LESSON 4
EMPLOY INTRUSION DETECTION SYSTEMS
OVERVIEW
LESSON DESCRIPTION:
In this lesson you will learn to determine the necessity and feasibility of
an IDS, identify the basic operation, and select the appropriate IDS for the
desired security level.
TERMINAL LEARNING OBJECTIVE:
ACTION:
CONDITION:
You will have this subcourse, paper and pencil.
STANDARD:
To demonstrate competency of this task, you must achieve a
score of 70 percent on the subcourse examination.
REFERENCES:
The material contained in this lesson was derived from the
following publication: FM 19-30 and TM 5-853-4.
INTRODUCTION
Individuals employ security systems as a means of detecting intruders and
Likewise, government and industry must
have such protection.
This will deny access to information, material or
equipment which could disrupt the mission or allow the enemy an advantage.
Security in depth is the goal of physical security personnel. Such security
calls for physical barriers, guards, protective lighting systems and
intrusion detection systems.
All these provide the protection deemed
necessary. Structural barriers are delaying devices. These include gates,
fences, locks, and natural barriers.
Intrusion detection systems are
mechanical and electronic warning systems.
They are developed by using
basic laws of electricity and are designed to alert security personnel of
intrusion or attempted intrusion into an area. These systems are designed,
also, to alert security to tampering. This occurs when a person tries to
Certain types of systems are
suitable for exterior protection, while others are suitable only for
interior use.
All have advantages and disadvantages; however, security
personnel must remember one main fact: any warning system is valueless
unless supported by prompt guard force action and manned by trained
operators and monitors. A state of readiness such as this is necessary in
the event of alarm activation. A
4-1
MP1002