EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.

19
EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay

Transcript of EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.

Page 1: EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.

EC4019PAIntrusion & Access Control Technology (IACT)

Chapter 4- CAMSPrepared by Sandy Tay

Page 2: EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.

Lesson Objectives

CAMS

Processes

System

Transmission media

Alarm signals

• Reception• Analysis• Handling• Archiving

• Hardware• Software

• Leased line• PSTN• IP• Wireless

• Panic• Intrusion• Telephone line fault• AC power fail

Page 3: EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.

CAMS

Allows controlling and monitoring a multiple site installation.

Classified as: Commercial (Centralized) Proprietary (Localized)

Provides services to monitor subscribers’ alarm systems from burglar, fire and residential alarm systems.

Page 4: EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.

CAMS

No Commercial (centralized) CAMS

Proprietary (Localized)

1 Remotely located from theFacility

Located within or near on-sitefacility

2 Operated for a profit Owned and operated to provideSecurity requirements of the owner’s facility

Page 5: EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.

CAMS

What is Central Alarm Monitoring provides services to monitor subscribers’ alarm systems

from burglar, fire and residential alarm systems and provides specific responses

Why need Central Alarm monitoring Have a peace of mind Your home or business is protected 24 hours, every day, personally

and without delay. Efficiency handling of security information

Page 6: EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.

CAMS

Processes Reception Analysis Handling Archiving

Page 7: EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.

CAMS

When alarm is activated:Received alarm

message

Contact recall

Is recall contactable

?CAM operator tries to contact recall up

to 3 attempts

SMS notification send to recall Follow up action taken next working day.

Inform recall about alarm activated

Update monitoring software

Resume monitoring

Page 8: EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.

CAMS

Perimeter Security Intrusion Detection Example

Active Infrared detector

• Infrared sensor detects intrusion.• Signal is analyzed by sensor processor

• Once signal is confirmed to be intrusion attempt, an alarm is generated.• Command post is alerted.

•Response force activated

Page 9: EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.

CAMS

System Hardware automatically processes normal and activated signals to

be recorded, maintained and supervised. Consists

Computer Server Printer Voice recorder Telephone with headset Phone system (hotline/normal) CAMS receiver

CAMS receiver

Page 10: EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.

CAMS

System Software Manages incoming Digital Time Multiplexing Frequency (DTMF)

signals from dialers via the receiver. Uses central database as part of its management processes. Every alarm event and corresponding operator action within

CAMS is logged for later inspection.

Page 11: EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.

CAMS

CAMS operators At least two trained operators at all times. Trained staff is to monitor its customer’s security systems

and call the appropriate authorities in the event an alarm signal is received

Page 12: EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.

CAMS

Alarm signals transmission media Communication media alarm signals are transmitted

from the protected area and received by the CAMS

Types of Communication link Connections Leased line (dedicated

line) Public Switched Telephone

Network (PSTN) Internet Protocol-based

(IP-based) Wireless

Page 13: EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.

CAMS

Leased Line• provides for the connection of a single alarm receiving unit at the

central alarm monitoring station

PSTN• does not have a telephone number,• each side of the line being permanently connected to each other

IP-based• interconnected computer networks that transmit data by packet

switching using IP addresses.

Wireless• Without the use of a “hard wired” connection• Example: Radio Frequency (RF), GSM,GPRS

Page 14: EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.

CAMS

Alarm Monitor signals Alarm signals from the protected areas

are received at the CAMS for identification and how they are handled.

Types of Alarm Signals:- Personal attack hold up, duress or keypad

panic alarm Intrusion alarm signals Intrusion alarm received when system is

disarmed. Telephone line fault signal (after hours). Telephone line fault signal ( office hours) AC power fail and low battery signal

Page 15: EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.

CAMS

Personal Attack hold up/ Duress/ keypad panic alarm signal:- Police is immediately dispatched. In event of accidental operation, name and

secret password of the RO are verified. Cannot be cancelled if police have been notified

Intrusion Alarm signals:- Telephone call from the CAMS is made to

premises to verify false activation. If correct password is given, police patrol is not

dispatched Police despatched when no response from

premise (phone calls, wrong password)

Page 16: EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.

CAMS

Intrusion alarm signal received when system is disarmed Call premises to verify false activation and name of person answering

call is recorded for verification. RO to return call within stipulated time. Dispatch Police when there is no response from premises after

stipulated attempted telephone calls or wrong secret password is provided and the RO is notified.

AC power fail and low battery signal Telephone call is made during office hours to inform RO of signal

received. Telephone call is made after office hours to inform RO to check

premises with password verified if latter does not wish to check premises.

Follow-up action is specified according to established organizational procedures.

Page 17: EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.

CAMS

False Alarms alarm signal transmitted in the absence of a

real alarm condition.Causes of False Alarms:-

Environmental User error Equipments malfunction, failure

Consequence of frequent false alarms:- Penalty charges (up to $300 per false alarm)

from local authorities Slower response time in the future from

emergency personnel

Page 18: EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.

CAMS

Monitoring Report Format

Incident Report Format

Page 19: EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.

CAMS

• Work on the Review Questions ( on Page 136)