Custom Search
|
|
|
||
excessive and/or telephone lines are unreliable. Recent advancements in
this technology offer potential advantages in security system
7.2.6 Fiber Optics. High security IDS data transmissions are increasingly
conducted via fiber optic cable. Data transfer on fiber optic cable is
immune to electrical influences, static electricity, lightning, water, and
EMI/EMR. Cable distances can be unlimited with the addition of repeater
units. Protection against surreptitious compromise is inherent due to the
sophistication of techniques required to monitor and compromise the signals
and the apparent loss of signal when the line is bent or cut. Justification
for fiber optic transmission techniques can be made using the following
table if noted that the approximate costs are similar.
Table 16
Protective Techniques
for Alarm Communication Links
PROTECTIVE
COMMENTS
ATTACK
LEVEL OF
TECHNIQUES
TECHNIQUES
SECURITY
BURY THE
DIGGING WOULD
LOW TO
CABLE
BE NECESSARY
MODERATE
BURY THE
POWER TOOLS
MODERATE
CABLE IN CONCRETE
NECESSARY
FIBER OPTICS
BURIAL MAY
POSSIBLY THE MOST
BE DESIRABLE
SOPHISTICATED ATTACK
WITH EXOTIC TOOLS
HIGH
ELECTRET
MUST BE
POSSIBLY THE
CABLE
BURIED
MOST SOPHISTICATED
ATTACK
7.3 Remote (Control) Units. Remote or control units are essentially
junctions for portions of the intrusion detection system that provide
regulated power sources, distribution of communication, and sensor data
collection capabilities. A typical remote (control) unit is depicted in
Figure 44. Commercial products may be termed: data gathering units,
transponders, field communications, master or slave, auditors, and data
13.02-109
|
||