School: Science

This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.

  • Unit Title

    Intrusion Detection Systems
  • Unit Code

    SCY2111
  • Year

    2018
  • Enrolment Period

    1
  • Version

    1
  • Credit Points

    15
  • Full Year Unit

    N
  • Mode of Delivery

    On Campus
    Online
  • Unit Coordinator

    A/Prof David Jonathan BROOKS

Description

The unit will outline the principles underlying applications of electronic security technology for the protection of assets of an organisation. As the techniques and devices available become more sophisticated, so the need for law enforcement agencies and security professionals to have a comprehensive knowledge and understanding of security technology principles and practices increases. This unit develops an understanding of the principles and applications of technology used in security systems. It will include the scientific foundation for security technology in barrier detection, open ground detection, and intruder detection systems.

Learning Outcomes

On completion of this unit students should be able to:

  1. Analyse electronic security strengths and weaknesses in a facility.
  2. Apply an understanding of electronic security technology to the design of a strategy for the protection of a facility.
  3. Define and explain the principles and applications of electronic security.
  4. Demonstrate a comprehensive overview of security policy and procedures when applied to the electronic security of a facility.
  5. Examine the implications for levels of electronic security in relation to the value of the assets to be protected.
  6. Identify the principles underlying the applications of security practices and devices in the area of electronic security technology.
  7. Plan electronic security technological strategies for hypothetical facilities.
  8. Recommend appropriate electronic security technology for a facility.

Unit Content

  1. Acoustic Detectors: The basic types of acoustic detectors will be described, and the types of acoustic detection technology will be presented. Appropriate applications of these detection devices will be discussed. The operating characteristics of acoustic detectors will be presented. A discussion on types of break glass detectors is included.
  2. Alarm Systems: A description of the concepts and principles on which alarm systems are based. The elements of an alarm system consist of detection devices, control panel and cables, and an external alarm or warning system. A discussion of commercially available control panels and the Australian Standards that regulate these systems.
  3. Basic Electricity: Electricity is the source of power for most security technology, and provides the effects for sensing, detection, communication, identification, control, and switching. Basic concepts of electricity and electrical circuits are explained, together with sources of electrical power.
  4. Basic Electronics: A basic understanding of the principles, operations, and applications of electronics components and systems. The concepts of electronics components include cables, switches, relays, resistors, and circuits. The applications include microphones and speakers, diodes, rectification, and light emitting diodes.
  5. Basic Wave Theory: Waves as a transfer of energy are presented, with description of wave types. The properties of waves are discussed, through examples as sound and water waves. The properties of light as waves are presented.
  6. Detection Switches: The concept of detection switches as a basic intruder detection device is presented. A range of detection switches is presented as a defence in depth technology. A variety of reed switches are presented with advantages and disadvantages discussed.
  7. Electronic Countermeasures: An introduction to the topic of electronic eavesdropping devices, and the countermeasures that can be adopted to prevent electronic surveillance of information.
  8. Electronic Effects: The basic electronic effects to be considered include magnetic effects, electromagnetic effects, and capacitance effects. Applications of these effects to the protection of assets are discussed.
  9. Infra Red and Microwave Detectors: The detection characteristics of infra red and microwave detectors will be presented through electromagnetic radiation theory. The application of Doppler Effect for volumetric detection will be presented. The concept of passive versus active detectors is discussed. The application of integrated detection technology.
  10. Perimeter Detection: The application of perimeter security to the protection of a facility will be discussed through types of types of electronic perimeter detection systems. A discussion of advantages and disadvantages will be presented in a variety of situations. These systems will include fence mounted technology and open ground detection systems.
  11. Remote Monitoring: An introduction to the various methods of remote monitoring and appropriate applications for the specific types of monitoring systems. The issues associated with remote monitoring will be presented. A classification of alarm transmission systems will be presented.
  12. Ultrasonic Detectors: The principle of ultrasonic detection is presented in the context of wave theory. The Doppler Effect is presented with its application in ultrasonic detection. Advantages and disadvantages of ultrasonic detection are presented.

Additional Learning Experience Information

Lectures, tutorials, and group activities.

Assessment

GS1 GRADING SCHEMA 1 Used for standard coursework units

Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.

ON CAMPUS
TypeDescriptionValue
EssaySensor technology - external20%
AssignmentSensor technology - internal30%
ExaminationFinal examination50%
ONLINE
TypeDescriptionValue
EssaySensor technology - external20%
AssignmentSensor technology - internal30%
ExaminationFinal examination50%

Disability Standards for Education (Commonwealth 2005)

For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.

Academic Misconduct

Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:

  • plagiarism;
  • unauthorised collaboration;
  • cheating in examinations;
  • theft of other students' work;

Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.

The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.

