Sunteți pe pagina 1din 39

BUILDING CONSTRUCTION &

MATERIALS IV
SECURITY SYSTEMS

BY:
AARUSHI
GARGI
MAHIRA
PIYUSH GOEL
SHAURYA
4-C
I
It is a means or method by which entrance is secured through a system of
interworking components.
N
T
It is designed to detect intrusion or unauthorized entry into a building. This
system is mainly used in residential, commercial. industrial and military R
properties for protection against burglary or property damage as well as personal
protection against intruder. O
D
U
TYPES OF SECURITY SYSTEMS: C
● CCTV (CIRCUIT CLOSED TELEVISION) CAMERAS
● INTRUSION DETECTION SYSTEM T
● ACCESS CONTROL AND LOCKS
● REMOTE CONTROLS I
O
N
CCTV CAMERA I
(CLOSED CIRCUIT TELEVISION CAMERA)
N
● Closed Circuit Television is the use T
of cameras to transmit a signal to a R
specific place on a limited set of
monitors. O
D
● The main purpose of CCTV
camera is to capture light and U
convert it into a video signal. C
● It employ point to point, point to T
multipoint or mesh wireless link to
broadcast information.
I
O
N
CCTV CAMERA A
(CLOSED CIRCUIT TELEVISION CAMERA)
D
V
● Crime deterrent
● Monitor activities A
● Gather evidence
● Maintain records
N


Easy installation
Reduce property insurance premiums
T
● Transparent coverage A
● Increase user’s confidence
● promotes good behavior G
E
S
CCTV CAMERA
(CLOSED CIRCUIT TELEVISION CAMERA)

T
Y
1. Dome Camera (40 m)
● unobstructive design,
2. Bullet Camera (80 m)
● resistant to dirt in ●
3. C-mount Camera P
easy to install. equipped with detachable
● vandal resistant dome,
challenging environment.
● provides surveillance over ●
lens to alter focal distance.
range can extend beyond 40
E
difficult to interfere with
camera.
● 360 degree rotation
long distances.
● highly visible so act as ●
feets.
weatherproof design make
S
deterrent. ideal for outdoor purpose.
possible ● ideal for industries such as
● ideal for indoor and ● ideal for observing stretch
manufacturing, property of a road, popular in logistic
outdoor use mainly for management, farming etc.
shops, hotels, casinos & utility industry.
etc.
CCTV CAMERA
(CLOSED CIRCUIT TELEVISION CAMERA)

T
Y
4. PTZ Camera (490 m)
P
5. Night Vision Camera 6. IP Camera (30 m)
● optical zoom, results in
close focus.
● infrared LEDs allow
clear recording at night.
● footage can be viewed
online from anywhere.
E
● pan & tilt feature
provides 360 degree.
● image resolution is
● can capture even in fog,
dust or smoke.
● easy setup, as no cable and
monitors are required.
S
● record images in black & ● low maintenance.
impeccable, helps in
white form at night. ● ideal for those who are
facial features
● ideal for sensitive areas usually far from site and
distinguishing.
● ideal for remote viewing like banks, farm, on the moov.
manufacturing plants etc.
areas.
Components of CCTV C
● Lens
O
● Security Cameras M
● Digital Video Recorder P
● Cables
● Monitor
O
● Power Supply N
● Storage devices E
N
T
S
The camera is the element
which captures the video
images and transmits it
through the cables, or
wirelessly, to DVR. The
camera needs a lens to be able
to focus on the subject.
The wired cameras are
psychically connected to the
monitor by a cable that runs
from the camera to the
monitor.
.

CCTV WORKING DIAGRAM


Types of CCTV lens C
■ A fixed or board CCTV camera lens has a O
set viewing angle. This means the camera M
lens cannot be zoomed in or adjusted in any
way. Fixed lens cameras are generally less
P
expensive. O
■ A vari-focal or manual zoom CCTV
camera lens focuses on exactly the area that
N
you wish to record. It has the flexibility to be E
adjusted at a later date if the area layout or
N
your requirements change.
T
S
Digital Video Recorder (DVR) C
● Most security cameras in use today capture
an analog picture. The DVR converts the
O
analog signal to digital and then compresses
it.
M
● It is a consumer electronics device designed
for recording video in a digital format within
P
a mass storage device such as USB flash
drive, hard disk drive or any other storage O

