Saturday, November 12, 2016

What happens during a fingerprints scan

What happens during a fingerprints scan?


What is a Fingerprint?
The skin surface of the fingers, palms and soles of the feet is different to the rest of the body surface. If you look at the inner surface of your hands and soles of the feet you will see a series of lines made up of elevations which we call 'ridges' and depressions which we call 'furrows'.
These ridges and furrows can be recorded in many ways. For example, the ridges can be inked and placed on to a piece of paper. This would leave a fingerprint like below. The black lines represent the ridges and the white lines represent the furrows.

Within these patterns the ridges can split or end creating ridge characteristics. There are 6 types of ridge characteristics.
Everyone has a unique and different distribution of these characteristics that develop in the womb and are persistent throughout life.

It is the coincidence sequence of these characteristics that allow me to make identifications. The coincidence sequence is whereby I will find the same characteristics, in the same order with the same relationship to each other in both the crime scene fingerprint and the fingerprint on the form I am using.

Fingerprints unique:
It's pretty obvious why we have fingerprints—the tiny friction ridges on the ends of our fingers and thumbs make it easier to grip things. By making our fingers rougher, these ridges increase the force of friction between our hands and the objects we hold, making it harder to drop things. You have fingerprints even before you're born. In fact, fingerprints are completely formed by the time you're seven months old in the womb. Unless you have accidents with your hands, your fingerprints remain the same throughout your life.

Enrollment and verification
Suppose you're in charge of security for a large bank and you want to put a fingerprint scanning system on the main entry turnstile where your employees come in each morning. How exactly would it work?
There are two separate stages involved in using a system like this. First you have to go through a process called enrollment, where the system learns about all the people it will have to recognize each day. During enrollment, each person's fingerprints are scanned, analyzed, and then stored in a coded form on a secure database. Typically it takes less than a half second to store a person's prints and the system works for over 99% of typical users (the failure rate is higher for manual workers than for office workers).
Once enrollment is complete, the system is ready to use—and this is the second stage, known as verification. Anyone who wants to gain access has to put their finger on a scanner. The scanner takes their fingerprint, checks it against all the prints in the database stored during enrollment, and decides whether the person is entitled to gain access or not. Sophisticated fingerprint systems can verify and match up to 40,000 prints per second!

How fingerprint scanners work
a computer has to scan the surface of your finger very quickly and then turn the scanned representation into a code it can check against its database. How does this happen?
There are two main ways of scanning fingers. An optical scanner works by shining a bright light over your fingerprint and taking what is effectively a digital photograph. If you've ever photocopied your hand, you'll know exactly how this works. Instead of producing a dirty black photocopy, the image feeds into a computer scanner. The scanner uses a light-sensitive microchip (either a CCD, charge-coupled device, or a CMOS image sensor) to produce a digital image. The computer analyzes the image automatically, selecting just the fingerprint, and then uses sophisticated pattern-matching software to turn it into a code.
Another type of scanner, known as a capacitive scanner, measures your finger electrically. When your finger rests on a surface, the ridges in your fingerprints touch the surface while the hollows between the ridges stand slightly clear of it. In other words, there are varying distances between each part of your finger and the surface below. A capacitive scanner builds up a picture of your fingerprint by measuring these distances. Scanners like this are a bit like the touchscreens on things like iPhones and iPads.

Unlike ordinary digital photos, scans have to capture exactly the right amount of detail—brightness and contrast—so that the individual ridges and other details in the fingerprint can be accurately matched to scans taken previously. Remember that fingerprints might be used as evidence in criminal trials, where a conviction could result in a long jail sentence or even the death penalty. That's why "quality control" is such an important part of the fingerprint scanning process.