SCY2111|1|1

School: Science

This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.

  • Unit Title

    Intrusion Detection Systems
  • Unit Code

    SCY2111
  • Year

    2018
  • Enrolment Period

    2
  • Version

    1
  • Credit Points

    15
  • Full Year Unit

    N
  • Mode of Delivery

    On Campus
    Online
  • Unit Coordinator

    A/Prof David Jonathan BROOKS

Description

The unit will outline the principles underlying applications of electronic security technology for the protection of assets of an organisation. As the techniques and devices available become more sophisticated, so the need for law enforcement agencies and security professionals to have a comprehensive knowledge and understanding of security technology principles and practices increases. This unit develops an understanding of the principles and applications of technology used in security systems. It will include the scientific foundation for security technology in barrier detection, open ground detection, and intruder detection systems.

Learning Outcomes

On completion of this unit students should be able to:

  1. Analyse electronic security strengths and weaknesses in a facility.
  2. Apply an understanding of electronic security technology to the design of a strategy for the protection of a facility.
  3. Define and explain the principles and applications of electronic security.
  4. Demonstrate a comprehensive overview of security policy and procedures when applied to the electronic security of a facility.
  5. Examine the implications for levels of electronic security in relation to the value of the assets to be protected.
  6. Identify the principles underlying the applications of security practices and devices in the area of electronic security technology.
  7. Plan electronic security technological strategies for hypothetical facilities.
  8. Recommend appropriate electronic security technology for a facility.

Unit Content

  1. Acoustic Detectors: The basic types of acoustic detectors will be described, and the types of acoustic detection technology will be presented. Appropriate applications of these detection devices will be discussed. The operating characteristics of acoustic detectors will be presented. A discussion on types of break glass detectors is included.
  2. Alarm Systems: A description of the concepts and principles on which alarm systems are based. The elements of an alarm system consist of detection devices, control panel and cables, and an external alarm or warning system. A discussion of commercially available control panels and the Australian Standards that regulate these systems.
  3. Basic Electricity: Electricity is the source of power for most security technology, and provides the effects for sensing, detection, communication, identification, control, and switching. Basic concepts of electricity and electrical circuits are explained, together with sources of electrical power.
  4. Basic Electronics: A basic understanding of the principles, operations, and applications of electronics components and systems. The concepts of electronics components include cables, switches, relays, resistors, and circuits. The applications include microphones and speakers, diodes, rectification, and light emitting diodes.
  5. Basic Wave Theory: Waves as a transfer of energy are presented, with description of wave types. The properties of waves are discussed, through examples as sound and water waves. The properties of light as waves are presented.
  6. Detection Switches: The concept of detection switches as a basic intruder detection device is presented. A range of detection switches is presented as a defence in depth technology. A variety of reed switches are presented with advantages and disadvantages discussed.
  7. Electronic Countermeasures: An introduction to the topic of electronic eavesdropping devices, and the countermeasures that can be adopted to prevent electronic surveillance of information.
  8. Electronic Effects: The basic electronic effects to be considered include magnetic effects, electromagnetic effects, and capacitance effects. Applications of these effects to the protection of assets are discussed.
  9. Infra Red and Microwave Detectors: The detection characteristics of infra red and microwave detectors will be presented through electromagnetic radiation theory. The application of Doppler Effect for volumetric detection will be presented. The concept of passive versus active detectors is discussed. The application of integrated detection technology.
  10. Perimeter Detection: The application of perimeter security to the protection of a facility will be discussed through types of types of electronic perimeter detection systems. A discussion of advantages and disadvantages will be presented in a variety of situations. These systems will include fence mounted technology and open ground detection systems.
  11. Remote Monitoring: An introduction to the various methods of remote monitoring and appropriate applications for the specific types of monitoring systems. The issues associated with remote monitoring will be presented. A classification of alarm transmission systems will be presented.
  12. Ultrasonic Detectors: The principle of ultrasonic detection is presented in the context of wave theory. The Doppler Effect is presented with its application in ultrasonic detection. Advantages and disadvantages of ultrasonic detection are presented.

Additional Learning Experience Information

Lectures, tutorials, and group activities.

Assessment

GS1 GRADING SCHEMA 1 Used for standard coursework units

Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.

ON CAMPUS
TypeDescriptionValue
EssaySensor technology - external20%
AssignmentSensor technology - internal30%
ExaminationFinal examination50%
ONLINE
TypeDescriptionValue
EssaySensor technology - external20%
AssignmentSensor technology - internal30%
ExaminationFinal examination50%

Disability Standards for Education (Commonwealth 2005)

For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.

Academic Misconduct

Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:

  • plagiarism;
  • unauthorised collaboration;
  • cheating in examinations;
  • theft of other students' work;

Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.

The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.

SCY2111|1|2