device.
Records images from analogue cameras. N
Cables E
● The cables are just the wires that are used to
connect different equipments like CCTV
N
camera, monitor, recorders, modem etc. in a
CCTV camera setup.
T
S
C
Hard Disk O
The Hard disk is a storage device which stores the
video captured by the security camera so that it can M
be used later. These CCTV hard disks are fitted
within the video recorders. To view the video
P
recordings on the hard disk, you can directly connect
the DVR or NVR to monitor.
O
A display unit (Monitor)
N
The display unit, or a monitor, takes the video image
E
from DVR, or NVR and outputs it on the screen. You
can see the video or image on screen that is been
N
captured by the camera. T
S
MONITOR
Access Control and Locks I
N
In the fields of physical security and information security, access control (AC)
is the selective restriction of access to a place or other resource while T
access management describes the process. The act of accessing may mean R
consuming, entering, or using. Permission to access a resource is called
authorization. O
Locks and login credentials are two analogous mechanisms of access control. D
U
C
T
I
O
physically checking id before allowing
access into a military establishment
Underground entrance to the
New York City Subway system N
Why Access Control Systems?
P
-The purpose of access control is to grant entrance to a building or office only to those
who are authorized to be there. The deadbolt lock, along with its matching brass key, was U
the gold standard of access control for many years; however, modern businesses want
more. Yes, they want to control who passes through their doors, but they also want a way R
to monitor and manage access. Keys have now passed the baton to computer-based
electronic access control systems that provide quick, convenient access to authorized P
persons while denying access to unauthorized ones.
O
S
E
Beyond the obvious reason, physical security, there are several reasons a business or
medical facility might need an access control system

Compliance

● Hospitals, doctors’ offices, and health insurance companies need to


comply with HIPAA health data regulations.
● Banks, insurance companies, and any business that accepts and
processes credit cards is subject to PCI credit card data regulations.
● SaaS providers, data centers, or any company hoping to maintain
SOC2 cybersecurity standards.

IP Data

Businesses that deal with privileged data and intellectual property, such
as software developers, entrepreneurs, startups, and pharmaceutical
companies need to not only control who comes into their facilities, but
which areas they are allowed to access.
Types of Access Control
Access control systems vary widely in types and levels of complexity; however, most card access
control systems consist of at least three basic components:
1. user facing
2. admin facing
3. infrastructure
In addition to locally-hosted access control systems, where the server is onsite (as explained in
the previous section), you have three other options:

The easiest way to explain these modern


types of access control is to compare them to
Google Mail, where your email is stored on
the cloud rather than on your computer. The
cloud, of course, is another way to say a
remote server hosted by a service provider.
This gives you the convenience of accessing
your emails from any browser, as long as you
have the correct login credentials.
T
Three access control paradigms organize how people gain access: role-based access control Y
(RBAC), discretionary access control (DAC), and mandatory access control (MAC). P
E
S

O
F

A
C
C
E
S
S

C
O
N
T
R
O
L
The Five Phases of Access Control Methodology
M
E
T
H
O
D
O
L
O
G
Y
1. AUTHORIZATION
Authorization is the phase that turns strangers into members. The
next step is role-based access control (RBAC), as explained in the
previous section. By assigning roles to users, they get a certain set of
assigned privileges.

2 AUTHENTICATION
Authentication goes one level deeper than authorization. In this
phase, members present to a door reader whatever badge, token, or
credential they were given upon being authorized. The reader will
check its validation to determine whether or not it should unlock the
electric lock on the door in question

3 ACCESS
Now that the credentials have been authenticated, the access tools
available at this stage make sure everyone gets in the right door, at
the right time, faster and easier..
4 MANAGE
This phase helps the administrator meet several challenges, including
adding new access points, onboarding and offboarding users, maintaining
security, and troubleshooting problems.

5 AUDIT
Auditing physical access control is useful for all types of businesses. In
addition, it helps certain sectors meet special requirements

PROPERTIES OF CONTROL SYSTEM QUOTE-

1- The type and number of locking devices that will be needed and where
they will be installed.
2- An access control panel to connect the locks to the internet.
3- Wiring to connect everything and set up the system.
4- A software license for management and support, which often includes
hosting and a few accessory-credential materials.

.
INTRUSION DETECTION
SYSTEMS
Introduction
21

What is INTRUSION?
Attempting to break into or
misuse your system
Introduction
22

Who are
INTRUDERS?
Intruders may be from
outside the network or
legitimate users of the
network
23

INTRUSION DETECTION
SYSTEM

Anomaly
detection
Signature based Host based Network based
24
ANOMALY
DETECTION
is the process of identifying
unexpected items or events in data
sets, which differ from norm.

This IDS models the normal usage of


network as a noise characterisation.

Anything distinct from the noise is


assumed to be an intrusion activity

The primary strength is its ability to


recognize novel attacks.
CONS OF DRAWBACKS OF 25
ANOMALY DETECTION

Defining the rule sets is one of the key drawbacks of anomaly-based detection.
The efficiency of the system depends on the effective implementation and testing
of the rule sets on all the protocols.

