Electronic system of airport security

. Priorities of on electronic airport security system involve timely information on unauthorized penetration or an attempt of entering the airport areas. Visible positioning of some of the system components is to divert potential perpetrators from attempting to penetrate airport facilities by way of signalling such events and also serving as a means of prevention.

ISSN 1339-9853 (online) http://acta-avionica.tuke.sk ISSN 1335-9479 (print) Figure 1 Security system [1] In relation to providing protection for an interest, the system is defined as a set of technical and organizational arrangements that always must be placed between the threats and the object of threat. The set is made up of a combination of means for standard, mode-related, technical and physical protection termed as security system [1].
From technical point of view, the security system represents a system of electrical, electronic, mechanical or other components making up a firm installed barrier, which prevents a person from entering or leaving a protected object. It also protects against driving in or out the object under protection. The barrier cannot be overcome without professional expertise or physical force [1].

BASIC FORMS OF PROTECTION
The security system is made up of several independent and mutually interconnected sub-systems. Currently the following classification of the forms (subsystems) of protection applies [1]: -Mode-based protection, -Physical protection, -Technical protection.
Mode-based protection is a set of administrative measures and procedures tasked with the introduction of a certain system into the operation of individual employees and guests in the protected objects with the aim of improving security in the object under protection along with providing other forms of protection. It is a system of organizational and administrative measures taken to define motion of persons within a protected object, area and its vicinity, as well as ensure flow of information related to the security of the object in question [1].
Physical protection is understood as the physical presence of a person within the protected area, at the place of interest to be guarded. It also involve ground patrolling, guarding, operating the EAS and also exercising direct control and supervision over activities mentioned [1].
Technical protection is a relatively simple and inexpensive form of object security. More or less, it offers preventive function, consequently, though combination with physical protection is recommended [1].

Potentials of using the EAS in view of area-based applications
In terms of the object security, the area-based applications of the EAS can be classified as follows [ Perimeter protection -signalling penetration of the object perimeter understood the frontier of the object represented by a protective barrier, i.e. a fence [1].
Cladding protectionsignalling disruption of the object´s cladding, these of either vertical or horizontal building structures (walls, floors, ceilings). In this case the object is understood as a single building under construction, either the whole or defined set of its rooms [1].
Area protectionsignalling violation of internal areas of an object defined by vertical and horizontal building structures. The perpetrator is assumed to have penetrated the object and is moving within its area where detectors have been installed around the assets to be protected [1].
Object protectionsignalling immediate presence of the perpetrator at the object of protection or unauthorized handling with the object protected. [1]

MAJOR TASKS OF THE EAC
Any security system is made up of its separate but mutually interconnected parts with communication established among them. The security system can be understood as a set of elements of physical protection, technical equipment and elements of organization-and mode-related arrangements, see Fig.1. The set of the separate elements makes up a system of protection frequently termed as an integrated security system in which the individual elements of protection are combined thus providing optimum safety for the concrete object or interest to be protected [1].

Alarm signalling
Depending on the actual mode of operation, the EAS must ensure signalling of the alarm on having received signal from a violated detector, emergency reporter or elements of protection against sabotage. Alarm must also be signalled in cases as follows [2]: -short circuit of the signal conductors or some of the conductors running between the switching centre and the equipment linked to it (detectors, control equipment, signalling components), -unauthorized handling and intervention into the switching centre or system components.
Signalling of the alarm must be acoustic at least, whereas optical signalling is also recommended. In case of using optical signalling, it should be kept on until de-activated by the servicing staff. The purpose of optical signalling is to enable identification of the place of alarm status.  -State of transition from actual mode to other mode of operation (for example from mode of guarding into standby mode).

Status indication
The switching centre should feature elements of indication installed directly on the control equipment to ensure indication of the states as above.

Sabotage detection
Sabotage detection must be featured by all EAS components, expect from emergency indicators. It must be active in both modes of EAS operation, i.-e. while guarding or when on standby. The control equipment that might affect the functionality of the EAS are designed for use in the interiors of guarded objects and must include means of preventing replacement of such and equipment as a whole, or its part or signals running between the equipment and the switching centre [2].

Protecting the EAS against sabotage
Components contained in he EAS involve equipment that limit Access into its internal elements so as to prevent them from changing their setting or putting them out of operation. Protection against sabotage may take different forms and depends on the location of the EAS (in the exterior or interior of the area to be protected).
Requirements set for protection against sabotage: -all the clips and control elements must be secured against unlawful access, -claddings must be sufficiently resistant to mechanical damages so as to prevent unauthorized access to the internal elements of the system without visible traces of damage to cladding or raising the sabotage alarm, -access to internal equipment as parts of the EACS must be designed so that special tools are needed so as to enable access to them.

Entry into the events memory
Entry into the memory is necessary for feedback checks as well as for securing events that have taken part for a period of time.
Events entered into the memory [2]: The means of the memory serving for mandatory recording of the events must be protected against accidental or purposeful deletion of the events.

CONCLUSION
At the present time technical protection along with physical protection are rated among the most frequently used forms of protection and depending on the intervention capability of the latter are considered as the most reliable ones. The components employed will also determine whether the security system will belong to the most difficult ones to overcome or not.
EAS provides sufficient protection of objects, but despite of it, it is recommended to be combined with mechanical barriers of protection (farrowing rails, locks and latches), camera systems, electronic fire signalling, all of them realising to the level of safety and security.