Upload
shankar-rao
View
218
Download
0
Embed Size (px)
Citation preview
8/2/2019 e Sec Trends
1/25
25th Aug 2008
Trends in Electronic Security
- Managing Security Risks
Shankar RaoDirector Technical & Service
Unity Automation Solutions Ltd.52 2nd Floor
Jacaranda MargDLF Phase II
Gurgaon 122 002www.uniteegroup.com
http://www.uniteegroup.com/mailto:[email protected]:[email protected]://www.uniteegroup.com/8/2/2019 e Sec Trends
2/25
25th Aug 2008
Changing Panorama of Risks
9/11 has changed Risk Perceptions permanently
That 9/11 was prevent-able is the Bitter truth
Potentially every facility & business is at Risk
Risks to Life
Business
Assets (Physical & Information)
Information (Availability, Integrity & Confidentiality)
Physical (Building, Facility, Equipment)
8/2/2019 e Sec Trends
3/25
25th Aug 2008
Physical Security
Physical Security is a vital cog in the Risk mitigationProcess.
In combination with Information Security (basis a RiskAssessment), more composite & effective RiskTreatment Plans are being devised.
The general trend in the Electronic Security Industrymirrors the changes in the Perceived Risks & their RiskTreatment Plans
8/2/2019 e Sec Trends
4/25
25th Aug 2008
Electronic Security Classifications
Access Controls Biometrics Iris based Visitor Management
Surveillance CCTV Surveillance Video analytics
License Plate Recognition Parking Management Exception Reporting
Counter Surveillance Encryptors Jammers
Debugging Counter Terrorism
Trace & Contraband Detection Perimeter protection Vehicle tracking
8/2/2019 e Sec Trends
5/25
25th Aug 2008
Biometrics in Access Controls
Access controls need to perform two actions beforegranting Access Identification
Verification
Traditionally, Identification systems were used inisolation. Verification was non-existent. Proximity Cards
Smart Cards
Magnetic Swipe Cards
Recently, Biometrics have been employed forVerification Finger Print Readers with Proximity Card Readers
8/2/2019 e Sec Trends
6/25
25th Aug 2008
Trends in Biometrics
Using Biometrics with Smartcards The finger minutiae template is stored on the Smart card.
Integrated Biometric FPR with Smart Card Reader
No Biometric Database required
1 to 1 Verification Mechanism
8/2/2019 e Sec Trends
7/25
25th Aug 2008
Trends in Biometrics
Iris Scanners Eliminate need for the Identification Process
The Verification process completes identification
Biometric Template memory requirement only 1 kb per record
Fast, non-invasive & repeatable
1 to N verification
Visitor Management solutions
Iris image is NOT memory intensive
A 60 GB PC can hold 100000 records Effective for Corporate locations
8/2/2019 e Sec Trends
8/25
25th Aug 2008
Surveillance
CCTV feed on Analog signaling or IP
Capability to view Remotely over IP
Storage needs ever increasing
Terabytes of Memory is used for Archival But is anybody watching the feed?
Is it a means of gathering Evidence, post facto?
Reactive Controls
8/2/2019 e Sec Trends
9/25
25th Aug 2008
Trends in Video Surveillance
Video analytics Business Rules for Exceptions defined
Works on any type of CCTV Technology
Easily deployed
Exceptions can be reported Proactive Controls
Typical Applications ATM Behavioral Analytics
Parking Management License Plate Recognition
Screen Delta Monitoring Unauthorized objects
Items deliberately left behind
Approach speed error
8/2/2019 e Sec Trends
10/25
25th Aug 2008
Counter Surveillance
The most vulnerable Information Asset to Securitybreaches
Verbal Communication
Telephonic
Conference Rooms
Traditional approach Counter Surveillance Agency search/cleans the conference
Room
But what about day-to-day Telephonic conversations? US$100 Phone bugs can be implanted by a casual show-me-
your-phone in less than a second.
8/2/2019 e Sec Trends
11/25
25th Aug 2008
Trends in Counter Surveillance
Cell phone Encryptor
Makes phone tapping impossible
Analog input/output makes the ENCRYPTORdeployable on all types of Cellular networks andusable with all types of cellular phones.
As a complete encryption processing device (not aphone), it is independent of government and cellularcompanies regulations.
