US$1229.00 · In stock Delivery: <= 10 days. True-PDF full-copy in English will be manually translated and delivered via email. GB 50348-2018: Technical standard for security engineering Status: Valid GB 50348: Evolution and historical versions
Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
GB 50348-2018 | English | 1229 |
Add to Cart
|
10 days [Need to translate]
|
Technical standard for security engineering
| Valid |
GB 50348-2018
|
GB 50348-2004 | English | 140 |
Add to Cart
|
0--9 seconds. Auto-delivery
|
Technical code for engineering of security and protection system
| Obsolete |
GB 50348-2004
|
PDF similar to GB 50348-2018
Standard similar to GB 50348-2018 GB 50516 GB/T 50312 GB 50339 GB 50346
Basic data Standard ID | GB 50348-2018 (GB50348-2018) | Description (Translated English) | Technical standard for security engineering | Sector / Industry | National Standard | Classification of Chinese Standard | P33;A90 | Classification of International Standard | 13.310; 91.040.10 | Word Count Estimation | 283,238 | Date of Issue | 2018-05-14 | Date of Implementation | 2018-12-01 | Older Standard (superseded by this standard) | GB 50348-2004 | Quoted Standard | GB 50057; GB 50198; GB 50311; GB 50312; GB/T 50319; GB/T 50326; GB 50343; GB 50464; GB/T 50525; GB/T 50719; GB 51158; GB 51204; GB/T 2828.1; GB 8702; GB/T 14549; GB/T 15211; GB/T 15408; GB 16796; GB/T 28181; GB/T 30148; JGJ 16; GA 1081; GA/T 1297; GA/T 14 | Regulation (derived from) | Ministry of Housing and Urban-Rural Development Announcement 2018 No. 84 | Issuing agency(ies) | Ministry of Housing and Urban-Rural Development of the People's Republic of China; State Administration for Market Regulation | Summary | This standard is applicable to the construction of safety precautions for construction, reconstruction and expansion of new buildings, reconstructions and expansions, as well as system operation and maintenance. |
GB 50348-2018: Technical standard for security engineering---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
1 General
1.0.1 In order to standardize the safety protection project construction procedures and project design, construction, supervision, inspection, acceptance, operation, maintenance and consulting services, improve the safety protection project construction quality and system operation and maintenance level, and protect personal safety and property safety, To maintain social security and stability, this standard is formulated.
1.0.2 This standard is applicable to the construction of safety protection engineering and system operation and maintenance of newly-built, rebuilt and expanded buildings (structures).
1.0.3 The construction of safety protection projects should be included in the overall planning of project construction, and be implemented simultaneously and independently checked and accepted according to factors such as its use function, safety protection management requirements and construction investment.
1.0.4 The construction of security protection projects should organically combine means such as human defense (personal defense), physical defense (material defense), and electronic defense (technical defense), through scientific and reasonable planning, design, construction, operation and maintenance, to build a A comprehensive prevention and control system that meets the requirements of security prevention management and has corresponding risk prevention capabilities.
1.0.5 All safety protection systems should have safety, reliability, maintainability and scalability, and be technologically advanced and economically applicable.
1.0.6 In the construction of security protection projects in special fields involving national security and state secrets, the relevant management requirements shall be followed, the security access mechanism shall be strictly enforced, and safe and controllable product equipment and professional design, construction and service teams that meet the requirements shall be selected
1.0.7 The construction of safety protection projects must comply with the provisions of relevant national laws and regulations.
1.0.8 The construction of safety protection engineering shall not only comply with this standard, but also comply with the provisions of relevant current national standards.
2 terms
2.0.1 Security protection security
Comprehensive use of human defense, physical prevention, electronic prevention and other means to prevent, delay, and stop the occurrence of intrusion, theft, robbery, sabotage, explosion, violent attack and other incidents.
2.0.2 personnel protection
Organized prevention, disposal and other safety management behaviors by personnel with corresponding qualities, referred to as civil air defense.
2.0.3 Physical protection
Physical protection measures that use buildings (structures), barriers, appliances, equipment, or combinations thereof to delay or prevent risk events from occurring, also known as physical defense.
2.0.4 electronic security
Using sensing, communication, computer, information processing and control, biometric identification and other technologies to improve the protection means of detection, delay and response ability, also known as technical defense.
2.0.5 security system security system
For the purpose of safety, a prevention system composed of technologies such as physical protection and electronic protection is comprehensively used.
2.0.6 security engineering security engineering
A construction project implemented to establish a security system.
