+ All Categories
Home > Documents > e Sec Trends

e Sec Trends

Date post: 05-Apr-2018
Category:
Upload: shankar-rao
View: 218 times
Download: 0 times
Share this document with a friend

of 25

Transcript
  • 8/2/2019 e Sec Trends

    1/25

    25th Aug 2008

    Trends in Electronic Security

    - Managing Security Risks

    Shankar RaoDirector Technical & Service

    Unity Automation Solutions Ltd.52 2nd Floor

    Jacaranda MargDLF Phase II

    Gurgaon 122 002www.uniteegroup.com

    [email protected]

    http://www.uniteegroup.com/mailto:[email protected]:[email protected]://www.uniteegroup.com/
  • 8/2/2019 e Sec Trends

    2/25

    25th Aug 2008

    Changing Panorama of Risks

    9/11 has changed Risk Perceptions permanently

    That 9/11 was prevent-able is the Bitter truth

    Potentially every facility & business is at Risk

    Risks to Life

    Business

    Assets (Physical & Information)

    Information (Availability, Integrity & Confidentiality)

    Physical (Building, Facility, Equipment)

  • 8/2/2019 e Sec Trends

    3/25

    25th Aug 2008

    Physical Security

    Physical Security is a vital cog in the Risk mitigationProcess.

    In combination with Information Security (basis a RiskAssessment), more composite & effective RiskTreatment Plans are being devised.

    The general trend in the Electronic Security Industrymirrors the changes in the Perceived Risks & their RiskTreatment Plans

  • 8/2/2019 e Sec Trends

    4/25

    25th Aug 2008

    Electronic Security Classifications

    Access Controls Biometrics Iris based Visitor Management

    Surveillance CCTV Surveillance Video analytics

    License Plate Recognition Parking Management Exception Reporting

    Counter Surveillance Encryptors Jammers

    Debugging Counter Terrorism

    Trace & Contraband Detection Perimeter protection Vehicle tracking

  • 8/2/2019 e Sec Trends

    5/25

    25th Aug 2008

    Biometrics in Access Controls

    Access controls need to perform two actions beforegranting Access Identification

    Verification

    Traditionally, Identification systems were used inisolation. Verification was non-existent. Proximity Cards

    Smart Cards

    Magnetic Swipe Cards

    Recently, Biometrics have been employed forVerification Finger Print Readers with Proximity Card Readers

  • 8/2/2019 e Sec Trends

    6/25

    25th Aug 2008

    Trends in Biometrics

    Using Biometrics with Smartcards The finger minutiae template is stored on the Smart card.

    Integrated Biometric FPR with Smart Card Reader

    No Biometric Database required

    1 to 1 Verification Mechanism

  • 8/2/2019 e Sec Trends

    7/25

    25th Aug 2008

    Trends in Biometrics

    Iris Scanners Eliminate need for the Identification Process

    The Verification process completes identification

    Biometric Template memory requirement only 1 kb per record

    Fast, non-invasive & repeatable

    1 to N verification

    Visitor Management solutions

    Iris image is NOT memory intensive

    A 60 GB PC can hold 100000 records Effective for Corporate locations

  • 8/2/2019 e Sec Trends

    8/25

    25th Aug 2008

    Surveillance

    CCTV feed on Analog signaling or IP

    Capability to view Remotely over IP

    Storage needs ever increasing

    Terabytes of Memory is used for Archival But is anybody watching the feed?

    Is it a means of gathering Evidence, post facto?

    Reactive Controls

  • 8/2/2019 e Sec Trends

    9/25

    25th Aug 2008

    Trends in Video Surveillance

    Video analytics Business Rules for Exceptions defined

    Works on any type of CCTV Technology

    Easily deployed

    Exceptions can be reported Proactive Controls

    Typical Applications ATM Behavioral Analytics

    Parking Management License Plate Recognition

    Screen Delta Monitoring Unauthorized objects

    Items deliberately left behind

    Approach speed error

  • 8/2/2019 e Sec Trends

    10/25

    25th Aug 2008

    Counter Surveillance

    The most vulnerable Information Asset to Securitybreaches

    Verbal Communication

    Telephonic

    Conference Rooms

    Traditional approach Counter Surveillance Agency search/cleans the conference

    Room

    But what about day-to-day Telephonic conversations? US$100 Phone bugs can be implanted by a casual show-me-

    your-phone in less than a second.

  • 8/2/2019 e Sec Trends

    11/25

    25th Aug 2008

    Trends in Counter Surveillance

    Cell phone Encryptor

    Makes phone tapping impossible

    Analog input/output makes the ENCRYPTORdeployable on all types of Cellular networks andusable with all types of cellular phones.

    As a complete encryption processing device (not aphone), it is independent of government and cellularcompanies regulations.

