Presentation is loading. Please wait.

Presentation is loading. Please wait.

EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.

Similar presentations


Presentation on theme: "EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay."— Presentation transcript:

1 EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay

2 Lesson Objectives CAMS Processes System Transmission media Alarm signals Reception Analysis Handling Archiving Hardware Software Leased line PSTN IP Wireless Panic Intrusion Telephone line fault AC power fail

3 CAMS Allows controlling and monitoring a multiple site installation. Classified as:  Commercial (Centralized)  Proprietary (Localized) Provides services to monitor subscribers’ alarm systems from burglar, fire and residential alarm systems.

4 CAMS NoCommercial (centralized) CAMS Proprietary (Localized) 1Remotely located from the Facility Located within or near on-site facility 2Operated for a profitOwned and operated to provide Security requirements of the owner’s facility

5 CAMS What is Central Alarm Monitoring  provides services to monitor subscribers’ alarm systems from burglar, fire and residential alarm systems and provides specific responses Why need Central Alarm monitoring  Have a peace of mind  Your home or business is protected 24 hours, every day, personally and without delay.  Efficiency handling of security information

6 CAMS Processes  Reception  Analysis  Handling  Archiving

7 CAMS When alarm is activated: Received alarm message Contact recall Is recall contactable ? CAM operator tries to contact recall up to 3 attempts SMS notification send to recall Follow up action taken next working day. Inform recall about alarm activated Update monitoring software Resume monitoring

8 CAMS Perimeter Security Intrusion Detection Example Active Infrared detector Infrared sensor detects intrusion. Signal is analyzed by sensor processor Once signal is confirmed to be intrusion attempt, an alarm is generated. Command post is alerted. Response force activated

9 CAMS System Hardware  automatically processes normal and activated signals to be recorded, maintained and supervised.  Consists  Computer  Server  Printer  Voice recorder  Telephone with headset  Phone system (hotline/normal)  CAMS receiver CAMS receiver

10 CAMS System Software  Manages incoming Digital Time Multiplexing Frequency (DTMF) signals from dialers via the receiver.  Uses central database as part of its management processes.  Every alarm event and corresponding operator action within CAMS is logged for later inspection.

11 CAMS CAMS operators  At least two trained operators at all times.  Trained staff is to monitor its customer’s security systems and call the appropriate authorities in the event an alarm signal is received

12 CAMS Alarm signals transmission media  Communication media  alarm signals are transmitted from the protected area and received by the CAMS  Types of Communication link Connections  Leased line (dedicated line)  Public Switched Telephone Network (PSTN)  Internet Protocol-based (IP-based)  Wireless

13 CAMS Leased Line provides for the connection of a single alarm receiving unit at the central alarm monitoring station PSTN does not have a telephone number, each side of the line being permanently connected to each other IP-based interconnected computer networks that transmit data by packet switching using IP addresses. Wireless Without the use of a “hard wired” connection Example: Radio Frequency (RF), GSM,GPRS

14 CAMS Alarm Monitor signals  Alarm signals from the protected areas are received at the CAMS for identification and how they are handled.  Types of Alarm Signals:-  Personal attack hold up, duress or keypad panic alarm  Intrusion alarm signals  Intrusion alarm received when system is disarmed.  Telephone line fault signal (after hours).  Telephone line fault signal ( office hours)  AC power fail and low battery signal

15 CAMS Personal Attack hold up/ Duress/ keypad panic alarm signal:-  Police is immediately dispatched.  In event of accidental operation, name and secret password of the RO are verified.  Cannot be cancelled if police have been notified Intrusion Alarm signals:-  Telephone call from the CAMS is made to premises to verify false activation.  If correct password is given, police patrol is not dispatched  Police despatched when no response from premise (phone calls, wrong password)

16 CAMS Intrusion alarm signal received when system is disarmed  Call premises to verify false activation and name of person answering call is recorded for verification. RO to return call within stipulated time.  Dispatch Police when there is no response from premises after stipulated attempted telephone calls or wrong secret password is provided and the RO is notified. AC power fail and low battery signal  Telephone call is made during office hours to inform RO of signal received.  Telephone call is made after office hours to inform RO to check premises with password verified if latter does not wish to check premises.  Follow-up action is specified according to established organizational procedures.

17 CAMS False Alarms  alarm signal transmitted in the absence of a real alarm condition. Causes of False Alarms:-  Environmental  User error  Equipments malfunction, failure Consequence of frequent false alarms:-  Penalty charges (up to $300 per false alarm) from local authorities  Slower response time in the future from emergency personnel

18 CAMS Monitoring Report Format Incident Report Format

19 CAMS Work on the Review Questions ( on Page 136)


Download ppt "EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay."

Similar presentations


Ads by Google