access control & perimeter protection

Upload: hafiza-abas

Post on 03-Jun-2018

219 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION

    1/23

    MNS1543: ACCESS CONTROL & PERIMETER

    PROTECTION

    MANS1543: GROUP ASSIGNMENT 1 VIDEO ON THE ACCESS CONTROL AND

    PERIMETER PROTECTION

  • 8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION

    2/23

    List of Figure

    Page Number

    Figure 1: How Optical Fiber Perimeter Intrusion Detection System Works [4] 4

    Figure 2 : How microwave detection coverage works [5] 4

    Figure 3: SIOUX - fence mounted perimeter intrusion detection system [1] 5

    Figure 4: ERMO 482X PROSignal Monitoring [1] 6

    Figure 5: MURENA Remote control digital microwave transceiver based on fuzzy logic

    analysis [1] 7

    Figure 6: PYTHAGORASIntelligent barrier designed with multiple technologies [1] 8

    Figure 7: NEWTON PLUSPatented active hybrid infrared barrier [1]. 9

  • 8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION

    3/23

    (a) What is the objective of the video?

    The objective of the first video is to give an insight on how perimeter protection devices can be

    implemented to protect and secure organizations or residential from any intrusions [1]. Whereas

    the second video is to highlight the latest updates of access control solution in biometric

    technology which is using face recognition method. Using the surveillance system, the security

    personnel or front office staff may identify and detect in advance prior the uninvited guest

    approaching them and they will standby to act accordingly [2]. The third video is to illustrate of

    how IP video management can enhance surveillance and become a physical security information

    management platform [3].

    (b) What has actually changed in terms of access control or perimeter protection? Hint:

    Highlight in terms of technologies, procedures and enforcement.

    Generally access control will applied the following:

    i. Something you knowUsername, Password and Pass-phaseii. Something you own - Access card, token.

    iii. Something you areBiometricThumbprint, Palm print, Iris, Retina, face recognition.

  • 8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION

    4/23

    measure, an agency will have wider range of surveillance which cannot cover by mere security

    personnel.

    In term of technologies [1]:

    Provide an excellent identification of target and its classification. Improvised in monitoring as any significant event is recorded and back-up. Reduces number of false alarm by differentiating detection made by intruders or by

    nature or by other factors.

    Improvement in detecting intruders in various ways. Protect security devices from being manipulated. Allowing complete remote troubleshooting from anywhere in the world. Enhancement of security devices to be able to perform well in difficult weather and

    difference environmental conditions.

    Improvised the roles of fences and barriers.

    In term of procedures [1]:

    Elimination of security guards to secure the perimeter. The procedures for human response to the intruders will be based on the alarm that

    receives signal from the sensor

  • 8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION

    5/23

    (c) Provide and briefly describe the latest technologies that significantly augment access

    control and perimeter protection.

    Few technologies have been developed to address the issue of perimeter security namely Optical

    Fiber Perimeter Intrusion Detection System and Perimeter security through the use of

    microwave, Infrared, Triple technology barriers, and based on fuzzy logic behavior models.

    Optical Fiber Perimeter Intrusion Detection System makes use of optical fiber to detect any

    intrusion to the perimeter. This system will apply several peripherals to achieve its goal namely

    Laser Diode (LD), Photo Diode (PD), Optical Coupler and Sensor Fiber ring. Under normal

    conditionsfor instance, no vibration detected, the interference light strength is stable. When a

    vibration - for instance, an intrusion was detected by optical fiber, the strength of the interference

    light fluctuates. This cause the emitted light arrives with some difference in timely manner. The

    interference will be captured by a photo diode (PD). [4]. Figure 1 illustrates the Optical Fiber

    Perimeter Intrusion Detection System.

    Perimeter security through the use of microwave, on the other hand makes use of microwave to

    detect any activity around the surveillance area. Microwave detectors are able to be configured in

    such way to have several different coverage patterns, namely wide beams or narrow beams.