    Makes eavesdropping impossible

    The ENCRYPTOR prevents all kinds of eavesdroppingby hidden microphones, directional and laser

    microphones and similar surreptitious surveillancedevices.

    Specially synthesized noises mask sounds withthe users previously recorded voice and thereforemakes voice print analysis impossible.

  • 8/2/2019 e Sec Trends

    12/25

    25th Aug 2008

    Trends in Counter Surveillance

    Landline & Fax Encryptor Telephone and Fax Encryptor module uses one of the latest

    military scrambling methods to protect your conversations andFax transmittal from illegal, high-tech eavesdropping.

    It just plugs in between the telephone set or a Fax machine andit uses the power from the telephone line itself.

  • 8/2/2019 e Sec Trends

    13/25

    25th Aug 2008

    Trends in Counter Surveillance

    Counter Surveillance MonitorReceiver

    Detects all radio frequency buggingthreats

    Detects even the lowest powereavesdropping transmitters

    Easy use by non-technical personnel

    Rapid identification of suspicioussignals

    Reliable operation in strong signalareas

  • 8/2/2019 e Sec Trends

    14/25

    25th Aug 2008

    Trends in Counter Surveillance

    Dual Band Signal Jammer The Dual Band Cellular Jammer and

    Electronic Counter Measures Unit is builtin compliance with the latest militaryspecifications.

    Utilizing the latest in communicationjamming technology

    Intended for use by Security enforcementto ensure:

    Security of information by preventing illicittransmission of audio, video and data.

    Prevent remote activation of concealedsurveillance equipment.

    Prevent remote detonation of improvised,remotely activated explosive devices.

  • 8/2/2019 e Sec Trends

    15/25

    25th Aug 2008

    Counter Terrorism

    Traditional Approach Deployment of Metal Detector

    Gated

    Handheld

    Frisking Invasive Method Deploying X Ray Machines

    Present day threats

    Plastic Explosives

    Liquid Explosives

    In-body concealment

    Who is Checking???

  • 8/2/2019 e Sec Trends

    16/25

    25th Aug 2008

    Trends in Counter Terrorism

    Trace & Contraband DetectionSystems

    Vapor and/or Microwave baseddetection mechanism for traces of

    Plastic Explosives Liquid Explosives

    Narcotics

    Conventional Bombs

    Mass measured Weapons

    Auto-lockout of the portal trapping theperson inside on alarm

    Deployment of Guards not required

  • 8/2/2019 e Sec Trends

    17/25

    25th Aug 2008

    Trends in Counter Terrorism

    Backscatter X-ray Machines Captures reflected X-rays on

    multiple sensors

    Works on the principle that

    different materials absorb &reflect different levels of X-rays

    On-board microprocessor,combines the multiple images

    to deliver a composite imagewith clear outlines

  • 8/2/2019 e Sec Trends

    18/25

    25th Aug 2008

    Trends in Counter Terrorism

    Backscatter X-ray Machines Baggage Inspection

  • 8/2/2019 e Sec Trends

    19/25

    25th Aug 2008

    Trends in Counter Terrorism

    Backscatter X-ray Machines Automobile Inspection

  • 8/2/2019 e Sec Trends

    20/25

    25th Aug 2008

    Trends in Counter Terrorism

    Backscatter X-ray Machines Personnel Inspection

  • 8/2/2019 e Sec Trends

    21/25

    25th Aug 2008

    Counter Terrorism

    Perimeter Protection Fencing Systems Traditional approach

    High Walls with glass / wire overlay

    Scalable

    Breach-able No alarming or information

  • 8/2/2019 e Sec Trends

    22/25

    25th Aug 2008

    Trends in Counter Terrorism

    Perimeter Protection FencingSystems Power Fence

    Deters Would-be intruders with a short,

    sharp, regulated safe but painfulelectric shock.

    Denies unauthorized access.

    Defends Provides an active inner security

    barrier through which any would-be intruder would have to pass toachieve their goal.

    Detects Alarms are generated the instant

    the Power Fence security systemis tampered with.

  • 8/2/2019 e Sec Trends

    23/25

    25th Aug 2008

    Trends in Counter Terrorism

    Perimeter Protection BarrierSystems

    Automated telescopic Bollards

    Can be triggered by

    Speed Sensors

    Video Analytics

    Manual Intervention

    Protects Facility periphery walls

    Approaches to basements

    More rugged than Boom Barriers

  • 8/2/2019 e Sec Trends

    24/25

    25th Aug 2008

    Trends in Counter Terrorism

    Vehicle Tracking Systems GPS based Car homing system

    Duress alarm

    Auto-help Call

    Breakdown information

    Confirmation of Homing

  • 8/2/2019 e Sec Trends

    25/25

    25th Aug 2008

    Questions & Answers


Recommended