2.0.7 physical protection system physical protection system
For the purpose of safety protection, it is an entity system composed of natural barriers, artificial barriers, anti-theft locks, cabinets and other appliances and equipment.
2.0.8 electronic protection system electronic protection system
A system composed of various electronic devices for the purpose of safety precautions. It usually includes subsystems such as intrusion and emergency alarm, video surveillance, entrance and exit control, parking garage (field) safety management, explosion-proof safety inspection, electronic inspection, building intercom, etc.
2.0.9 intrusion and hold-up alarm system (I
Using sensor technology and electronic information technology to detect illegal entry or attempted illegal entry into the fortified area, and the electronic system that the user actively triggers the emergency alarm device to send alarm information and process the alarm information.
2.0.10 video surveillance system (VSS)
An electronic system that uses video technology to detect and monitor monitoring areas and displays and records live video images in real time.
2.0.11 access control system (ACS)
An electronic system that uses custom character recognition and/or biometrics and other pattern recognition technologies to identify entry and exit targets and controls the opening and closing of entry and exit actuators.
2.0.12 security management system in parking lots
It is an electronic system that realizes comprehensive management of personnel and vehicles entering and exiting the parking garage (field), monitoring, and the safety of personnel and vehicles in the garage (field).
2.0.13 anti-explosion security inspection system
An electronic system that detects and (or) alarms explosives, weapons and (or) other contraband carried by people and vehicles and carried by objects.
2.0.14 electronic inspection system guard tour system
An electronic system that manages and controls the inspection routes, methods and processes of inspectors.
2.0.15 building intercom system
It is an electronic system that uses (visual) intercom to confirm visitors, and controls and manages visitors at the entrances and exits of buildings (groups), also known as visitor intercom system.
2.0.16 security management platform (SMP)
Integrate the subsystems and related information systems of the security protection system to realize the organic linkage of the physical protection system, the electronic protection system and human protection resources, the centralized processing and sharing of information, the comprehensive research and judgment of risk events, and the command and dispatch of event disposal A combination of hardware and software for unified management, operation and maintenance of systems and equipment.
2.0.17 Protected object protected object
Objects that need to be protected due to risks include units, buildings (structures) and their internal and external parts, areas and specific targets.
2.0.18 high risk protected object high risk protected object
Key units for public security and security and key targets for preventing terrorist attacks determined by law.
2.0.19 defense object defense object
The object that needs to be guarded against and poses a threat to the protected object.
2.0.20 risk
The potential safety hazards of the protected object itself and the threats it faces may be invaded, stolen, robbed, sabotaged, exploded, and violently attacked.
2.0.21 risk assessment risk assessment
Through risk identification, risk analysis, and risk evaluation, the process of confirming the risks that the security system needs to prevent.
2.0.22 level of risk
The magnitude of a single risk or a combined risk that exists in the protected object itself and its surroundings and poses a threat to its safety, expressed in a combination of consequences and possibilities.
2.0.23 level of protection
The level of precautions taken to ensure the safety of protected objects.
2.0.24 security grade security grade
The ability level of the security protection system and equipment to resist different attacks.
2.0.25 detection
Perception of explicit risk events and (or) implicit risk events.
2.0.26 delay delay
Prolong or (and) postpone the process of risk events.
2.0.27 response response
Actions taken in response to the occurrence of a risk event.
2.0.28 false alarm false alarm
An alert issued in response to an unplanned event.
2.0.29 leakage alarm
There is no alarm response to a programmed alarm event.
2.0.30 perimeter perimeter
The area boundary of the protected object.
2.0.31 zone zone
In the protected area, the intrusion and emergency alarm system can detect intrusion or artificially trigger the area of the emergency alarm device.
2.0.32 Surveillance area
The on-site spatial range corresponding to the image captured by the video acquisition device of the video surveillance system.
2.0.33 controlled area/protected area
The spatial area enclosed by physical boundaries corresponding to one or more access control points of the access control system.
2.0.34 Longitudinal-depth protection
According to the environmental conditions and security management requirements of the protected object, implement protective measures for the entire prevention area from outside to inside or from inside to outside. Defense in depth is divided into overall defense in depth and partial defense in depth.
2.0.35 balanced protection balanced protection
The safety protection level of each part of the safety protection system is basically the same, and there is no obvious weak link.
2.0.36 Surveillance center
The central control room, which receives and processes security system information, handles alarm events, and manages and controls system equipment, is usually divided into a duty area and an equipment area.
