What type of fence detects if someone attempts to climb or cut it?
B: Perimeter Intrusion Detection and Assessment System (PIDAS) is a type of fencing that has sensors located on the wire mesh and at the base of the fence.
It is used to detect if someone attempts to cut or climb the fence. It has a passive cable vibration sensor that sets off an alarm if an intrusion is detected. PIDAS is
very sensitive and can cause many false alarms. PIDAS fencing serves as a detective control. It is used in high-security areas, such as around military and prison
facilities, and is also useful in areas that cannot be easily observed.
A is incorrect because fencing is not classified in this manner. Classes are used to refer to gates. A Class IV gate means that it provides restricted access. This
includes a prison entrance that is monitored in person or via closed circuitry. Each gate classification has its own long list of implementation and maintenance
guidelines in order to ensure the necessary level of protection. These classifications and guidelines are developed by Underwriters Laboratory (UL), a nonprofit
organization that tests, inspects, and classifies electronic devices, fire protection equipment, and specific construction materials.
C is incorrect because CPTED is not a type of fencing. CPTED stands for Crime Prevention Through Environmental Design. It is a discipline that describes how
to design a physical environment to affect human behavior, thereby reducing crime. CPTED has been used to develop physical security programs, as well as
neighborhoods, towns, and cities. It addresses landscaping, entrances, facility and neighborhood layouts, lighting, road placement, and traffic circulation
patternsall in an effort to discourage criminal activity.
D is incorrect because the PCCIP is the President’s Commission on Critical Infrastructure Protection. PCCIP is an executive order that requires organizations
that are part of the national critical infrastructure to have adequate protection mechanisms in place. This includes the technical protection of systems and data, as
well as the physical protection of the facilities themselves. It outlines that power systems, emergency services, water supply systems, gas and oil transportation,
and government services must be evaluated to ensure that proper physical security is implemented.