Вы находитесь на странице: 1из 23

MNS1543: ACCESS CONTROL & PERIMETER PROTECTION

MANS1543: GROUP ASSIGNMENT 1 VIDEO ON THE ACCESS CONTROL AND PERIMETER PROTECTION

PREPARED BY DZUL HAKIM BIN GHAZALI MUHAMMAD IEDIL BIN AHMAT JALALUDDIN HAIRUNNAZRI BIN HARON MN131025 MN131036 MN131017

LECTURER PUAN HAFIZA ABAS GROUP ASSIGNMENT VIDEO

List of Figure Page Number Figure 1: How Optical Fiber Perimeter Intrusion Detection System Works [4] Figure 2 : How microwave detection coverage works [5] Figure 3: SIOUX - fence mounted perimeter intrusion detection system [1] Figure 4: ERMO 482X PRO Signal Monitoring [1] 4 4 5 6

Figure 5: MURENA Remote control digital microwave transceiver based on fuzzy logic analysis [1] Figure 6: PYTHAGORAS Intelligent barrier designed with multiple technologies [1] Figure 7: NEWTON PLUS Patented active hybrid infrared barrier [1]. 7 8 9

(a) What is the objective of the video?

The objective of the first video is to give an insight on how perimeter protection devices can be implemented to protect and secure organizations or residential from any intrusions [1]. Whereas the second video is to highlight the latest updates of access control solution in biometric technology which is using face recognition method. Using the surveillance system, the security personnel or front office staff may identify and detect in advance prior the uninvited guest approaching them and they will standby to act accordingly [2]. The third video is to illustrate of how IP video management can enhance surveillance and become a physical security information management platform [3].

(b) What has actually changed in terms of access control or perimeter protection? Hint: Highlight in terms of technologies, procedures and enforcement.

Generally access control will applied the following: i. ii. iii. Something you know Username, Password and Pass-phase Something you own - Access card, token. Something you are Biometric Thumbprint, Palm print, Iris, Retina, face recognition.

Previously, the biometric technology applied in the access control solution which not including perimeter protection. For example, thumbprint scanner or retina scanner installed at the entrance and the possibility of strangers to get in to the premises is quite high. It allows stranger or uninvited guest to tailgate somebody that have an access to the premises.

Traditionally, perimeter protection is achieved by having security personnel to guard a secured area. As the world evolve so did perimeter security technique. This video illustrate an enhanced a perimeter protection through the use of an IP video and integration of multiple detection and alerting resources. For instance, access control system, video content analytics, emergency call boxes, contact closure devices, transaction and POS, license plate recognition, radiation and hazmat detectors, and audio detectors [3]. Through the implementation of the above security

measure, an agency will have wider range of surveillance which cannot cover by mere security personnel.

In term of technologies [1]: Provide an excellent identification of target and its classification. Improvised in monitoring as any significant event is recorded and back-up. Reduces number of false alarm by differentiating detection made by intruders or by nature or by other factors. Improvement in detecting intruders in various ways. Protect security devices from being manipulated. Allowing complete remote troubleshooting from anywhere in the world. Enhancement of security devices to be able to perform well in difficult weather and difference environmental conditions. Improvised the roles of fences and barriers.

In term of procedures [1]: Elimination of security guards to secure the perimeter. The procedures for human response to the intruders will be based on the alarm that receives signal from the sensor.

In term of Enforcement [1]: Enforcement are much wider, broader, detail and accurate compared to the traditional enforcement which solely depend on the human actions and low technology devices; Due to the changes in enforcement, the possibilities of breaches are low as buildings are secured and well-guarded by the high technologies devices and systems;

(c) Provide and briefly describe the latest technologies that significantly augment access control and perimeter protection.

Few technologies have been developed to address the issue of perimeter security namely Optical Fiber Perimeter Intrusion Detection System and Perimeter security through the use of microwave, Infrared, Triple technology barriers, and based on fuzzy logic behavior models.

Optical Fiber Perimeter Intrusion Detection System makes use of optical fiber to detect any intrusion to the perimeter. This system will apply several peripherals to achieve its goal namely Laser Diode (LD), Photo Diode (PD), Optical Coupler and Sensor Fiber ring. Under normal conditions for instance, no vibration detected, the interference light strength is stable. When a vibration - for instance, an intrusion was detected by optical fiber, the strength of the interference light fluctuates. This cause the emitted light arrives with some difference in timely manner. The interference will be captured by a photo diode (PD). [4]. Figure 1 illustrates the Optical Fiber Perimeter Intrusion Detection System.

Perimeter security through the use of microwave, on the other hand makes use of microwave to detect any activity around the surveillance area. Microwave detectors are able to be configured in such way to have several different coverage patterns, namely wide beams or narrow beams. These detectors must be aligned and adjusted to mitigate the possibilities of false alarms. Some locations are not suited for microwave technology namely exterior locations with frequent rain, snow, and fog [5]. Figure 2 illustrates perimeter security through the use of microwave.