Here's how the process works with a simple optical scanner:
1.    A row of LEDs scans bright light onto the glass (or plastic) surface on which your finger is pressing (sometimes called the platen).
2.    The quality of the image will vary according to how you're pressing, how clean or greasy your fingers are, how clean the scanning surface is, the light level in the room, and so on.
3.    Reflected light bounces back from your finger, through the glass, onto a CCD or CMOS image sensor.
4.    The longer this image-capture process takes, the brighter the image formed on the image sensor.
5.    If the image is too bright, areas of the fingerprint (including important details) may be washed out completely—like an indoor digital photo where the flash is too close or too bright. If it's too dark, the whole image will look black and details will be invisible for the opposite reason.
6.    An algorithm tests whether the image is too light or too dark; if so, an audible beep or LED indicator alerts the operator and we go back to step 1 to try again.
7.    If the image is roughly acceptable, another algorithm tests the level of detail, typically by counting the number of ridges and making sure there are alternate light and dark areas (as you'd expect to find in a decent fingerprint image). If the image fails this test, we go back to step 1 and try again.
8.    Providing the image passes these two tests, the scanner signals that the image is OK to the operator (again, either by beeping or with a different LED indicator). The image is stored as an acceptable scan in flash memory, ready to be transmitted (by USB cable, wireless, Bluetooth, or some similar method) to a "host" computer where it can be processed further. Typically, images captured this way are 512×512 pixels (the dimensions used by the FBI), and the standard image is 2.5cm (1 inch) square, 500 dots per inch, and 256 shades of gray.
9.    The host computer can either store the image on a database (temporarily or indefinitely) or automatically compare it against one or many other fingerprints to find a match.
The matching algorithm finds out whether there is a match by comparing two templates extracted by the characteristic point extraction algorithm, specifically by comparing the positions of each characteristic point and the structure.

Friday, November 4, 2016

British and European Intruder Alarm Standards

British and European Intruder Alarm Standards

DD243
Code of Practice for installation and configuration of intruder alarm systems designed to generate confirmed alarm conditions.
BS 8473:2006
Code of Practice for Intruder and hold-up alarm systems - Management of false alarms
BS EN 50131 Series
European Standards on Intruder Alarms
(Originally due to commence October 2005)
PD6662:2004
Guideline for the implementation of BS EN 50131-1:2004

Introduction
To help ensure that alarms are designed, installed and maintained reliably, suppliers and installers make reference to a series of British Standards and Codes of Practice. Some of these have been withdrawn and replaced by the ‘European Standards for Intruder and Hold Up Alarm Systems' - usually referred to as the Euro Standards.
The Euro Standards only apply to new systems.  Existing systems remain subject to the British Standards and Codes of Practice applying at the time of their installation; but exceptionally may need to comply with the new Euro Standards if they require such extensive re-design/equipment replacement that they effectively become a ‘new system'.

Means of Introduction
Because some of the Euro Standards relating to components are not yet published, and the Euro Standards do not cover some issues that alarms may be required to meet in the UK to satisfy the police or insurers, an enabling ‘standard' has been prepared.  This outlines retained/additional UK requirements that apply alongside the Euro Standards and was published in August 2004 titled ‘PD6662:2004 - Scheme for the application of European Standards for Intruder and Hold up Alarm Systems'.
Timescale for Introduction of PD6662
A transition period operated until 1st December 2005, during which new alarms could be installed to previous British Standards or the PD6662 scheme.  Now PD6662 must be used.

Overview of EN 50131
The major differences between EN 50131 and the old BS 4737 are:
· Structured standards
· Grading of systems
· Classification of equipment
· Risk based
This provides a structured approach to:
· Assessment of risk
· Technical survey
· System design
· Installation of the system in accordance with agreed specification
· Installation of equipment in accordance with manufacturers' recommendations.
A significant advantage for insurers and surveyors applying European Standards to systems is the specification of grades appropriate to the associated Risk. One of the major differences in the European Standards is the grading of systems, which is not a feature of BS 4737.   

Security Grading
Under BS EN 50131-1:2004, intruder alarm systems will need to be Security Graded according to the kind of intruder considered likely to try to defeat the system.

Insurers are understood to support the Grading approach and it is expected that they will, in due course, recommend particular Grades of system in relation to particular premises risks.  Where this turns out to be the case, installers and customers may take the lead given by insurers, as regards the minimum Grade of system they require, and discuss whether to go for a higher Grade of system.

The grading of a system based on a structured risk analysis will determine the:
· Extent of the system
· Signaling
· Tamper security
Within the new European Standards there are four security grades:
· Grade 1 - low risk
· Grade 2 - low to medium risk
· Grade 3 - medium to high risk
· Grade 4 - high risk
Who Decides the Grade of Alarm? 
Installers
Installers are required to carry out a formal assessment of the theft risk to determine a suitable Grade of alarm.
To do so they will consider the items at risk, existing security arrangements and any previous thefts, etc.  Before they proceed they will seek the customer's formal approval, and may also suggest that any interested insurer be consulted. 

