190 likes | 328 Views
EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS. Prepared by Sandy Tay. Lesson Objectives. CAMS. Reception Analysis Handling Archiving. Hardware Software. Leased line PSTN IP Wireless. Panic Intrusion Telephone line fault AC power fail. CAMS.
E N D
EC4019PAIntrusion & Access Control Technology (IACT)Chapter 4- CAMS Prepared by Sandy Tay
Lesson Objectives CAMS • Reception • Analysis • Handling • Archiving • Hardware • Software • Leased line • PSTN • IP • Wireless • Panic • Intrusion • Telephone line fault • AC power fail
CAMS • Allows controlling and monitoring a multiple site installation. • Classified as: • Commercial (Centralized) • Proprietary (Localized) • Provides services to monitor subscribers’ alarm systems from burglar, fire and residential alarm systems.
CAMS • What is Central Alarm Monitoring • provides services to monitor subscribers’ alarm systems from burglar, fire and residential alarm systems and provides specific responses • Why need Central Alarm monitoring • Have a peace of mind • Your home or business is protected 24 hours, every day, personally and without delay. • Efficiency handling of security information
CAMS • Processes • Reception • Analysis • Handling • Archiving
CAMS When alarm is activated: Received alarm message Contact recall Is recall contactable? CAM operator tries to contact recall up to 3 attempts SMS notification send to recall Follow up action taken next working day. Inform recall about alarm activated Update monitoring software Resume monitoring
CAMS Perimeter Security Intrusion Detection Example • Infrared sensor detects intrusion. • Signal is analyzed by sensor processor Active Infrared detector • Once signal is confirmed to be intrusion attempt, an alarm is generated. • Command post is alerted. • Response force activated
CAMS • System Hardware • automatically processes normal and activated signals to be recorded, maintained and supervised. • Consists • Computer • Server • Printer • Voice recorder • Telephone with headset • Phone system (hotline/normal) • CAMS receiver • CAMS receiver
CAMS • System Software • Manages incoming Digital Time Multiplexing Frequency (DTMF) signals from dialers via the receiver. • Uses central database as part of its management processes. • Every alarm event and corresponding operator action within CAMS is logged for later inspection.
CAMS • CAMS operators • At least two trained operators at all times. • Trained staff is to monitor its customer’s security systems and call the appropriate authorities in the event an alarm signal is received
CAMS • Alarm signals transmission media • Communication media • alarm signals are transmitted from the protected area and received by the CAMS • Types of Communication link Connections • Leased line (dedicated line) • Public Switched Telephone Network (PSTN) • Internet Protocol-based (IP-based) • Wireless
CAMS • Alarm Monitor signals • Alarm signals from the protected areas are received at the CAMS for identification and how they are handled. • Types of Alarm Signals:- • Personal attack hold up, duress or keypad panic alarm • Intrusion alarm signals • Intrusion alarm received when system is disarmed. • Telephone line fault signal (after hours). • Telephone line fault signal ( office hours) • AC power fail and low battery signal
CAMS • Personal Attack hold up/ Duress/ keypad panic alarm signal:- • Police is immediately dispatched. • In event of accidental operation, name and secret password of the RO are verified. • Cannot be cancelled if police have been notified • Intrusion Alarm signals:- • Telephone call from the CAMS is made to premises to verify false activation. • If correct password is given, police patrol is not dispatched • Police despatched when no response from premise (phone calls, wrong password)
CAMS • Intrusion alarm signal received when system is disarmed • Call premises to verify false activation and name of person answering call is recorded for verification. RO to return call within stipulated time. • Dispatch Police when there is no response from premises after stipulated attempted telephone calls or wrong secret password is provided and the RO is notified. • AC power fail and low battery signal • Telephone call is made during office hours to inform RO of signal received. • Telephone call is made after office hours to inform RO to check premises with password verified if latter does not wish to check premises. • Follow-up action is specified according to established organizational procedures.
CAMS • False Alarms • alarm signal transmitted in the absence of a real alarm condition. • Causes of False Alarms:- • Environmental • User error • Equipments malfunction, failure • Consequence of frequent false alarms:- • Penalty charges (up to $300 per false alarm) from local authorities • Slower response time in the future from emergency personnel
CAMS Monitoring Report Format Incident Report Format
CAMS • Work on the Review Questions ( on Page 136)