The basic principles of physical security systems have been around for decades, and have not changed that much: surveillance, intrusion detection, and triggering alarms in case of breaches or anomalies still form the basis of any security installation. What has changed, however, is the technology driving these basic principles, as digitization has changed the very bones of security systems. Along with this digitization, new challenges have arisen. In this post, we take a look at some of these, and how to mitigate them.
But what are these new technologies ("new" being relative, considering some have been around for more than a decade) that are changing the physical security industry? Here are some examples:
Other than being a word I like to use whenever it is even remotely applicable, "smorgasbord" (thanks, Sweden!) is an apt description for modern security systems. Because of the digitization of their components, these systems are often a patchwork of technologies, protocols, and a variety of devices from multiple vendors. The first challenge security system integrators face is that they need to get all these disparate devices on a network, and then get that network configured and optimized. Yeah, might take more than a few days.
But getting the environment set up and configured is just the first part of the struggle.
The New Weakest Link: The Network
The digitized nature of modern security systems introduces new points of failure in addition to the traditional ones. For example, lost data has become a factor. With video data stored digitally, if something goes wrong – such as a storage device crashing or the network not transmitting data – video footage can be lost.
But perhaps the biggest weak point for modern security systems is the underlying network. Bottlenecks, bandwidth issues, or routing problems that prevent data being sent or received properly are all things that can compromise a security system. And if cyber criminals get access to the network or devices, they have the ability to negate the security of the entire system. This might involve shutting down aspects of the system, or using devices for purposes other than intended.
The above risks pose a critical danger to any security system. So how do you prevent these things from happening?
The short answer is: you cannot completely circumvent these risks. Electronic devices will malfunction, networks will have bandwidth issues, and storage devices will fail. These are the eternal truths of the digital world. All you can do is take preventative steps where possible, and set up alerts for when there is a failure. Enter network monitoring.
Monitoring the Security System
As with other industries, modern security systems have seen a convergence with traditional IT: you have the specialized security devices running on the same infrastructure as more operational IT devices such as switches, servers, routers, and so on. While this does add to the complexity of these systems, it also means that there is the possibility to monitor everything in one place, despite the disparate technologies.
The same general steps that apply to monitoring traditional IT environments also apply to monitoring a security system network:
Examples of Issues and Possible Resolutions
One of the advantages of network monitoring is that the kinds of systems you can monitor are quite varied, as long as the connected devices offer standard technologies (such as SNMP, NetFlow, WMI, and so on). While the monitoring approach remains the same - configure a sensor for a device and get statistics from that sensor - the actual network can look very different from one installation to another. So with the same network monitoring principle, you might be monitoring a hospital, a Smart Home, a Smart City...or a physical security system.
for the original article please visit: https://blog.paessler.com/monitoring-physical-security-systems
29/10/2021 11:31:58 am
good information u have shared keep on posting
10/1/2023 02:54:29 pm
Impressive! Thanks for sharing this.
31/5/2023 01:47:39 pm
Surveillance, intrusion detection, and alarms triggered in response to breaches or anomalies remain the foundation of any security installation, as evidenced by the fact that they have been used effectively for decades. I appreciate your contribution and look forward to more in the future.
2/6/2023 02:55:37 pm
Since digitalization has altered the very foundations of security systems, this is an excellent study that provides much-needed details regarding the technology that drives these fundamental concepts. As a result of this increased digitalization, new difficulties have emerged. In this article, we will discuss some of these risks and the steps you can take to protect yourself. For someone like me who is interested in learning more, this may be a fantastic resource. The blog is excellent.
Leave a Reply.