access control & perimeter protection
TRANSCRIPT
-
8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION
1/23
MNS1543: ACCESS CONTROL & PERIMETER
PROTECTION
MANS1543: GROUP ASSIGNMENT 1 VIDEO ON THE ACCESS CONTROL AND
PERIMETER PROTECTION
-
8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION
2/23
List of Figure
Page Number
Figure 1: How Optical Fiber Perimeter Intrusion Detection System Works [4] 4
Figure 2 : How microwave detection coverage works [5] 4
Figure 3: SIOUX - fence mounted perimeter intrusion detection system [1] 5
Figure 4: ERMO 482X PROSignal Monitoring [1] 6
Figure 5: MURENA Remote control digital microwave transceiver based on fuzzy logic
analysis [1] 7
Figure 6: PYTHAGORASIntelligent barrier designed with multiple technologies [1] 8
Figure 7: NEWTON PLUSPatented active hybrid infrared barrier [1]. 9
-
8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION
3/23
(a) What is the objective of the video?
The objective of the first video is to give an insight on how perimeter protection devices can be
implemented to protect and secure organizations or residential from any intrusions [1]. Whereas
the second video is to highlight the latest updates of access control solution in biometric
technology which is using face recognition method. Using the surveillance system, the security
personnel or front office staff may identify and detect in advance prior the uninvited guest
approaching them and they will standby to act accordingly [2]. The third video is to illustrate of
how IP video management can enhance surveillance and become a physical security information
management platform [3].
(b) What has actually changed in terms of access control or perimeter protection? Hint:
Highlight in terms of technologies, procedures and enforcement.
Generally access control will applied the following:
i. Something you knowUsername, Password and Pass-phaseii. Something you own - Access card, token.
iii. Something you areBiometricThumbprint, Palm print, Iris, Retina, face recognition.
-
8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION
4/23
measure, an agency will have wider range of surveillance which cannot cover by mere security
personnel.
In term of technologies [1]:
Provide an excellent identification of target and its classification. Improvised in monitoring as any significant event is recorded and back-up. Reduces number of false alarm by differentiating detection made by intruders or by
nature or by other factors.
Improvement in detecting intruders in various ways. Protect security devices from being manipulated. Allowing complete remote troubleshooting from anywhere in the world. Enhancement of security devices to be able to perform well in difficult weather and
difference environmental conditions.
Improvised the roles of fences and barriers.
In term of procedures [1]:
Elimination of security guards to secure the perimeter. The procedures for human response to the intruders will be based on the alarm that
receives signal from the sensor
-
8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION
5/23
(c) Provide and briefly describe the latest technologies that significantly augment access
control and perimeter protection.
Few technologies have been developed to address the issue of perimeter security namely Optical
Fiber Perimeter Intrusion Detection System and Perimeter security through the use of
microwave, Infrared, Triple technology barriers, and based on fuzzy logic behavior models.
Optical Fiber Perimeter Intrusion Detection System makes use of optical fiber to detect any
intrusion to the perimeter. This system will apply several peripherals to achieve its goal namely
Laser Diode (LD), Photo Diode (PD), Optical Coupler and Sensor Fiber ring. Under normal
conditionsfor instance, no vibration detected, the interference light strength is stable. When a
vibration - for instance, an intrusion was detected by optical fiber, the strength of the interference
light fluctuates. This cause the emitted light arrives with some difference in timely manner. The
interference will be captured by a photo diode (PD). [4]. Figure 1 illustrates the Optical Fiber
Perimeter Intrusion Detection System.
Perimeter security through the use of microwave, on the other hand makes use of microwave to
detect any activity around the surveillance area. Microwave detectors are able to be configured in
such way to have several different coverage patterns, namely wide beams or narrow beams.
-
8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION
6/23
Figure 4 : How microwave detection coverage works [5]
With the experience from 1974, the company has developed products for perimeter protection
using the latest technology which really helped in access control and perimeter technologies in
this era. It uses several products to create a different layer to detect an intruder from getting into
the restricted area with configuration, monitoring and management system in order to applyimmediate actions. The technologies used can intelligently discriminating a real intruder with
-
8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION
7/23
products that can be used as standalone protection based on requirement and environment in the
organization or residential for their protected area [1].
SIOUXInnovative fence mounted perimeter intrusion detection system, the result of a research
project conducted in collaboration with the Milan Polytechnic, which has resulted in the joint
filing of 3 patents [1].
Figure 3: SIOUX - fence mounted perimeter intrusion detection system [1]
Fence mounted detection system based on 3D mems sensors.
-
8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION
8/23
Figure 4: ERMO 482X PROSignal Monitoring [1]
Digital analysis using fuzzy logicFBM (Fuzzy Behaviour Models). Wide range of frequencies on X and K band. Remote configuration, monitoring and management. Resistant to extreme weather conditions
MURENARemotely control digital microwave transceiver based on fuzzy logic analysis. It is
capable of detecting distance, dimension, and direction of the target, making a real intruder much
more distinguishable from environmental disturbances [1].
-
8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION
9/23
Dual frequency transceiver. Smart pet immunity. Remote configuration, monitoring and management. Special controls for selection of analysed area. Range cut-off definition. Smart anti-masking system.
PYTHAGORAS Intelligent barrier designed with multiple technologies, and it is based on
digital fuzzy logic analysis. The different technologies used allow the barrier to adapt to the size
of the corridor to be protected avoiding disturbances from fences or vegetation and eliminating
the limits that the barrier technologies when used individually may have [1].
-
8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION
10/23
NEWTON PLUS Patented active hybrid infrared barrier. Comprising hybrid transmitter
receiver optics which are provided with a double control AGC. Capable of compensating any
variation in the incoming signals to ensure uninterrupted operation of the barrier. This signal
processing discriminates against external phenomena like weather from real intrusion attempts,
significant reducing unwanted alarms [1].
