IACT 901 Module 12 1 Planning, People SITACS University of Wollongong IACT 901 2004.
EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.
-
Upload
elfreda-dickerson -
Category
Documents
-
view
213 -
download
0
Transcript of EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.
![Page 1: EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.](https://reader030.fdocuments.in/reader030/viewer/2022032600/56649dc95503460f94abfeda/html5/thumbnails/1.jpg)
EC4019PAIntrusion & Access Control Technology (IACT)
Chapter 4- CAMSPrepared by Sandy Tay
![Page 2: EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.](https://reader030.fdocuments.in/reader030/viewer/2022032600/56649dc95503460f94abfeda/html5/thumbnails/2.jpg)
Lesson Objectives
CAMS
Processes
System
Transmission media
Alarm signals
• Reception• Analysis• Handling• Archiving
• Hardware• Software
• Leased line• PSTN• IP• Wireless
• Panic• Intrusion• Telephone line fault• AC power fail
![Page 3: EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.](https://reader030.fdocuments.in/reader030/viewer/2022032600/56649dc95503460f94abfeda/html5/thumbnails/3.jpg)
CAMS
Allows controlling and monitoring a multiple site installation.
Classified as: Commercial (Centralized) Proprietary (Localized)
Provides services to monitor subscribers’ alarm systems from burglar, fire and residential alarm systems.
![Page 4: EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.](https://reader030.fdocuments.in/reader030/viewer/2022032600/56649dc95503460f94abfeda/html5/thumbnails/4.jpg)
CAMS
No Commercial (centralized) CAMS
Proprietary (Localized)
1 Remotely located from theFacility
Located within or near on-sitefacility
2 Operated for a profit Owned and operated to provideSecurity requirements of the owner’s facility
![Page 5: EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.](https://reader030.fdocuments.in/reader030/viewer/2022032600/56649dc95503460f94abfeda/html5/thumbnails/5.jpg)
CAMS
What is Central Alarm Monitoring provides services to monitor subscribers’ alarm systems
from burglar, fire and residential alarm systems and provides specific responses
Why need Central Alarm monitoring Have a peace of mind Your home or business is protected 24 hours, every day, personally
and without delay. Efficiency handling of security information
![Page 6: EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.](https://reader030.fdocuments.in/reader030/viewer/2022032600/56649dc95503460f94abfeda/html5/thumbnails/6.jpg)
CAMS
Processes Reception Analysis Handling Archiving
![Page 7: EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.](https://reader030.fdocuments.in/reader030/viewer/2022032600/56649dc95503460f94abfeda/html5/thumbnails/7.jpg)
CAMS
When alarm is activated:Received alarm
message
Contact recall
Is recall contactable
?CAM operator tries to contact recall up
to 3 attempts
SMS notification send to recall Follow up action taken next working day.
Inform recall about alarm activated
Update monitoring software
Resume monitoring
![Page 8: EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.](https://reader030.fdocuments.in/reader030/viewer/2022032600/56649dc95503460f94abfeda/html5/thumbnails/8.jpg)
CAMS
Perimeter Security Intrusion Detection Example
Active Infrared detector
• Infrared sensor detects intrusion.• Signal is analyzed by sensor processor
• Once signal is confirmed to be intrusion attempt, an alarm is generated.• Command post is alerted.
•Response force activated
![Page 9: EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.](https://reader030.fdocuments.in/reader030/viewer/2022032600/56649dc95503460f94abfeda/html5/thumbnails/9.jpg)
CAMS
System Hardware automatically processes normal and activated signals to
be recorded, maintained and supervised. Consists
Computer Server Printer Voice recorder Telephone with headset Phone system (hotline/normal) CAMS receiver
CAMS receiver
![Page 10: EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.](https://reader030.fdocuments.in/reader030/viewer/2022032600/56649dc95503460f94abfeda/html5/thumbnails/10.jpg)
CAMS
System Software Manages incoming Digital Time Multiplexing Frequency (DTMF)
signals from dialers via the receiver. Uses central database as part of its management processes. Every alarm event and corresponding operator action within
CAMS is logged for later inspection.
