1 / 19

EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS

EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS. Prepared by Sandy Tay. Lesson Objectives. CAMS. Reception Analysis Handling Archiving. Hardware Software. Leased line PSTN IP Wireless. Panic Intrusion Telephone line fault AC power fail. CAMS.

cicada
Télécharger la présentation

EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. EC4019PAIntrusion & Access Control Technology (IACT)Chapter 4- CAMS Prepared by Sandy Tay

  2. Lesson Objectives CAMS • Reception • Analysis • Handling • Archiving • Hardware • Software • Leased line • PSTN • IP • Wireless • Panic • Intrusion • Telephone line fault • AC power fail

  3. CAMS • Allows controlling and monitoring a multiple site installation. • Classified as: • Commercial (Centralized) • Proprietary (Localized) • Provides services to monitor subscribers’ alarm systems from burglar, fire and residential alarm systems.

  4. CAMS

  5. CAMS • What is Central Alarm Monitoring • provides services to monitor subscribers’ alarm systems from burglar, fire and residential alarm systems and provides specific responses • Why need Central Alarm monitoring • Have a peace of mind • Your home or business is protected 24 hours, every day, personally and without delay. • Efficiency handling of security information

  6. CAMS • Processes • Reception • Analysis • Handling • Archiving

  7. CAMS When alarm is activated: Received alarm message Contact recall Is recall contactable? CAM operator tries to contact recall up to 3 attempts SMS notification send to recall Follow up action taken next working day. Inform recall about alarm activated Update monitoring software Resume monitoring

  8. CAMS Perimeter Security Intrusion Detection Example • Infrared sensor detects intrusion. • Signal is analyzed by sensor processor Active Infrared detector • Once signal is confirmed to be intrusion attempt, an alarm is generated. • Command post is alerted. • Response force activated

  9. CAMS • System Hardware • automatically processes normal and activated signals to be recorded, maintained and supervised. • Consists • Computer • Server • Printer • Voice recorder • Telephone with headset • Phone system (hotline/normal) • CAMS receiver • CAMS receiver

  10. CAMS • System Software • Manages incoming Digital Time Multiplexing Frequency (DTMF) signals from dialers via the receiver. • Uses central database as part of its management processes. • Every alarm event and corresponding operator action within CAMS is logged for later inspection.

  11. CAMS • CAMS operators • At least two trained operators at all times. • Trained staff is to monitor its customer’s security systems and call the appropriate authorities in the event an alarm signal is received

  12. CAMS • Alarm signals transmission media • Communication media • alarm signals are transmitted from the protected area and received by the CAMS • Types of Communication link Connections • Leased line (dedicated line) • Public Switched Telephone Network (PSTN) • Internet Protocol-based (IP-based) • Wireless

  13. CAMS

  14. CAMS • Alarm Monitor signals • Alarm signals from the protected areas are received at the CAMS for identification and how they are handled. • Types of Alarm Signals:- • Personal attack hold up, duress or keypad panic alarm • Intrusion alarm signals • Intrusion alarm received when system is disarmed. • Telephone line fault signal (after hours). • Telephone line fault signal ( office hours) • AC power fail and low battery signal

  15. CAMS • Personal Attack hold up/ Duress/ keypad panic alarm signal:- • Police is immediately dispatched. • In event of accidental operation, name and secret password of the RO are verified. • Cannot be cancelled if police have been notified • Intrusion Alarm signals:- • Telephone call from the CAMS is made to premises to verify false activation. • If correct password is given, police patrol is not dispatched • Police despatched when no response from premise (phone calls, wrong password)

  16. CAMS • Intrusion alarm signal received when system is disarmed • Call premises to verify false activation and name of person answering call is recorded for verification. RO to return call within stipulated time. • Dispatch Police when there is no response from premises after stipulated attempted telephone calls or wrong secret password is provided and the RO is notified. • AC power fail and low battery signal • Telephone call is made during office hours to inform RO of signal received. • Telephone call is made after office hours to inform RO to check premises with password verified if latter does not wish to check premises. • Follow-up action is specified according to established organizational procedures.

  17. CAMS • False Alarms • alarm signal transmitted in the absence of a real alarm condition. • Causes of False Alarms:- • Environmental • User error • Equipments malfunction, failure • Consequence of frequent false alarms:- • Penalty charges (up to $300 per false alarm) from local authorities • Slower response time in the future from emergency personnel

  18. CAMS Monitoring Report Format Incident Report Format

  19. CAMS • Work on the Review Questions ( on Page 136)

More Related