Figure 7 : NEWTON PLUS Patented active hybrid infrared barrier [1].
Built in system for easy alignment, setup and test Double automatic gain control
-
8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION
11/23
The features that can be used these solutions are [7]:
Real time faces detection, template extraction and matching against watchlist database. Simultaneous multiple face tracking in live video. Gender classification, smile, open-mouth, closed-eyes and glasses detection. Automatic operation allows to log and report face appearance, match and disappearance
events, as well as to enroll new faces from video stream and add them to watchlist
automatically.
Large surveillance systems support by connecting several cameras to a computer andquick synchronization between networked computers.
Nevertheless, protection on the physical compartment or building is the first layer towards
security. Follow up on the physical device or peripherals and next on the logical which referring
to the configuration of the device and peripherals regardless of network devices, server or other
peripherals. In order to achieve the above, one need to have a security plan in order to mitigate
the risk of being penetrate and having compromise. According to [6], there is need of established
a risk management framework which include namely, define system, conduct vulnerability
assessment, assessing and mitigating riskanalyze impact, risk levels, and mitigating risk with
security controls, address people and policy risks.
-
8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION
12/23
enhance its level of security. There are several few key points that can be considered to
implement access control namely something you know, something you had and
something you are.
iv. Address people and policy riska. Once the systems have been given proper level of security, there are needs ofgiving the right personnel to have certain level of access to the system. For instance, an
administrator of a system should have full access to system and a user of a system should
have a limited of access.
b. A security policy also need to created and properly documented. The policy is tobe conducted and all staff needs to comply with the policy to have better management
purposes as well as for security purposes. Staff will later need to undergo proper training
to have security awareness.
Reference
[1]http://www.cias.it/en/products/perimeter-protection/
[2]http://www.youtube.com/watch?v=mdhvRNYX0PI
[3]http://www.youtube.com/watch?v=53CJc9BWgio
http://www.cias.it/en/products/perimeter-protection/http://www.youtube.com/watch?v=mdhvRNYX0PIhttp://www.youtube.com/watch?v=53CJc9BWgiohttp://www.youtube.com/watch?v=53CJc9BWgiohttp://www.youtube.com/watch?v=mdhvRNYX0PIhttp://www.cias.it/en/products/perimeter-protection/ -
8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION
13/23
APPEDIXGroup Task List:
1) Upon group discussion, every group member finds their own video and answer theassignment question.
2) All group members sit down and compile the assignment together.3) Hakim will proof read the assignment.4) Nazri will combine the each video.5) Iedil will perform presentation.
-
8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION
14/23
MANS1543: GROUP ASSIGNMENT 1
VIDEO ON THE ACCESS CONTROL AND
PERIMETER PROTECTION
Group 5:
1. Dzul Hakim Bin Ghazali (MN131025)
2. Muhammad Iedil Bin Ahmat Jalaluddin (MN131036)
3. Hairunnazri Bin Haron (MN131017)
-
8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION
15/23
to give an insight on how perimeter protection
devices can be implemented
to identify and detect in advance prior the
uninvited guest approaching
to illustrate of how IP video management can
enhance surveillance.
(a) What is the objective of the video?
-
8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION
16/23
(b) What has actually changed in terms of access control or
perimeter protection? Hint: Highlight in terms of technologies,
procedures and enforcement.
Generally access control will applied the
following:
Something you know Username, Password and
Pass-phase
Something you own - Access card, token.
Something you are Biometric Thumbprint,
Palm print, Iris, Retina, face recognition.
-
8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION
17/23
(b) What has actually changed in terms of access control or
perimeter protection? Hint: Highlight in terms of technologies,
procedures and enforcement.
In term of technologies [1]:
Provide an excellent identification of target and its
classification.
Improvised in monitoring as any significant event
is recorded and back-up.
Reduces number of false alarm by differentiating
detection made by intruders or by nature or byother factors.
Improvement in detecting intruders in various
ways.
-
8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION
18/23
(b) What has actually changed in terms of access control or
perimeter protection? Hint: Highlight in terms of technologies,
procedures and enforcement.
In term of procedures [1]:
Elimination of security guards to secure the
perimeter.
The procedures for human response to the
intruders will be based on the alarm that receives
signal from the sensor.
-
8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION
19/23
(b) What has actually changed in terms of access control or
perimeter protection? Hint: Highlight in terms of technologies,
procedures and enforcement.
In term of Enforcement [1]:
Enforcement are much wider, broader, detail and
accurate compared to the traditional enforcement
which solely depend on the human actions andlow technology devices;
Due to the changes in enforcement, the
possibilities of breaches are low as buildings are
secured and well-guarded by the high
technologies devices and systems;
-
8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION
20/23
(c) Provide and briefly describe the latest technologies that
significantly augment access control and perimeter protection.
Perimeter security through the use of
Optical Fiber
microwave,
Infrared,
Triple technology barriers, and
based on fuzzy logic behavior models.
-
8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION
21/23
(c) Provide and briefly describe the latest technologies that
significantly augment access control and perimeter protection.
Figure 3: How Optical Fiber Perimeter Intrusion Detection System Works [4]
-
8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION
22/23
(c) Provide and briefly describe the latest technologies that
significantly augment access control and perimeter protection.
Figure 4 : How microwave detection coverage
works [5]
-
8/13/2019 ACCESS CONTROL & PERIMETER PROTECTION
23/23
(d) Protection is in concentric circles from the outside-in.
Elaborate and suggests the security plan in mitigating possible
attacks.
Established a risk management framework
which
define system,
conduct vulnerability assessment,
assessing and mitigating risk
analyze impact,
risk levels, mitigating risk with security controls,
address people and policy risks.