Insurers
Depending on the risk exposure, insurers may require an intruder alarm before providing certain insurance covers, eg theft.  As the Grade of an alarm cannot be readily changed after installation, it makes sense to check a proposed alarm with any interested insurer before proceeding.
Insurers may respond to a request to approve an alarm by visiting the premises, making a decision based on information already held by them, or by agreeing the outcome of the installer's risk assessment.
Insurers will make their own decisions, but as a general guide the following is likely: 
Detection and Control System
Grade 2 - Lower risk premises.
Grade 3 - Normal risk premises, ie all except those suitable for Grade 2 or 4
Grade 4 - Very high risk premises, eg cash handling centres, banks, museums.
A further inclusion in the European Standards is the classification of components that are used for the intruder alarm system installations. These will be classified, which in turn will determine where they are installed.
Detection and Control System - Grading
Apart from increasing control panel event memories and levels of recommended detection; the key difference between Grades 2, 3 and 4 is that movement sensors at Grade 3 must be able to detect ‘masking', ie something has been placed over the sensor lens and at Grade 4 ‘range reduction', ie something has blocked part of the detectors' field of view.

Key Action Steps 
When having a new alarm installed:
·        Use a reputable installer, eg one inspected by the NSI (NACOSS) or SSAIB.
·        Co-operate with the installer's risk assessment procedures.
·        Check any interested insurer agrees with the proposed alarm Grade, Detection, Signaling and Response.
·        Where police response necessitates a ‘Confirmation System' check that the installer designs a system that has:
·        Dual Path Signaling
·        Confirmation from each ‘at risk' area
·        A ‘Means of Unsetting' that does not prevent the police being called should an intruder force open the designated alarm entry/exit door.


 BS 8473:2006 European Standards for Intruder Alarm Systems

Code of Practice for intruder and hold-up alarms – Management of false alarms.

BS 8473 has been drawn up to assist all parties in the management of false alarms, to reduce the disproportionate level of resources being absorbed by the police, the alarm industry, customers and operators as a direct result of false activations.

Preventing false alarms: points to remember;
The intruder alarm system (IAS) is to be operated only by persons who have been correctly trained. If there is uncertainty about the correct operational procedures the alarm company should be contacted.
Before leaving the premises check that all doors and windows are physically secured. A walk around the supervised area is the only effective way of doing this properly.
Ensure that detection devices are not obstructed. In particular be careful that infra red beams and movement detectors are not obstructed by stock or other items.
If movement detectors are used do not introduce sources of heat, movement or sound into the area supervised by these detectors without informing the alarm company.
Always follow the entry/exit procedure agreed with the alarm company. Entry through any door other than the one designated should be physically prevented. Switching off the IAS is always the first task on entry.
Before entry, ensure that the means necessary to enter the premises and unset the IAS are known and available in a secure manner to the operator.
Inform the alarm company of any alterations to the premises which could affect the IAS. Do not permit people other than employees of the alarm company to make changes to the IAS. Place system on test when building immediately.
Treat the IAS with care. Wiring and detection devices can be accidentally damaged or moved. If this occurs inform the alarm company immediately.
After a false alarm, check the system carefully, and if possible, note the cause of activation. Inform the alarm company of the believed cause of the activation immediately.
Make sure regular maintenance checks are carried out by the alarm company and that you have the correct contact details for the alarm company and ARC. Remember that excessive false alarms can result in police response being withdrawn.
Most IAS require a mains electricity supply. If the electricity supply to your system is disconnected for more than 4 h contact the alarm company.
EN 50131 European Standards for Intruder Alarm Systems

EN 50131 was phased in to replace British Standards BS4737, BS7042 and BS 6799 and was adopted in October 2005 utilizing PD 6662:2004, an enabling document which facilitated the introduction of EN 50131 into the UK.

