Home' RTCA Documents for Review : DO-230H FRAC Contents 130
© 2017, RTCA, Inc.
To address the need for information on practical, viable security solutions for airports, the TSA has initiated
a process to identify innovative security measures, including airport perimeter technology. Information
gathered from recent TSA surveys has been published on the TSA secure website. The document,
Innovative Security Measures, TSA 2011, is available to all airport security coordinators who have access
to the TSA web board. It should be noted that this document is not inclusive of all airports, rather only those
airports that voluntarily provided best practice information.
Perimeter Systems Product Testing
The National Safe Skies Alliance has been testing airport perimeter technologies for more than ten years
with the Airport Security System Integrated Support Testing (ASSIST) Program. The reports are posted on
TSA’s ACO-200 Secure Web board. Every airport is required by regulation to establish an Airport Security
Coordinator (ASC) position. This information is available to airport personnel through the local Airport
Security Coordinator who is granted access by the TSA to the TSA’s secure Web Board.
As described previously in this RTCA report, a Concept of Operations communicates the needs of the client
to the technical community that will build the system. System requirements fall into 3 broad categories:
operational, functional, and performance requirements. Operational requirements state the required system
capabilities and how the system will operate from the user’s point of view. The functional requirements
will define what the system will do to meet the business needs of the organization’s stakeholders by
identifying the necessary task, action or activity that must be accomplished by the system, but not how the
system will do it. The business needs should be documented in lists of functional requirements and used as
input to a traceability compliance matrix. Finally, performance requirements dictate how well the system
must operate in order to achieve the operational and functional requirements.
Given the complexity of a perimeter intrusion detection system, it is essential to the success of the
implementation that each element of system design be tied directly back to the requirement(s) it supports.
This verifies that the system works as designed and functions as required. Just as a design element must
trace back to the original requirement, so must the verification test ensure it performs appropriately.
[Reference Section 10: Procurement for further discussion of this process]
Typical PIDS Requirements
A PIDS will serve as a tool to help airport security personnel in monitoring and responding to potential
perimeter intrusions by providing the ability to detect, assess and possibly track and identify intruders in
real-time. Ideally, a PIDS should enhance the efficiency of security personnel to respond, intercept and
neutralize the intrusion. The goal is to provide a proactive -- or at least an early warning -- system to alert
on intruders attempting to gain access to secure areas of the airport. Typical PIDS requirements identified
Links Archive Navigation Previous Page Next Page