Register now or log in to join your professional community.
1.The first thing to be considered is what assets are to be protected and in which phase of the opperation if applicable.
2.In consideration of the facility characterics and required access to protected assets a vulnerability study/model should be completed with allowences for levels of protection required and life safety and resourse requirements considered.
3. Develop protection measures to protect the assets at a acceptable level, utilizing available resources and with out compromizing life safety.
It can be a ver complicated process but can be managed by an experenced security manger.
1. analysis the requirement from clients
2. find solutions by the systems which applied the requirement
3. build the technical proposal with planing
5. install & configuration the systems
6. test and commission systems
7. delivery the projects
8. prevent of maintenance monthly or weekly