Figure 3: How Optical Fiber Perimeter Intrusion Detection System Works [4]
4

Figure 4 : How microwave detection coverage works [5]

With the experience from 1974, the company has developed products for perimeter protection using the latest technology which really helped in access control and perimeter technologies in this era. It uses several products to create a different layer to detect an intruder from getting into the restricted area with configuration, monitoring and management system in order to apply immediate actions. The technologies used can intelligently discriminating a real intruder with some other factor (e.g. weather, environmental disturbances) to reduce the false alarm rate [1].

Technology used: Microwave Infrared Triple technology barriers Based on fuzzy logic behaviour models

Products: Even the company provides their several products for complete solution, but it is not necessarily that any organization or user needs to buy all products for their perimeter protection. There are

products that can be used as standalone protection based on requirement and environment in the organization or residential for their protected area [1]. SIOUX Innovative fence mounted perimeter intrusion detection system, the result of a research project conducted in collaboration with the Milan Polytechnic, which has resulted in the joint filing of 3 patents [1].

Figure 3: SIOUX - fence mounted perimeter intrusion detection system [1]

Fence mounted detection system based on 3D mems sensors. Pin-point location with 1 meter resolution. Up to 20 zones every 700M. Full IP system

ERMO 482X PRO Monitors the signal, comparing it with behaviour models using algorithms based on fuzzy logic to decide if the signal was created by a real intruder or other factor. This kind of sensor is able to detect intruders walking, running, crawling, or rolling [1].

Figure 4: ERMO 482X PRO Signal Monitoring [1] Digital analysis using fuzzy logic FBM (Fuzzy Behaviour Models). Wide range of frequencies on X and K band. Remote configuration, monitoring and management. Resistant to extreme weather conditions

MURENA Remotely control digital microwave transceiver based on fuzzy logic analysis. It is capable of detecting distance, dimension, and direction of the target, making a real intruder much more distinguishable from environmental disturbances [1].

Figure 5: MURENA Remote control digital microwave transceiver based on fuzzy logic analysis [1]
7

Dual frequency transceiver. Smart pet immunity. Remote configuration, monitoring and management. Special controls for selection of analysed area. Range cut-off definition. Smart anti-masking system.

PYTHAGORAS Intelligent barrier designed with multiple technologies, and it is based on digital fuzzy logic analysis. The different technologies used allow the barrier to adapt to the size of the corridor to be protected avoiding disturbances from fences or vegetation and eliminating the limits that the barrier technologies when used individually may have [1].

Figure 6: PYTHAGORAS Intelligent barrier designed with multiple technologies [1]

Digital microwave barrier together with active infrared beams and dopplers 8 different fuzzy logic scenarios Built in system for easy alignment, setup and test Built in anti-climbing system Innovative front cover opening Remote commissioning, monitoring and management

NEWTON PLUS Patented active hybrid infrared barrier. Comprising hybrid transmitter receiver optics which are provided with a double control AGC. Capable of compensating any variation in the incoming signals to ensure uninterrupted operation of the barrier. This signal processing discriminates against external phenomena like weather from real intrusion attempts, significant reducing unwanted alarms [1].

Figure 7 : NEWTON PLUS Patented active hybrid infrared barrier [1].

Built in system for easy alignment, setup and test Double automatic gain control Dual interlaced scanning technology Innovative front cover opening No sync cable needed Advanced configuration via PC

(d) Protection is in concentric circles from the outside-in. Elaborate and suggests the security plan in mitigating possible attacks.

At present, surveillance system is the most efficient system to detect and prevent from any threats or intrusion. It was equipped with face recognition features to identify in real-time to any human approach thus provides a proactive identification to the unknown guest [7].

The features that can be used these solutions are [7]: Real time faces detection, template extraction and matching against watchlist database. Simultaneous multiple face tracking in live video. Gender classification, smile, open-mouth, closed-eyes and glasses detection. Automatic operation allows to log and report face appearance, match and disappearance events, as well as to enroll new faces from video stream and add them to watchlist automatically. Large surveillance systems support by connecting several cameras to a computer and quick synchronization between networked computers.

Nevertheless, protection on the physical compartment or building is the first layer towards security. Follow up on the physical device or peripherals and next on the logical which referring to the configuration of the device and peripherals regardless of network devices, server or other peripherals. In order to achieve the above, one need to have a security plan in order to mitigate the risk of being penetrate and having compromise. According to [6], there is need of established a risk management framework which include namely, define system, conduct vulnerability assessment, assessing and mitigating risk analyze impact, risk levels, and mitigating risk with security controls, address people and policy risks.

i.

Define system a. One must define what system that needs to be protected. In real situation these

systems are critical to the production of a company in which should the system penetrated and compromised would bring loss to the company. ii. Conduct vulnerability assessment a. Once these systems have been identified, these systems will undergo vulnerability

assessment. The assessment can be either being conduct internally or externally. By internally referring to that company staff and externally would refer to the outsourcing to other vendor. iii. Assessing and mitigating risk a. The assessment will be analyzed to leverage the level of its security. The proper

action will be taken namely what access control should be applied to the system to
10

enhance its level of security. There are several few key points that can be considered to implement access control namely something you know, something you had and something you are.

iv.