  • 8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION

    6/23

    Figure 4 : How microwave detection coverage works [5]

    With the experience from 1974, the company has developed products for perimeter protection

    using the latest technology which really helped in access control and perimeter technologies in

    this era. It uses several products to create a different layer to detect an intruder from getting into

    the restricted area with configuration, monitoring and management system in order to applyimmediate actions. The technologies used can intelligently discriminating a real intruder with

  • 8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION

    7/23

    products that can be used as standalone protection based on requirement and environment in the

    organization or residential for their protected area [1].

    SIOUXInnovative fence mounted perimeter intrusion detection system, the result of a research

    project conducted in collaboration with the Milan Polytechnic, which has resulted in the joint

    filing of 3 patents [1].

    Figure 3: SIOUX - fence mounted perimeter intrusion detection system [1]

    Fence mounted detection system based on 3D mems sensors.

  • 8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION

    8/23

    Figure 4: ERMO 482X PROSignal Monitoring [1]

    Digital analysis using fuzzy logicFBM (Fuzzy Behaviour Models). Wide range of frequencies on X and K band. Remote configuration, monitoring and management. Resistant to extreme weather conditions

    MURENARemotely control digital microwave transceiver based on fuzzy logic analysis. It is

    capable of detecting distance, dimension, and direction of the target, making a real intruder much

    more distinguishable from environmental disturbances [1].

  • 8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION

    9/23

    Dual frequency transceiver. Smart pet immunity. Remote configuration, monitoring and management. Special controls for selection of analysed area. Range cut-off definition. Smart anti-masking system.

    PYTHAGORAS Intelligent barrier designed with multiple technologies, and it is based on

    digital fuzzy logic analysis. The different technologies used allow the barrier to adapt to the size

    of the corridor to be protected avoiding disturbances from fences or vegetation and eliminating

    the limits that the barrier technologies when used individually may have [1].

  • 8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION

    10/23

    NEWTON PLUS Patented active hybrid infrared barrier. Comprising hybrid transmitter

    receiver optics which are provided with a double control AGC. Capable of compensating any

    variation in the incoming signals to ensure uninterrupted operation of the barrier. This signal

    processing discriminates against external phenomena like weather from real intrusion attempts,

    significant reducing unwanted alarms [1].

    Figure 7 : NEWTON PLUS Patented active hybrid infrared barrier [1].

    Built in system for easy alignment, setup and test Double automatic gain control

  • 8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION

    11/23

    The features that can be used these solutions are [7]:

    Real time faces detection, template extraction and matching against watchlist database. Simultaneous multiple face tracking in live video. Gender classification, smile, open-mouth, closed-eyes and glasses detection. Automatic operation allows to log and report face appearance, match and disappearance

    events, as well as to enroll new faces from video stream and add them to watchlist

    automatically.

    Large surveillance systems support by connecting several cameras to a computer andquick synchronization between networked computers.

    Nevertheless, protection on the physical compartment or building is the first layer towards

    security. Follow up on the physical device or peripherals and next on the logical which referring

    to the configuration of the device and peripherals regardless of network devices, server or other

    peripherals. In order to achieve the above, one need to have a security plan in order to mitigate

    the risk of being penetrate and having compromise. According to [6], there is need of established

    a risk management framework which include namely, define system, conduct vulnerability

    assessment, assessing and mitigating riskanalyze impact, risk levels, and mitigating risk with

    security controls, address people and policy risks.

  • 8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION

    12/23

    enhance its level of security. There are several few key points that can be considered to

    implement access control namely something you know, something you had and

    something you are.

    iv. Address people and policy riska. Once the systems have been given proper level of security, there are needs ofgiving the right personnel to have certain level of access to the system. For instance, an

    administrator of a system should have full access to system and a user of a system should

    have a limited of access.

    b. A security policy also need to created and properly documented. The policy is tobe conducted and all staff needs to comply with the policy to have better management

    purposes as well as for security purposes. Staff will later need to undergo proper training

    to have security awareness.