![Page 11: EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.](https://reader030.fdocuments.in/reader030/viewer/2022032600/56649dc95503460f94abfeda/html5/thumbnails/11.jpg)
CAMS
CAMS operators At least two trained operators at all times. Trained staff is to monitor its customer’s security systems
and call the appropriate authorities in the event an alarm signal is received
![Page 12: EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.](https://reader030.fdocuments.in/reader030/viewer/2022032600/56649dc95503460f94abfeda/html5/thumbnails/12.jpg)
CAMS
Alarm signals transmission media Communication media alarm signals are transmitted
from the protected area and received by the CAMS
Types of Communication link Connections Leased line (dedicated
line) Public Switched Telephone
Network (PSTN) Internet Protocol-based
(IP-based) Wireless
![Page 13: EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.](https://reader030.fdocuments.in/reader030/viewer/2022032600/56649dc95503460f94abfeda/html5/thumbnails/13.jpg)
CAMS
Leased Line• provides for the connection of a single alarm receiving unit at the
central alarm monitoring station
PSTN• does not have a telephone number,• each side of the line being permanently connected to each other
IP-based• interconnected computer networks that transmit data by packet
switching using IP addresses.
Wireless• Without the use of a “hard wired” connection• Example: Radio Frequency (RF), GSM,GPRS
![Page 14: EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.](https://reader030.fdocuments.in/reader030/viewer/2022032600/56649dc95503460f94abfeda/html5/thumbnails/14.jpg)
CAMS
Alarm Monitor signals Alarm signals from the protected areas
are received at the CAMS for identification and how they are handled.
Types of Alarm Signals:- Personal attack hold up, duress or keypad
panic alarm Intrusion alarm signals Intrusion alarm received when system is
disarmed. Telephone line fault signal (after hours). Telephone line fault signal ( office hours) AC power fail and low battery signal
![Page 15: EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.](https://reader030.fdocuments.in/reader030/viewer/2022032600/56649dc95503460f94abfeda/html5/thumbnails/15.jpg)
CAMS
Personal Attack hold up/ Duress/ keypad panic alarm signal:- Police is immediately dispatched. In event of accidental operation, name and
secret password of the RO are verified. Cannot be cancelled if police have been notified
Intrusion Alarm signals:- Telephone call from the CAMS is made to
premises to verify false activation. If correct password is given, police patrol is not
dispatched Police despatched when no response from
premise (phone calls, wrong password)
![Page 16: EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.](https://reader030.fdocuments.in/reader030/viewer/2022032600/56649dc95503460f94abfeda/html5/thumbnails/16.jpg)
CAMS
Intrusion alarm signal received when system is disarmed Call premises to verify false activation and name of person answering
call is recorded for verification. RO to return call within stipulated time. Dispatch Police when there is no response from premises after
stipulated attempted telephone calls or wrong secret password is provided and the RO is notified.
AC power fail and low battery signal Telephone call is made during office hours to inform RO of signal
received. Telephone call is made after office hours to inform RO to check
premises with password verified if latter does not wish to check premises.
Follow-up action is specified according to established organizational procedures.
![Page 17: EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.](https://reader030.fdocuments.in/reader030/viewer/2022032600/56649dc95503460f94abfeda/html5/thumbnails/17.jpg)
CAMS
False Alarms alarm signal transmitted in the absence of a
real alarm condition.Causes of False Alarms:-
Environmental User error Equipments malfunction, failure
Consequence of frequent false alarms:- Penalty charges (up to $300 per false alarm)
from local authorities Slower response time in the future from
emergency personnel
![Page 18: EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.](https://reader030.fdocuments.in/reader030/viewer/2022032600/56649dc95503460f94abfeda/html5/thumbnails/18.jpg)
CAMS
Monitoring Report Format
Incident Report Format
![Page 19: EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.](https://reader030.fdocuments.in/reader030/viewer/2022032600/56649dc95503460f94abfeda/html5/thumbnails/19.jpg)
CAMS
• Work on the Review Questions ( on Page 136)