Documente Academic
Documente Profesional
Documente Cultură
MATERIALS IV
SECURITY SYSTEMS
BY:
AARUSHI
GARGI
MAHIRA
PIYUSH GOEL
SHAURYA
4-C
I
It is a means or method by which entrance is secured through a system of
interworking components.
N
T
It is designed to detect intrusion or unauthorized entry into a building. This
system is mainly used in residential, commercial. industrial and military R
properties for protection against burglary or property damage as well as personal
protection against intruder. O
D
U
TYPES OF SECURITY SYSTEMS: C
● CCTV (CIRCUIT CLOSED TELEVISION) CAMERAS
● INTRUSION DETECTION SYSTEM T
● ACCESS CONTROL AND LOCKS
● REMOTE CONTROLS I
O
N
CCTV CAMERA I
(CLOSED CIRCUIT TELEVISION CAMERA)
N
● Closed Circuit Television is the use T
of cameras to transmit a signal to a R
specific place on a limited set of
monitors. O
D
● The main purpose of CCTV
camera is to capture light and U
convert it into a video signal. C
● It employ point to point, point to T
multipoint or mesh wireless link to
broadcast information.
I
O
N
CCTV CAMERA A
(CLOSED CIRCUIT TELEVISION CAMERA)
D
V
● Crime deterrent
● Monitor activities A
● Gather evidence
● Maintain records
N
●
●
Easy installation
Reduce property insurance premiums
T
● Transparent coverage A
● Increase user’s confidence
● promotes good behavior G
E
S
CCTV CAMERA
(CLOSED CIRCUIT TELEVISION CAMERA)
T
Y
1. Dome Camera (40 m)
● unobstructive design,
2. Bullet Camera (80 m)
● resistant to dirt in ●
3. C-mount Camera P
easy to install. equipped with detachable
● vandal resistant dome,
challenging environment.
● provides surveillance over ●
lens to alter focal distance.
range can extend beyond 40
E
difficult to interfere with
camera.
● 360 degree rotation
long distances.
● highly visible so act as ●
feets.
weatherproof design make
S
deterrent. ideal for outdoor purpose.
possible ● ideal for industries such as
● ideal for indoor and ● ideal for observing stretch
manufacturing, property of a road, popular in logistic
outdoor use mainly for management, farming etc.
shops, hotels, casinos & utility industry.
etc.
CCTV CAMERA
(CLOSED CIRCUIT TELEVISION CAMERA)
T
Y
4. PTZ Camera (490 m)
P
5. Night Vision Camera 6. IP Camera (30 m)
● optical zoom, results in
close focus.
● infrared LEDs allow
clear recording at night.
● footage can be viewed
online from anywhere.
E
● pan & tilt feature
provides 360 degree.
● image resolution is
● can capture even in fog,
dust or smoke.
● easy setup, as no cable and
monitors are required.
S
● record images in black & ● low maintenance.
impeccable, helps in
white form at night. ● ideal for those who are
facial features
● ideal for sensitive areas usually far from site and
distinguishing.
● ideal for remote viewing like banks, farm, on the moov.
manufacturing plants etc.
areas.
Components of CCTV C
● Lens
O
● Security Cameras M
● Digital Video Recorder P
● Cables
● Monitor
O
● Power Supply N
● Storage devices E
N
T
S
The camera is the element
which captures the video
images and transmits it
through the cables, or
wirelessly, to DVR. The
camera needs a lens to be able
to focus on the subject.
The wired cameras are
psychically connected to the
monitor by a cable that runs
from the camera to the
monitor.
.
Compliance
IP Data
Businesses that deal with privileged data and intellectual property, such
as software developers, entrepreneurs, startups, and pharmaceutical
companies need to not only control who comes into their facilities, but
which areas they are allowed to access.
Types of Access Control
Access control systems vary widely in types and levels of complexity; however, most card access
control systems consist of at least three basic components:
1. user facing
2. admin facing
3. infrastructure
In addition to locally-hosted access control systems, where the server is onsite (as explained in
the previous section), you have three other options:
O
F
A
C
C
E
S
S
C
O
N
T
R
O
L
The Five Phases of Access Control Methodology
M
E
T
H
O
D
O
L
O
G
Y
1. AUTHORIZATION
Authorization is the phase that turns strangers into members. The
next step is role-based access control (RBAC), as explained in the
previous section. By assigning roles to users, they get a certain set of
assigned privileges.
2 AUTHENTICATION
Authentication goes one level deeper than authorization. In this
phase, members present to a door reader whatever badge, token, or
credential they were given upon being authorized. The reader will
check its validation to determine whether or not it should unlock the
electric lock on the door in question
3 ACCESS
Now that the credentials have been authenticated, the access tools
available at this stage make sure everyone gets in the right door, at
the right time, faster and easier..
4 MANAGE
This phase helps the administrator meet several challenges, including
adding new access points, onboarding and offboarding users, maintaining
security, and troubleshooting problems.
5 AUDIT
Auditing physical access control is useful for all types of businesses. In
addition, it helps certain sectors meet special requirements
1- The type and number of locking devices that will be needed and where
they will be installed.
2- An access control panel to connect the locks to the internet.
3- Wiring to connect everything and set up the system.
4- A software license for management and support, which often includes
hosting and a few accessory-credential materials.
.
INTRUSION DETECTION
SYSTEMS
Introduction
21
What is INTRUSION?
Attempting to break into or
misuse your system
Introduction
22
Who are
INTRUDERS?
Intruders may be from
outside the network or
legitimate users of the
network
23
INTRUSION DETECTION
SYSTEM
Anomaly
detection
Signature based Host based Network based
24
ANOMALY
DETECTION
is the process of identifying
unexpected items or events in data
sets, which differ from norm.
Defining the rule sets is one of the key drawbacks of anomaly-based detection.
The efficiency of the system depends on the effective implementation and testing
of the rule sets on all the protocols.
These generate many false alarms and hence compromise the effectiveness of the
IDS
If the malicious behaviour falls under the accepted behaviour, in such conditions
it might get unnoticed
SIGNATURE 26
DETECTION
SYSTEM
This mechanism protects against
known threats. A signature is a
known pattern of a threat, such as:
DETECTION
SYSTEM
Host-based Intrusion Detection
System refers to the detection of
intrusion on a single system.
ADVANTAGES DISADVANTAGES
BASED
DETECTION
SYSTEM
A Network-Based Intrusion Detection
System (NIDS) monitors (and detects)
any suspicious activity on a network. It
checks each and every packet that is
entering the network to make sure it
does not contain any malicious content
which would harm the network or the
end system.
ADVANTAGES DISADVANTAGES
● Keychain remote
HOW REMOTE HOME
SECURITY WORKS
All it takes to arm and disarm is the push of a button when using the key chain remote. The
other options require either the entry of your security code or password or login
information.
Generally, remote home security systems includes three basic arming modes.
1. Stay—protects your family while they are inside the home. Enter and exit delays are
on so people can enter and leave.
2. Instant Stay—is for use at night when nobody is expected to enter or exit.
THANK YOU