    Reference

    [1]http://www.cias.it/en/products/perimeter-protection/

    [2]http://www.youtube.com/watch?v=mdhvRNYX0PI

    [3]http://www.youtube.com/watch?v=53CJc9BWgio

    http://www.cias.it/en/products/perimeter-protection/http://www.youtube.com/watch?v=mdhvRNYX0PIhttp://www.youtube.com/watch?v=53CJc9BWgiohttp://www.youtube.com/watch?v=53CJc9BWgiohttp://www.youtube.com/watch?v=mdhvRNYX0PIhttp://www.cias.it/en/products/perimeter-protection/
  • 8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION

    13/23

    APPEDIXGroup Task List:

    1) Upon group discussion, every group member finds their own video and answer theassignment question.

    2) All group members sit down and compile the assignment together.3) Hakim will proof read the assignment.4) Nazri will combine the each video.5) Iedil will perform presentation.

  • 8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION

    14/23

    MANS1543: GROUP ASSIGNMENT 1

    VIDEO ON THE ACCESS CONTROL AND

    PERIMETER PROTECTION

    Group 5:

    1. Dzul Hakim Bin Ghazali (MN131025)

    2. Muhammad Iedil Bin Ahmat Jalaluddin (MN131036)

    3. Hairunnazri Bin Haron (MN131017)

  • 8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION

    15/23

    to give an insight on how perimeter protection

    devices can be implemented

    to identify and detect in advance prior the

    uninvited guest approaching

    to illustrate of how IP video management can

    enhance surveillance.

    (a) What is the objective of the video?

  • 8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION

    16/23

    (b) What has actually changed in terms of access control or

    perimeter protection? Hint: Highlight in terms of technologies,

    procedures and enforcement.

    Generally access control will applied the

    following:

    Something you know Username, Password and

    Pass-phase

    Something you own - Access card, token.

    Something you are Biometric Thumbprint,

    Palm print, Iris, Retina, face recognition.

  • 8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION

    17/23

    (b) What has actually changed in terms of access control or

    perimeter protection? Hint: Highlight in terms of technologies,

    procedures and enforcement.

    In term of technologies [1]:

    Provide an excellent identification of target and its

    classification.

    Improvised in monitoring as any significant event

    is recorded and back-up.

    Reduces number of false alarm by differentiating

    detection made by intruders or by nature or byother factors.

    Improvement in detecting intruders in various

    ways.

  • 8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION

    18/23

    (b) What has actually changed in terms of access control or

    perimeter protection? Hint: Highlight in terms of technologies,

    procedures and enforcement.

    In term of procedures [1]:

    Elimination of security guards to secure the

    perimeter.

    The procedures for human response to the

    intruders will be based on the alarm that receives

    signal from the sensor.

  • 8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION

    19/23

    (b) What has actually changed in terms of access control or

    perimeter protection? Hint: Highlight in terms of technologies,

    procedures and enforcement.

    In term of Enforcement [1]:

    Enforcement are much wider, broader, detail and

    accurate compared to the traditional enforcement

    which solely depend on the human actions andlow technology devices;

    Due to the changes in enforcement, the

    possibilities of breaches are low as buildings are

    secured and well-guarded by the high

    technologies devices and systems;

  • 8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION

    20/23

    (c) Provide and briefly describe the latest technologies that

    significantly augment access control and perimeter protection.

    Perimeter security through the use of

    Optical Fiber

    microwave,

    Infrared,

    Triple technology barriers, and

    based on fuzzy logic behavior models.

  • 8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION

    21/23

    (c) Provide and briefly describe the latest technologies that

    significantly augment access control and perimeter protection.

    Figure 3: How Optical Fiber Perimeter Intrusion Detection System Works [4]

  • 8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION

    22/23

    (c) Provide and briefly describe the latest technologies that

    significantly augment access control and perimeter protection.

    Figure 4 : How microwave detection coverage

    works [5]

  • 8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION

    23/23

    (d) Protection is in concentric circles from the outside-in.

    Elaborate and suggests the security plan in mitigating possible

    attacks.

    Established a risk management framework

    which

    define system,

    conduct vulnerability assessment,

    assessing and mitigating risk

    analyze impact,

    risk levels, mitigating risk with security controls,

    address people and policy risks.