect a human target crossing from one side of a linear detection
zone to the other
[SOURCE: Centre for Applied Science and Technology (CAST)]
3.2.27
post-mounted PID
wire or cable based perimeter intruder detection system mounted on posts attached to the barrier or mounted
directly in front of or behind the barrier
[SOURCE: Centre for Applied Science and Technology (CAST)]
3.2.28
radar
antenna sends out a radio frequency pulse and detects the reflections from intruders and can determine their
distance and speed
[SOURCE: Centre for Applied Science and Technology (CAST)]
Note 1 to entry: The antenna can either be static (linear) or rotating (wide area).
3.2.29
range (detection)
nominal maximum distance from a detector at which a detection system can be expected to generate an
alarm in the event of a target crossing
3.2.30
tamper alarm
alarm generated by the system to indicate its integrity has been compromised
[SOURCE: Centre for Applied Science and Technology (CAST)]
Note 1 to entry: Typically this is a result of someone gaining access to the control circuitry or causing damage to the
system.
3.2.31
target classification
capacity of a system to provide information pertaining to the target such as dimensions; or to categorize the
likely intrusion type in addition to an alarm
3.2.32
target location
capacity of system to provide information as to the location of the target within the detection zone, in addition
to an alarm
3.2.33
taut wire
wires under tension are monitored by mechanical sensors for changes in tension caused by intrusion events
[SOURCE: Centre for Applied Science and Technology (CAST)]
Note 1 to entry: Hybrid electrified taut wire systems are also available.
3.2.34
true alarm
any alarm or group of alarms caused by a human crossing the specified detection zone
[SOURCE: Centre for Applied Science and Technology (CAST)]
3.2.35
video-monitoring (CCTV)
technical means by which camera captured images are gathered, observed, stored, processed and
transmitted (CCTV: Closed Circuit Television)
[SOURCE: EN 14383-1: 2006]
3.2.36
video motion detection
computer software that analyses video footage for motion or characteristics typical of an intrusion event by
means of analyzing variations between video frames
[SOURCE: Centre for Applied Science and Technology (CAST)]
3.2.37
vulnerability to defeat
assessment of a system’s vulnerability to disruption or sabotage by a knowledgeable attacker intent on
disabling it
[SOURCE: Centre for Applied Science and Technology (CAST)]
3.2.38
width of detection
nominal maximum width of detection zone (for systems whose zone of detection is linear)
3.3 Physical security.
3.3.1
active system
security barrier which requires operation either by personnel or powered equipment
[SOURCE: PAS 38:2013]
Note 1 to entry: For example a manual dropping/ lifting-arm barrier or an automated retractable/rising bollard.
3.3.2
barrier
mechanical device to control the passage of vehicles (hand or power operated)
3.3.3
bollard
manufactured product which, once positioned, is a vertical device aimed at delimiting an area and hampering
the access for vehicles
[SOURCE: EN 14383-1: 2006, modified]
3.3.4
folding gate
gate with two or more hinged leaves, guided and/or supported at the bottom and/or at the top
Note 1 to entry: The first leaf is hinged to the frame; leaves can be hinged only on one side of the frame or on both
sides.
3.3.5
gate/door
device to close an opening in a boundary demarcation which is provided for the passage of vehicles and/or
persons (hand or power operated)
3.3.6
hinged gate
gate with a leaf which is hinged or pivoted at one side which opens one way (single leaf or double leaf hinged
gate)
3.3.7
locking system
equipment used to prevent an opening device from being opened without the use of a key or other mechanism
designed for this purpose
[SOURCE: EN 14383-1: 2006]
3.3.8
planter
massive or well-anchored container (wood, concrete, steel, etc.) filled with soil and decorated with plants for
the purpose of stopping vehicles
[SOURCE: EN 14383-1: 2006]
3.3.9
retractable bollards
device which can easily be lowered and secured in its position with a key (mechanical) or through a powered
mechanism (automatic)
[SOURCE: EN 14383-1: 2006]
3.3.10
road blocks
device to stop vehicles, e.g. retractable ramps
[SOURCE: EN 14383-1: 2006]
3.3.11
sliding gate
gate with a leaf or leafs that moves horizontally in its guides (cantilever or moving on a roller rail)
Note 1 to entry: There are single leaf or bi-parting or telescopic sliding gates (gate leaf consisting of two or more
parts).
3.3.12
speed gate
folding or sliding gates with one or more leaf (leaves) designed for rapid operation (> 0,5 m/s)
3.3.13
sterile zone
defined controlled area, normally clear of obstructions and undergrowth, incorporating measures to preclude
larger wildlife and accidental incursion from personnel
[SOURCE: Centre for Applied Science and Technology (CAST)]
3.3.14
turnstile
form of gate which allows one person to pass at a time (and or power operated)
Note 1 to entry: Full-height turnstiles are similar in operation to a revolving door.
