

Alarm information must be transmitted rapidly to a remote alarm receiving center and presented to an operator who, using the prescribed procedures, activates the appropriate response/intervention service. The latter, however, is not enough in fact, to have optimal protection, it must be integrated with an active security system that can monitor the structure of the passive system and generate adequate alarm information to verify breakthrough or overrun attempts. To move from a high-risk situation to a lower-risk, and therefore more secure, situation, it is necessary to set up all physical obstacles to prevent criminal actions by implementing a passive security system. telecommunication network for sending data to a remote-control center.means of image acquisition and recording.means of activating and deactivating the subsystem.primary and secondary group power supplies.local electrical interconnection network.means for communicating information remotely.The elements that constitute the active security system are: evaluate the information provided by the peripheral alarm control unit and present it to the operator of a remote alarm receiving center.generate a response through local and remote communication methods.deterring the commissioning of criminal activities by means of deterrents.evaluate the information provided by the area through a peripheral alarm box.monitoring the area and facility for the presence of criminal activity through event detection.The active security system, on the other hand, consists of the electrical, electronic, and telephone methods involved in: The passive safety subsystem consists of the following elements: Obstacles are the more efficient the longer it takes to knock them down or climb over them. The purpose of these methods is to discourage attempts to overcome, knock down or climb over them as much as possible. The passive security system consists of all the physical methods that interpose themselves between possible threats and what needs to be protected. The security system is the set of all the methods, procedures, services, which allow, by the adoption of deterrent and protection methods, to reduce the risk. Once you understand the risk you are exposed to, you proceed with the definition of a customized perimeter security system design. Then It will be necessary to consider all types of threats that may occur such as: theft, intrusion, robbery, kidnapping, and vandalism. Being able to assess this risk allows you to gather all the data to study and solve a security problem. The greater the probability of the threat occurring, the greater the level of risk. To meet the security requirements of an area, a thorough analysis must be conducted to determine the level of risk. For example, a high wall with fence posts that protects a property discourages criminals from intruding and, when an incident occurs, increases the time it takes to carry it out. Doing so discourages the perpetrator from committing a harmful event. The goal of perimeter fence is to stop or prevent the incident and reduce the level of risk. In high-security applications, sensors may be attached to the fence that generate alarms when they detect someone cutting, climbing, or lifting the fence fabric.

Vertical bar, acoustic barriers and welded mesh are used in commercial projects and landmarks, and transport hubs. Since the 2000s, welded wire mesh and acoustic barriers have also become popular types of perimeter fence around the world. Vertical bar fencing has been the most popular form of perimeter security fence since the 1980s. Different types of perimeter fencing include: The level of protection offered varies according to the threat level to the perimeter. Demarcation of a perimeter, when the protection of assets, personnel or buildings is required, is normally affected by the building of a perimeter fence system.