Address people and policy risk a. Once the systems have been given proper level of security, there are needs of

giving the right personnel to have certain level of access to the system. For instance, an administrator of a system should have full access to system and a user of a system should have a limited of access. b. A security policy also need to created and properly documented. The policy is to

be conducted and all staff needs to comply with the policy to have better management purposes as well as for security purposes. Staff will later need to undergo proper training to have security awareness.

Reference

[1] http://www.cias.it/en/products/perimeter-protection/ [2] http://www.youtube.com/watch?v=mdhvRNYX0PI [3] http://www.youtube.com/watch?v=53CJc9BWgio [4] AFL Telecommunication LLC. (2010). FIBER SECURITY : Optical Fiber Perimeter Intrusion Detection System. Available:

http://www.astrec.com/uploads/5/9/7/1/5971541/afl_fibersecurity.pdf. Last accessed 26th Oct 2013. [5] SimplexGrinnell LP. (2013). Perimeter Intrusion Protection. Available: Last

http://www.simplexgrinnell.com/SiteCollectionDocuments/Training/PACEBook5.pdf. accessed 26th Oct 2013.

[6] Evgeny Lebanidze. (2011). Guide to Developing a Cyber Security and Risk Mitigation Plan . Available:http://www.smartgrid.gov/sites/default/files/doc/files/CyberSecurityGuideforanElectri cCooperativeV11-2%5B1%5D.pdf. Last accessed 26th Oct 2013. [7] NEUROTECHNOLOGY. (1998-2013). VeriLook Surveillance SDK. Available:

http://www.neurotechnology.com/verilook-surveillance.html. Last accessed 26th Oct 2013.


11

APPEDIX Group Task List:

1) Upon group discussion, every group member finds their own video and answer the assignment question. 2) All group members sit down and compile the assignment together. 3) Hakim will proof read the assignment. 4) Nazri will combine the each video. 5) Iedil will perform presentation.

12

MANS1543: GROUP ASSIGNMENT 1 VIDEO ON THE ACCESS CONTROL AND PERIMETER PROTECTION
Group 5: 1. Dzul Hakim Bin Ghazali (MN131025) 2. Muhammad Iedil Bin Ahmat Jalaluddin (MN131036) 3. Hairunnazri Bin Haron (MN131017)

(a) What is the objective of the video?


to give an insight on how perimeter protection devices can be implemented to identify and detect in advance prior the uninvited guest approaching to illustrate of how IP video management can enhance surveillance.

(b) What has actually changed in terms of access control or perimeter protection? Hint: Highlight in terms of technologies, procedures and enforcement.

Generally access control will applied the following:


Something you know Username, Password and Pass-phase Something you own - Access card, token. Something you are Biometric Thumbprint, Palm print, Iris, Retina, face recognition.

(b) What has actually changed in terms of access control or perimeter protection? Hint: Highlight in terms of technologies, procedures and enforcement.

In term of technologies [1]:


Provide an excellent identification of target and its classification. Improvised in monitoring as any significant event is recorded and back-up. Reduces number of false alarm by differentiating detection made by intruders or by nature or by other factors. Improvement in detecting intruders in various ways.

(b) What has actually changed in terms of access control or perimeter protection? Hint: Highlight in terms of technologies, procedures and enforcement.

In term of procedures [1]:


Elimination of security guards to secure the perimeter. The procedures for human response to the intruders will be based on the alarm that receives signal from the sensor.

(b) What has actually changed in terms of access control or perimeter protection? Hint: Highlight in terms of technologies, procedures and enforcement.

In term of Enforcement [1]:


Enforcement are much wider, broader, detail and accurate compared to the traditional enforcement which solely depend on the human actions and low technology devices; Due to the changes in enforcement, the possibilities of breaches are low as buildings are secured and well-guarded by the high technologies devices and systems;

(c) Provide and briefly describe the latest technologies that significantly augment access control and perimeter protection.

Perimeter security through the use of


Optical Fiber microwave, Infrared, Triple technology barriers, and based on fuzzy logic behavior models.

(c) Provide and briefly describe the latest technologies that significantly augment access control and perimeter protection.

Figure 3: How Optical Fiber Perimeter Intrusion Detection System Works [4]

(c) Provide and briefly describe the latest technologies that significantly augment access control and perimeter protection.

Figure 4 : How microwave detection coverage works [5]

(d) Protection is in concentric circles from the outside-in. Elaborate and suggests the security plan in mitigating possible attacks.

Established a risk management framework which


define system, conduct vulnerability assessment, assessing and mitigating risk
analyze impact, risk levels, mitigating risk with security controls,

address people and policy risks.

Вам также может понравиться