Quantcast Section 8: Alarm Reporting and Display

Share on Google+Share on FacebookShare on LinkedInShare on TwitterShare on DiggShare on Stumble Upon
Custom Search

Section 8:
8.1  Intrusion Detection System Integration.  The focal point of IDS
integration is at the alarm reporting and display location.  Regardless of
the sophistication of the total system employed for facility protection
(from a simple local annunciator to a complex computerized display console),
all of the devices installed for remote detection, access control
assessment, and communication need to be terminated at a control point for
human interface and response.  In many applications involving multiple
protected areas within a facility complex, the control network will be
comprised of a variety of local control units to gather communications from
card readers for access, alarm points for detection, and CCTV for
assessment, and transmit this data to a central console for command,
control, and communications with on- and/or off-site security response
resources.  Much of the state-of-the-art commercial technology currently
on-line has been developed with these centralized control functions as
cost-effective requirements.  While this manual does not propose the
integration of ancillary functions such as energy management and equipment
monitoring, Figure 50 displays the range of applications currently
available.  The remainder of this section will discuss the basic issues,
options, and elements involved in this critical integration point of alarm
reporting and display.
8.2  Locating the Alarm Control Function.  Many factors will influence
the decision of where to locate the intrusion detection system (IDS) alarm
control center.  The vital nature of the knowledge of alarm events require
that the functions be protected from both natural disaster and physical
attack.  These considerations of protection should be implemented following
a complete assessment of the vulnerabilities and requirements of the
facility and activity.
8.2.1  Threat Considerations.  The degree of threat associated to the IDS
control system is considered to be as high as the highest identified threat
to any portion of the facility.  This high degree of concern is a result of
the requirement to identify unauthorized intrusions and the probability of
failure in meeting this requirement if the alarm report processing system is
violated.  The control center operations are considered to be vulnerable
from both insider and outsider attacks and the principal vulnerability of
the communication of event and alarm reporting which serves to provide
information for response and resolution to detected intrusions.  These
apparent vulnerabilities can be diminished by using diverse termination
schemes, physical protection countermeasures at the control facility, and
duplicate control facilities (a primary and secondary control center with
fully redundant systems).  Physical site restrictions and budgetary
considerations will also be major influences in the implementation of an
operationally sound and cost-effective control center.
8.2.2  Termination Options.  Table 18 lists choices of the general
categories for reporting schemes.  Each of the following options may be
more effective when combined with one or more of the other methods.


Privacy Statement - Copyright Information. - Contact Us

Integrated Publishing, Inc.