ec4019pa intrusion & access control technology (iact) chapter 4- cams prepared by sandy tay
Post on 24-Dec-2015
214 Views
Preview:
TRANSCRIPT
EC4019PAIntrusion & Access Control Technology (IACT)
Chapter 4- CAMSPrepared by Sandy Tay
Lesson Objectives
CAMS
Processes
System
Transmission media
Alarm signals
• Reception• Analysis• Handling• Archiving
• Hardware• Software
• Leased line• PSTN• IP• Wireless
• Panic• Intrusion• Telephone line fault• AC power fail
CAMS
Allows controlling and monitoring a multiple site installation.
Classified as: Commercial (Centralized) Proprietary (Localized)
Provides services to monitor subscribers’ alarm systems from burglar, fire and residential alarm systems.
CAMS
No Commercial (centralized) CAMS
Proprietary (Localized)
1 Remotely located from theFacility
Located within or near on-sitefacility
2 Operated for a profit Owned and operated to provideSecurity requirements of the owner’s facility
CAMS
What is Central Alarm Monitoring provides services to monitor subscribers’ alarm systems
from burglar, fire and residential alarm systems and provides specific responses
Why need Central Alarm monitoring Have a peace of mind Your home or business is protected 24 hours, every day, personally
and without delay. Efficiency handling of security information
CAMS
Processes Reception Analysis Handling Archiving
CAMS
When alarm is activated:Received alarm
message
Contact recall
Is recall contactable
?CAM operator tries to contact recall up
to 3 attempts
SMS notification send to recall Follow up action taken next working day.
Inform recall about alarm activated
Update monitoring software
Resume monitoring
CAMS
Perimeter Security Intrusion Detection Example
Active Infrared detector
• Infrared sensor detects intrusion.• Signal is analyzed by sensor processor
• Once signal is confirmed to be intrusion attempt, an alarm is generated.• Command post is alerted.
•Response force activated
CAMS
System Hardware automatically processes normal and activated signals to
be recorded, maintained and supervised. Consists
Computer Server Printer Voice recorder Telephone with headset Phone system (hotline/normal) CAMS receiver
CAMS receiver
CAMS
System Software Manages incoming Digital Time Multiplexing Frequency (DTMF)
signals from dialers via the receiver. Uses central database as part of its management processes. Every alarm event and corresponding operator action within
CAMS is logged for later inspection.
CAMS
CAMS operators At least two trained operators at all times. Trained staff is to monitor its customer’s security systems
and call the appropriate authorities in the event an alarm signal is received
CAMS
Alarm signals transmission media Communication media alarm signals are transmitted
from the protected area and received by the CAMS
Types of Communication link Connections Leased line (dedicated
line) Public Switched Telephone
Network (PSTN) Internet Protocol-based
(IP-based) Wireless
CAMS
Leased Line• provides for the connection of a single alarm receiving unit at the
central alarm monitoring station
PSTN• does not have a telephone number,• each side of the line being permanently connected to each other
IP-based• interconnected computer networks that transmit data by packet
switching using IP addresses.
Wireless• Without the use of a “hard wired” connection• Example: Radio Frequency (RF), GSM,GPRS
CAMS
Alarm Monitor signals Alarm signals from the protected areas
are received at the CAMS for identification and how they are handled.
Types of Alarm Signals:- Personal attack hold up, duress or keypad
panic alarm Intrusion alarm signals Intrusion alarm received when system is
disarmed. Telephone line fault signal (after hours). Telephone line fault signal ( office hours) AC power fail and low battery signal
CAMS
Personal Attack hold up/ Duress/ keypad panic alarm signal:- Police is immediately dispatched. In event of accidental operation, name and
secret password of the RO are verified. Cannot be cancelled if police have been notified
Intrusion Alarm signals:- Telephone call from the CAMS is made to
premises to verify false activation. If correct password is given, police patrol is not
dispatched Police despatched when no response from
premise (phone calls, wrong password)
CAMS
Intrusion alarm signal received when system is disarmed Call premises to verify false activation and name of person answering
call is recorded for verification. RO to return call within stipulated time. Dispatch Police when there is no response from premises after
stipulated attempted telephone calls or wrong secret password is provided and the RO is notified.
AC power fail and low battery signal Telephone call is made during office hours to inform RO of signal
received. Telephone call is made after office hours to inform RO to check
premises with password verified if latter does not wish to check premises.
Follow-up action is specified according to established organizational procedures.
CAMS
False Alarms alarm signal transmitted in the absence of a
real alarm condition.Causes of False Alarms:-
Environmental User error Equipments malfunction, failure
Consequence of frequent false alarms:- Penalty charges (up to $300 per false alarm)
from local authorities Slower response time in the future from
emergency personnel
CAMS
Monitoring Report Format
Incident Report Format
CAMS
• Work on the Review Questions ( on Page 136)
top related