2.0.37 system operation system operation
The process of using the security system to carry out alarm event handling, video surveillance, access control and other security activities.
2.0.38 system maintenance system maintenance
Maintenance activities are carried out to ensure the normal operation of the safety protection system and to continuously exert the safety protection effectiveness.
2.0.39 system effectiveness evaluation system effectiveness evaluation
The analysis and evaluation process of the safety protection system to meet the expected effectiveness.
3 Basic Regulations
3.0.1 Safety precaution engineering construction and system operation and maintenance should be managed throughout the life cycle and planned as a whole. The project construction procedures and requirements should be followed, the objectives of each stage should be determined, and the project construction, system operation and maintenance should be carried out in a planned and step-by-step manner.
3.0.2 The construction of safety protection engineering should follow the following principles.
1 Combination of human defense, material defense and technical defense, coordination of detection, delay and response;
2 The protection level of the protected object is compatible with the risk level;
3 The security level of the system and equipment is compatible with the object of protection and its attack means;
4 Satisfy the depth, balance and anti-vulnerability requirements of protection;
5 Meet the security and reliability requirements of the system;
6 Meet the electromagnetic compatibility and environmental adaptability requirements of the system;
7 Meet the real-time and original integrity requirements of the system;
8 To meet the requirements of system compatibility, scalability and maintainability;
1 The protection of the perimeter shall meet the following requirements.
1) Protective measures such as physical protection and (or) intrusion detection and (or) video surveillance should be reasonably selected according to the site environment and security management requirements;
2) The defense capabilities of different physical protection measures against different risks should be considered;
3) The detection capabilities of different intrusion detection equipment for different intrusion behaviors such as overturning, traversing, and digging, and the response capabilities of civil air defense after intrusion detection alarms should be considered;
4) The monitoring effect of video surveillance equipment on the perimeter environment should be considered, at least the activities of personnel in the perimeter environment should be able to be seen clearly.
2 The protection of entrances and exits shall meet the following requirements.
1) Protective measures such as physical protection and (or) access control and (or) intrusion detection and (or) video surveillance should be reasonably selected according to the on-site environment and security management requirements;
2) The defense capabilities of different physical protection measures against different risks should be considered;
3) Different types of reading technologies for entrance and exit control and their ability to defend against illegal intrusions (forcible entry, trailing entry, technical opening, etc.) should be considered;
4) The detection capabilities of different intrusion detection equipment for different intrusion behaviors such as overturning and traversing, as well as the response capabilities of civil air defense after intrusion detection alarms should be considered;
5) The monitoring effect of video surveillance equipment on entrances and exits should be considered. Usually, the facial features of people entering and exiting and the number plates of vehicles entering and exiting should be able to be clearly identified.
3 The protection of passageways and public areas shall comply with the following regulations.
1) Video monitoring should be selected, and the monitoring effect should be able to clearly see the traffic conditions of people, objects, and vehicles in the monitoring area; important points should clearly distinguish the facial features of the people and the license plate of the vehicle;
2) For passages and public areas around high-risk protected objects, intrusion detection and/or physical protection measures can be selected.
4 The protection of important areas and parts such as the monitoring center, financial room, and water, electrical, and heating equipment room should meet the following regulations.
1) Protective measures such as physical protection and (or) access control and (or) intrusion detection and (or) video surveillance should be reasonably selected according to the on-site environment and security management requirements;
2) Anti-theft doors and (or) anti-theft windows should be selected for physical protection. Other protective measures should consider the type of equipment selected and its ability to prevent illegal intrusion, response time after alarm, and monitoring effect of video surveillance.
5 The protection of the protection target shall comply with the following regulations.
1) Protective measures such as physical protection and (or) area intrusion detection and (or) displacement detection and (or) video surveillance should be reasonably selected according to the on-site environment and security management requirements;
2) Corresponding physical protection measures should be taken according to the specific conditions of different protection targets and the risks of confrontation;
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB 50348-2018_English be delivered?Answer: Upon your order, we will start to translate GB 50348-2018_English as soon as possible, and keep you informed of the progress. The lead time is typically 6 ~ 10 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GB 50348-2018_English with my colleagues?Answer: Yes. The purchased PDF of GB 50348-2018_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay. Question 5: Should I purchase the latest version GB 50348-2018?Answer: Yes. Unless special scenarios such as technical constraints or academic study, you should always prioritize to purchase the latest version GB 50348-2018 even if the enforcement date is in future. Complying with the latest version means that, by default, it also complies with all the earlier versions, technically.
|