Makes eavesdropping impossible
The ENCRYPTOR prevents all kinds of eavesdroppingby hidden microphones, directional and laser
microphones and similar surreptitious surveillancedevices.
Specially synthesized noises mask sounds withthe users previously recorded voice and thereforemakes voice print analysis impossible.
8/2/2019 e Sec Trends
12/25
25th Aug 2008
Trends in Counter Surveillance
Landline & Fax Encryptor Telephone and Fax Encryptor module uses one of the latest
military scrambling methods to protect your conversations andFax transmittal from illegal, high-tech eavesdropping.
It just plugs in between the telephone set or a Fax machine andit uses the power from the telephone line itself.
8/2/2019 e Sec Trends
13/25
25th Aug 2008
Trends in Counter Surveillance
Counter Surveillance MonitorReceiver
Detects all radio frequency buggingthreats
Detects even the lowest powereavesdropping transmitters
Easy use by non-technical personnel
Rapid identification of suspicioussignals
Reliable operation in strong signalareas
8/2/2019 e Sec Trends
14/25
25th Aug 2008
Trends in Counter Surveillance
Dual Band Signal Jammer The Dual Band Cellular Jammer and
Electronic Counter Measures Unit is builtin compliance with the latest militaryspecifications.
Utilizing the latest in communicationjamming technology
Intended for use by Security enforcementto ensure:
Security of information by preventing illicittransmission of audio, video and data.
Prevent remote activation of concealedsurveillance equipment.
Prevent remote detonation of improvised,remotely activated explosive devices.
8/2/2019 e Sec Trends
15/25
25th Aug 2008
Counter Terrorism
Traditional Approach Deployment of Metal Detector
Gated
Handheld
Frisking Invasive Method Deploying X Ray Machines
Present day threats
Plastic Explosives
Liquid Explosives
In-body concealment
Who is Checking???
8/2/2019 e Sec Trends
16/25
25th Aug 2008
Trends in Counter Terrorism
Trace & Contraband DetectionSystems
Vapor and/or Microwave baseddetection mechanism for traces of
Plastic Explosives Liquid Explosives
Narcotics
Conventional Bombs
Mass measured Weapons
Auto-lockout of the portal trapping theperson inside on alarm
Deployment of Guards not required
8/2/2019 e Sec Trends
17/25
25th Aug 2008
Trends in Counter Terrorism
Backscatter X-ray Machines Captures reflected X-rays on
multiple sensors
Works on the principle that
different materials absorb &reflect different levels of X-rays
On-board microprocessor,combines the multiple images
to deliver a composite imagewith clear outlines
8/2/2019 e Sec Trends
18/25
25th Aug 2008
Trends in Counter Terrorism
Backscatter X-ray Machines Baggage Inspection
8/2/2019 e Sec Trends
19/25
25th Aug 2008
Trends in Counter Terrorism
Backscatter X-ray Machines Automobile Inspection
8/2/2019 e Sec Trends
20/25
25th Aug 2008
Trends in Counter Terrorism
Backscatter X-ray Machines Personnel Inspection
8/2/2019 e Sec Trends
21/25
25th Aug 2008
Counter Terrorism
Perimeter Protection Fencing Systems Traditional approach
High Walls with glass / wire overlay
Scalable
Breach-able No alarming or information
8/2/2019 e Sec Trends
22/25
25th Aug 2008
Trends in Counter Terrorism
Perimeter Protection FencingSystems Power Fence
Deters Would-be intruders with a short,
sharp, regulated safe but painfulelectric shock.
Denies unauthorized access.
Defends Provides an active inner security
barrier through which any would-be intruder would have to pass toachieve their goal.
Detects Alarms are generated the instant
the Power Fence security systemis tampered with.
8/2/2019 e Sec Trends
23/25
25th Aug 2008
Trends in Counter Terrorism
Perimeter Protection BarrierSystems
Automated telescopic Bollards
Can be triggered by
Speed Sensors
Video Analytics
Manual Intervention
Protects Facility periphery walls
Approaches to basements
More rugged than Boom Barriers
8/2/2019 e Sec Trends
24/25
25th Aug 2008
Trends in Counter Terrorism
Vehicle Tracking Systems GPS based Car homing system
Duress alarm
Auto-help Call
Breakdown information
Confirmation of Homing
8/2/2019 e Sec Trends
25/25
25th Aug 2008
Questions & Answers