This is part of a large project to design trends and future needs. In this sub-project has been analyzed methodologies, value and rule of targets in order to create a continuum between assessment plan, project and heterogeneous rules defined by Facility Manager, IT Manager and Security Manager.
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
CCTV solutions and trends about security settings
1. CCTV SOLUTIONS AND TRENDS IN THE SECURITY SETTINGS (part
of Project about Video Archive Search and Analysis)
CCTV today, through several kinds of area network (MAN, WAN and so on) is getting pervasive and distributed and
looking at the costs for every bit transported from camera (signal generator) to server (main receiver), it’s possible
increase the number of point of observation for each recorder and also for each control room.
Resolution is the second point of value, talking about the recent CCTV technology because it gives a chance to install less
cameras for square meter, reducing recurring costs for recording, transmitting and maintaining.
Third point of value for new CCTV technology, are analytic algorithms who provide to record, alarm, automate answer
through triggers previously set up. This benefit becomes strategic when a single operator has to manage a lot of cameras
or when we have to save bandwidth along the network.
Finally, CCTV trendsetter is bringing inside cameras recording and analytic processes so in a not so distance future we’ll
be able to have on the network only alarms, playback or live video when it needs.
Above described situation are possible today and tomorrow because CCTV devices, are getting EDGE devices and
storage systems, are off-the-shelf servers instead of proprietary DVR (as in the past) and this means that all video
processes, will be fully supervised by the software.
Those advantages have kept safe most of standard CCTV design rules but other must be rewritten in order to have a safe
CCTV system for a safe observed area.
DESIGN CRITERIA
Time to react
Camera can see but not take an action so to calculate a right distance between officer and threat it’s important to fit the
following equation
Time-to-sabotage < Time-to-discover + Time-to-react + Time-to-arrive (to the target)
Time-to-sabotage: time necessary by the terrorist or other threat (i.e.: natural event) to reach and destroy or damage the
target
Time-to-discover: time to understand that there’s a threat and where it is
Time-to-react: time to plan a pre-defined reaction
Time-to-arrive (to the target): time to reach the target by the right team capable to fight/solve that threat
Number of Camera Criteria
When in a shot there are more critical targets (i.e.: access doors) it’s strategic avoid that a fault can compromise the
predefined security level so high resolution camera can be used just to have a panoramic view, leaving dedicated
cameras for each strategic target
2. Number of Target in Panoramic Shot <= Number of Fixed Camera
Number of Target in Panoramic Shot: Number of target point defined previously by the Assessment Plan all visible
though a panoramic camera (usually a high resolution camera)
Number of Fixed Camera: Number of cameras who must installed for that defined Panoramic Shot
Network Infrastructure Security Level
Network infrastructure is usually shared between ERP and process application and security system. Logical security is
usually high to protect data and services by hacker attacks but usually infrastructure is not safe for physical and internal
assault. Racks and junction boxes are in unsafe area or low level access people can open and work in to racks or working
on network so network must have the same level of security systems in order to don’t have a lack on security chain.
IT Assessment Plan for IT ⊂Security Assessment Plan
IT Assessment Plan: Assessment Plan developed for network and its devices where they’ve evaluated logical and
physical protection
Security Assessment Plan: Assessment Plan to protect the whole area and IT Assessment Plan is included
R&D CRITERIA
Self-evaluation on Action
Computer graphic today can analyse tons of pixels creating automatically rules by itself. In other words today is possible
that a cloud of pixel with a particular shape can be automatically defined as an animal or a vehicle. So when an operator
has to search how many vehicles have transited on that way, the operator, without using advanced tools but only typing
“car + transit”, can watch easily all recorded scenes. At the same time, when an operator wants look for a person who was
running, he’ll type “person + run” and that’s it.
In this way complex and advanced tools used by experienced CCTV operators will be available also for operative officer or
in other words information available for everybody.
This is possible because CCTV Servers and EDGE cameras have a high MIPS on-board and they can manage locally this
semantic rules.
Common Platform
ONVIF and PSIA are today CCTV Security Standard so it’s possible record and watch playback. Idea is creating a
watermark linked at the frame instead of modify recorded video as usually happens in today market.
Through this approach when I watch a recorded video (or a live one) externally by the CCTV system (viewer or other
platform) I’ll be able to do this without using proprietary viewer as today happens.
Benefits will be available also in search and analysis mode because I’ll be able to apply the Self-evaluation on Action also
for external video.
3. OS Independent
Always information are useful where a threat is but rarely threat happens where Control Room is. Using Saas technology
tested on ERP market, correlated with Common Platform approach and mixed with Self-evaluation on Action, officer can,
autonomously, search and find whatever he needs in a while