The difference between PD6662 / EN 50131and the old British Standards
PD6662 differs from former British Standards in the following ways:
It determines not only the system but also the component design requirements for Intruder and Hold-up Alarm systems.
A comprehensive Risk Assessment is required to determine the design criteria of the system.
Applicable to both hard-wired and wire-less installations.
Grading of systems is required to reflect "the risk". I.E. Grade 1 - Low Risk, Grade 4 - High Risk.

Does my existing system need to be upgraded to comply with PD6662
If your current system complies with the old British Standards and is working effectively changes are not required.
If any upgrade to your system is undertaken your insurance company will require the system to comply with PD6662.
If  you lose Police Response and the URN is withdrawn it can only be reinstated if the system is upgraded to comply with PD6662.

RISK ASSESSMENT
One of the most significant issues within the new EN standards will be evaluating the risk associated with the premises and determining a grade of system. This is because once the grade of a system is determined it will define the extent of the system, its signalling and tamper security requirements.

SECURITY GRADES
One of the most important aspects of the EN 50131 requirements is the concept of a security grade. For each installation the grade of system has to be chosen according to various factors. In the EN the grade is described in terms of the type of intruder and how much effort they would put into a burglary.
What are the Grades?
Grade 1 is for an installation with a low risk of theft. The property is not likely to attract intruders. It is assumed that a thief is likely to be opportunistic rather than bothering to plan things in advance. In the application guide (DD CLC/TS 50131-7) it assumes that an intruder is simply going to break open a door.
Grade 2 is for a slightly higher risk of theft. The property is likely to have something of interest to an experienced thief. In this case the intruder is expected to have some knowledge of how alarm systems work and possibly carry some tools to allow him to overcome a simple alarm system. The thief is likely to check the building for ease of access through doors, windows and other openings.
Grade 3 is for a reasonably substantial risk property. There is good reason to assume it may be broken into and might well contain objects of high value. An intruder is likely to gain access by penetrating doors, windows or other openings. The thief could be very experienced with intruder alarm systems and possess a number of tools and equipment to overcome the system
Grade 4 is for very high-risk properties. Intruders could be expected to plan a burglary in advance and have the knowledge and equipment to alter parts of the intruder alarm system to prevent detection. It is assumed that the intruder could gain access by penetration of floors, walls and ceilings. The intruder is unlikely to be working alone.

What Grade of System does my installation need?
This is difficult to say at the moment and opinion on this matter varies from country to country. The view in the UK tends to require grades that are higher than other countries (e.g. a shop in Belgium at grade 2 could be grade 3 in the UK). To a large degree the choice of grade would be guided by insurance companies. A typical view though could be:
· Grade 1 would only be of interest in domestic properties (without an insurance requirement for an alarm system).
· Grade 2 would be most domestic properties and low risk commercial (e.g. florists)
· Grade 3 would be for high-risk domestics and most commercial properties (e.g. Newsagent with cigarette sales)
· Grade 4 would be for extremely high-risk domestic and higher risk commercial properties (e.g. bullion stores).

Mixing Components of Different Grade
The EN standard says that it is not necessary to use the same grade of component throughout an intruder system.
If the installation is a grade 2 then there is no problem using, for example, a grade 3 power supply.
If however an installer fits a grade 2 component (such as a detector) in a system then that system is limited to grade 2 at best.
It is possible to have a defined part of a system at a higher grade so long as all associated parts are at the same (or higher) grade. For example a system combining intruder and hold-up (PA) functionality could have a grade 4 hold-up system whilst the intruder parts were limited to grade 3. But this example is only valid if the power supply, alarm transmission system and warning devices used by the hold-up (PA) parts are all grade 4. This would still allow intruder parts such as PIR's to be grade 3. The system as a whole is, of course, only grade 3. 

Friday, October 21, 2016

Power Line Communication Camera

Power Line Communication (PLC) Camera

Power-line communication (PLC) or Ethernet over Power (EoP).carries data on a conductor that is also used simultaneously for AC electric power. Transmission or electric power distribution to consumers. It is also known as power-line carrier, power-line digital. Subscriber line (PDSL), mains communication, power-line telecommunications, or power-line networking (PLN). As we know, WiFi IP Cameras was developed to reduce the cabling costs.
However, WiFi technology has its shortage. Such as low stability, limited transmission distance, Interference problem, big bandwidth consumption etc. All these shortage are no longer exists on our PLC Security Systems. With PLC technology applied in our IP Cameras and NVR, we have cracked the main pain points for Home Security Surveillance Systems.

