Share on Google+Share on FacebookShare on LinkedInShare on TwitterShare on DiggShare on Stumble Upon
Custom Search
 
  
 


excessive and/or telephone lines are unreliable.  Recent advancements in
this technology offer potential advantages in security system
7.2.6  Fiber Optics.  High security IDS data transmissions are increasingly
conducted via fiber optic cable.  Data transfer on fiber optic cable is
immune to electrical influences, static electricity, lightning, water, and
EMI/EMR.  Cable distances can be unlimited with the addition of repeater
units.  Protection against surreptitious compromise is inherent due to the
sophistication of techniques required to monitor and compromise the signals
and the apparent loss of signal when the line is bent or cut.  Justification
for fiber optic transmission techniques can be made using the following
table if noted that the approximate costs are similar.
Table 16
Protective Techniques
for Alarm Communication Links
PROTECTIVE
 COMMENTS
ATTACK
LEVEL OF  
TECHNIQUES
TECHNIQUES
SECURITY  
BURY THE
DIGGING WOULD
LOW TO
CABLE
BE NECESSARY
MODERATE  
BURY THE
POWER TOOLS
MODERATE  
CABLE IN CONCRETE  
NECESSARY
FIBER OPTICS
 BURIAL MAY
POSSIBLY THE MOST
 BE DESIRABLE  
SOPHISTICATED ATTACK
WITH EXOTIC TOOLS
HIGH
ELECTRET
 MUST BE
POSSIBLY THE
CABLE
 BURIED
MOST SOPHISTICATED
ATTACK
7.3  Remote (Control) Units.  Remote or control units are essentially
junctions for portions of the intrusion detection system that provide
regulated power sources, distribution of communication, and sensor data
collection capabilities.  A typical remote (control) unit is depicted in
Figure 44.  Commercial products may be termed:  data gathering units,
transponders, field communications, master or slave, auditors, and data
13.02-109








Western Governors University
 


Privacy Statement - Copyright Information. - Contact Us

Integrated Publishing, Inc. - A (SDVOSB) Service Disabled Veteran Owned Small Business