3.3.15
traffic calming
use of self enforcing physical measures to produce road alignments that require a reduction in vehicle speed
in order to be successfully negotiated
[SOURCE: PAS 38:2013]
3.3.16
vehicle airlock system
system created by using two active barriers of any type across the vehicle path of approach, with a secure
sterile area between the barrier
[SOURCE: PAS 38:2013]
3.3.17
vehicle security barrier
system designed and installed to bring to rest or redirect an impacting vehicle
[SOURCE: PAS 38:2013]
4 Performance classification methodology
4.1 Outline of the approach
Unprotected perimeters mean unprotected assets, unprotected people and inevitably security breaches. The
consequences of these breaches can be catastrophic so the threat of intrusion remains a prime concern at all
major facilities.
The approach presented in this report starts with a calculation model that generates a score indicating the
required level of protection.
Important key questions for the client are:
− What are my assets I should be protecting?
− Against what threats?
− What are my vulnerabilities and risks?
Once the required level of protection has been established, the basic performance requirement, the required
time of delay, has to be determined or chosen.
It is possible that other more general functional requirements have been identified during the process. The
complete set of functional requirements and performance defines the overall set of requirements the perimeter
security (system) solution has to meet.
Given the available elements for a perimeter security solution and their individual performance characteristics,
most likely various security systems can be generated that meet the overall set of requirements. A schematic
view of this approach is given in Annex B, 'Framework for perimeter protection systems evaluation'.
4.2 Determining the required the level of protection – picture of the methodology
The assessment of the desired performance of the perimeter protection system is based on two variables:
The first variable is related to risks, threats and vulnerability. By filling out a questionnaire regarding risks and
threats the user of the method can get a clear understanding of his current situation. For such an analysis, the
scenarios to be expected have to be defined along with the toolset the intended aggressor may use (together
forming the Modus operandi). The outcome is a number for the Potential risk. Based on the Potential risk the
desired Level of protection is chosen.
The second variable is related to the site. In the second part of the questionnaire site characteristics are
evaluated such as surroundings roads and practical conditions of use. The outcome is a number for the site
characterization.
NOTE This number is similar to 'Potential significance' as used by CEN/TC 325.
The Potential risk and the Site characterization combined define the Level of protection, which is the starting
point to identify the necessary Functional requirements.
The methodology described above is implemented in a calculation model. Figure 1 presents an overview of
the elements of the method.
Figure 1 —Subsequent steps in the assessment model
The description of the elements shown in Figure 1 is given in the following subclauses on the calculation model.
4.3 Assumptions and starting point making the calculation model
The following assumptions and starting points have been used to compose the questionnaire and the
calculation model to determine the numbers for the Potential risk and the Site characterization.
a) Relevant aggressor types:
Four aggressor types should be sufficient to cover the Modus operandi with intended breach of the
perimeter. More detail will not add relevant information on the ways the attack will take place, nor will it
differentiate better in the perseverance of the potential attacker. The four aggressor types reflect mainly
the level of know-how, preparation and motivation.
b) Terrorist attack:
In case the Modus operandi involves the potential threat of a terrorist attack, the perimeter protection
shall always involve extensive (organizational) measures.
c) Multiple Modus operandi:
In case several risks are involved with different Modus operandi, the model requires the highest risk be
chosen.
1) It can be the case that different risks require different security measures. For instance if an activist is
likely to pass over a fence (to make a statement) and a thief is likely to penetrate the fence to be able
to transport the stolen goods.
2) The model identifies the highest risk, but compartments (a lay-out of the site in different zones) can
apply to select areas with lower required levels of security. However, this requires that the user
knows what the highest risk (factor) is.
NOTE An option would be to add the risks (combine the scores), but this complicates the model with little to gain.
Alternatively, one could compare the scores before continuing in the questionnaire to the section on Site
characterization.
d) Inside and outside:
All valuables on the site are applicable to the risk assessment, both inside as well as outside the
buildings.
NOTE CEN/TC 388 and CEN/TC 325 have a different perspective as illustrated in Figure 2.
Figure 2 — Different perspectives of CEN/TC 388 and CEN/TC 325
e) First choose the relevant Modus operandi, and then fill in the model.
If the scenario is an attack by an activist, and there is no risk of taking any valuables (there are no
valuables), then MO 1 should be chosen. Multiplication with a risk factor would make no sense for this
threat.
If the scenario is an attack by an activist, and there is a medium threat for business continuity, then MO 2
should be chosen. Multiplication with the risk factor 1,5 would be appropriate.
NOTE For most Modus operandi only the impact on one or two risk in the calculation model (out of 1.1., 1.2,
...




Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...