The PLC Cam uses the house‘s power line like a long video cable, ensuring that no connections other than the power outlet are needed. Thus installation is particularly easy: plug the PLC Cam into the power outlet, connect the provided PLC adapter to the DSL router - you‘re done! Even while on holiday or at work: the direct Internet connection and app for Apple iPhone/iPad and Android devices makes individual monitoring possible anywhere in the world.
Power-line communication (PLC) carries data on a conductor that is also used simultaneously for AC electric power transmission or electric power distribution to consumers. It is also known as power-line carrier, power-line digital subscriber line (PDSL), mains communication, power-line telecommunications, or power-line networking (PLN).
A wide range of power-line communication technologies are needed for different applications, ranging from home automation to Internet access which is often called broadband over power lines (BPL). Most PLC technologies limit themselves to one type of wires (such as premises wiring within a single building), but some can cross between two levels (for example, both the distribution network and premises wiring). Typically transformers prevent propagating the signal, which requires multiple technologies to form very large networks. Various data rates and frequencies are used in different situations.'

A number of difficult technical problems are common between wireless and power-line communication, notably those of spread spectrum radio signals operating in a crowded environment. Radio interference, for example, has long been a concern of amateur radio groups.
Power line can be used to shorten the wiring so that safety cameras, speed up data transfer and recording to Nas and makes mounting the camera becomes easier. If it requires more than one then the connection can power-line connected to the access point in setting exudes wifi and emit a signal with a full bar to obtain the camera so that the camera is always a constant ping without breaking or disturbance barrier wall or conflicting signals.

Advanteges:
1. PLC signal is stable and relible. Siganl is much better than Wi-Fi. No consumtion of bandwidth, no interference.
2. Transmit distance is over 300meter over powerlines. No need dedicated cabling.
3. Plug and Play, super easy operation. We changed the professional CCTV system to easy handling consumer electronics.
4. PLC signal speed is over 200Mbps, 4-ch 1080p video streams flow without 
delay.

Disadvantages:
If your home electrical wiring isn't
up to date, you might not get optimal performance from a powerline networking solution. It's not as fast as Gigabit Ethernet speeds (the fastest networking solution for home or office), but it is on par with current Wireless-N Wi-Fi networking.

Powerline networking is often touted as one of the easiest and most affordable whole-home networking solutions because you don't have to lay a lot of cable or install more wiring in your walls. However, you will still need to purchase adapters that will plug into your electrical outlets. Compared to buying multiple adapters, the price of a single wireless router might make more sense depending on what you'll be networking.

You also have to be careful to choose powerline networking adapters and accessories that use the same standard. There are three standards available from a variety of manufacturers:
HomePlug AV (available from manufacturers like Belkin, Linksys, Netgear, and ZyXEL)
UPA, which stands for Universal Powerline Association (available from D-Link, Netgear, and others)
HD-PLC, which stands for High Definition Power Line Communication (available from Panasonic)

Saturday, October 15, 2016

WEP vs WPA

WEP vs WPA

The best way to secure your wireless network is to change the type of encryption that your computer uses to send data. The three most common choices for encrypting your data are WEPWPA, and WPA2. This guide describes these different types of encryption so that you can decide which is the best choice for your network.

WEP

WEP (Wired Equivalent Privacy) was introduced in 1999 and at first, it was thought to be as secure as a wired network. WEP uses a password to create a static encryption key that it then uses to encrypt data sent over the web. This means that the same key is used for all of the information or "packets" you send over the air waves during a session. This static key becomes a big problem with security because a key that doesn't change is much easier to attack than one that is constantly changing. WEP is not a "wired equivalent," as it's name suggests; it can be cracked in less than a minute by a commonplace hacker. Unfortunately, a lot of older routers have WEP as their default choice.

WPA and WPA2

Due to the major inefficiencies of WEP, WPA (Wi-Fi Protected Access) became available. WPA was the intermediate step between WEP and WPA2 and was not intended to be used indefinitely. WPA uses a type of temporary encryption key that changes with each packet sent over the web. Also, WPA enables your router to automatically reject any packets that it receives out of order. This is good because it prevents hackers from injecting packets onto your network which is one of the primary means of getting in.