These generate many false alarms and hence compromise the effectiveness of the
IDS

AND ON THE OTHER HAND

If the malicious behaviour falls under the accepted behaviour, in such conditions
it might get unnoticed
SIGNATURE 26

DETECTION
SYSTEM
This mechanism protects against
known threats. A signature is a
known pattern of a threat, such as:

Signature-based detection is the


simplest form of detection because it
just compares the traffic with the
signature database. If a match is
found then the alert is generated, if a
match is not found then the traffic
flows without any problem.
HOST-BASED 27

DETECTION
SYSTEM
Host-based Intrusion Detection
System refers to the detection of
intrusion on a single system.

This is normally a software-based


deployment where an agent, as
shown in Figure, is installed on the
local host that monitors and reports
the application activity. HIDS
monitors the access to the system
and its application and sends alerts
for any unusual activities.
28

ADVANTAGES DISADVANTAGES

● System level protection. ● HIDS functionality works only if


Protects from attacks directed to the systems generate logs and
the system match against the predefined
● Any unauthorized activity on the policies. If for some reason,
systems do not generate logs,
system (configuration changes,
HIDS may not function properly
file changes, registry changes,
● If hackers bring down the HIDS
etc.) are detected and an alert is
server, then HIDS is of no use.
generated for further action
This is true for any vulnerability
protection software
NETWORK- 29

BASED
DETECTION
SYSTEM
A Network-Based Intrusion Detection
System (NIDS) monitors (and detects)
any suspicious activity on a network. It
checks each and every packet that is
entering the network to make sure it
does not contain any malicious content
which would harm the network or the
end system.

A single sensor, as shown in Figure


deployed in promiscuous mode or inline
mode can monitor/protect several hosts
in the network.
30

ADVANTAGES DISADVANTAGES

● Protects network and ● Sensor hardware is


network resources process intensive
● Protects against DoS attacks ● Prone to false positives.
REMOTE CONTROL
SECURITY SYSTEMS
WHAT ARE REMOTE CONTROL SYSTEMS?
A control system in which the issuing of the control
command and its execution are separated by a relatively
significant distance.
The simplest remote-control systems are limited to switching-
type functions. These systems operate basically in an open
loop, that is, without relying on feedback.
Some typical examples are a ceiling lamp turned on and off
by a light switch via an electrical wire; the on/off function of a
television receiver with an infrared remote controller; and
railway switches operated from a remote-control room.
INFRARED REMOTE CONTROLS

Infrared Remote Control devices were first developed in the early


1970s.
They can control multiple different things all at the same time
with just a press of a button.
They’re used in many sectors such as :-
● Entertainment
● Security
● Military
● Industrial Sector

They use light and photoreceptors with varying light frequencies


for different functions.
HOW THEY WORK

They use invisible light beams to send signals to electronic


devices.
Light is received by receptors in devices.
The different frequencies are set for different functions.
USE OF REMOTE
CONTROL SYSTEMS
● Watch streaming video of your property

● Set thermostat temperatures remotely

● Control lighting, and lighting schedules

● Remotely arm or disarm your security system

● Send custom commands to your system

● Remotely create new rules or edit existing ones


REMOTE ARM AND DISARM
HOME SECURITY SYSTEM
A remote-controlled arm and disarm is a simple way to better
connect you with your home security system. Using the latest and
most convenient form of technology for you and family members,
including:

● Wireless keypads in the home

● The subscriber portal on your subscriber’s website

● smartphone app or the touchscreen of a tablet or any


mobile device

● Keychain remote
HOW REMOTE HOME
SECURITY WORKS
All it takes to arm and disarm is the push of a button when using the key chain remote. The
other options require either the entry of your security code or password or login
information.

Generally, remote home security systems includes three basic arming modes.

1. Stay—protects your family while they are inside the home. Enter and exit delays are
on so people can enter and leave.

2. Instant Stay—is for use at night when nobody is expected to enter or exit.

3. Away—is used when nobody is home.

4. Cancel or Disarm—disarms the system.

5. Panic—to alert police or other emergency services


REMOTE CONTROLLED
SECURITY OPTIONS
● Cameras :-Give you instant access to photos and live video of
your home.
● Lights :- Can be turned on and off and even dimmed.
● Thermostats :- settings can be adjusted as needed.
● Alarms :- Can be turned on/off and used to alert security.

WHO WILL BENEFIT?


Anyone who wants the convenience of easy access to their security system will benefit, but
families who are away from home most of the day or who travel a lot will especially benefit
from remote control security capability. For households with children or other family members
coming home to an empty house, the security of monitoring their safe arrivals and then
adjusting the security system accordingly is comforting.
Thanks
39

THANK YOU

S-ar putea să vă placă și