In 2006 WPA2 became mandatory in all new Wi-Fi devices. WPA2 replaced WPA's temporary key with a superior government level security encryption. This upgraded encryption uses AES (Advanced Encryption Standard) thought to be uncrackable at this point. WPA2 is considered very secure.

WPA2 Modes

WPA2 has several different versions to choose from:
·   WPA2-Personal is sometimes referred to as WPA-PSK (Wi-Fi Protected Access Pre-Shared Key). With WPA2-Personal, you set up a password in your router which you share with those you want to have access to your network. This password is entered through the computer or device that is connecting to your Wi-Fi network. We recommend this security mode for home networks.
·   WPA2-Enterprise is used for businesses only.
·   WPA/WPA2 Mixed Mode may also be a choice in your particular router. This means your router uses WPA2 if possible but falls back on WPA when needed. Due to WPA2 being a much safer choice, we recommend not using this mode. If you have devices that are not compatible with WPA2, we recommend updating your equipment to better protect yourself against unwanted security attacks.
Both WPA and WPA2 require the use of a strong password, it is recommended that you use a password of at least 20 characters, including symbols and numbers. Check out this guide to learn more about how to create a strong password.

Recommended Wi-Fi Settings

The security of the information you send over the internet should be of top priority. We recommend using WPA2-Personal whenever possible since it has the strongest encryption. WPA should be a far second choice and WEP should not even be considered a choice. If you have a router newer than 2006 you should have a firmware upgrade that allows for WPA2-Personal, which we highly recommend upgrading to. If you have an older router, made before 2006, you may want to consider upgrading your device to a newer one that can be better secured.
Also note, that after changing your router to a different encryption type, you will need to re-configure all of your wireless devices to your network. Devices like wireless printers, phones, music players, gaming consoles, and wireless televisions may need to have their settings changed and be re-connected to you network.

Saturday, October 1, 2016

Wired or Wireless Analogue / IP CCTV cameras

Should I use wired, (cabled), or wireless analogue CCTV cameras? 
Choosing whether to use wired or wireless should be an easy decision.
There is only one question to ask: can I run a cable from my camera to recorder? If the answer is “yes” then you should always run a cable. If it is very difficult to cable then using a wireless camera may be an option, but only as a last resort.
Advantages of a cabled CCTV camera:
  • Reliability – a physical cable will always be a lot more reliable than a wireless camera
  • Less chance of interference – wireless cameras are prone to interference from many sources
  • Less expensive – wired cameras generally cost less
  • More professional – wireless cameras are only used in cheaper home systems
  • Security – wired cameras are very difficult to jam. Wireless cameras can be blocked very easily by many different pieces of electronic equipment, eg: Wireless Access Points, mobile phones, microwave ovens, TV’s, two way radio equipment, gaming equipment, energy efficient lighting, the list goes on....
  • Privacy – nobody else can see the cameras on your CCTV system, (CCTV means “Closed Circuit”), wireless cameras can be easily viewed by anybody with the right receiver, including your nosey neighbour!
  • Generally better quality.
  • Wired cameras can be connected to just about any CCTV recorder. Wireless cameras need specific wireless receivers, so they generally can’t be used from one system to another.
  • Higher quality CCD image sensor, gives a clearer, better balanced picture. Many wireless cameras use cheaper CCD sensor, the images look murkier.
  • Huge range of cameras to choose from, from Rs. 2500 up to Rs. 7500, wired cameras are available to suit just about any need, no matter how specialised.
Advantages of a Wireless CCTV Camera
  • Easy for non-professionals to install
  • Can work out cheaper – ideal for when capturing reliable, clear images isn’t important
  • Easy to receive the images with cheap wireless receivers – your friends and neighbours can easily see the images from your cameras too.
So there you have it, the answer is clear, never, ever use a wireless camera solution if you can avoid it. If you need to use a wireless solution because of the long distance involved, then use wireless transmitter.

5 Important Locations in Your House That Need To Be Secured
1.     Front Door
Experts state that almost 34% of all intruders enter through the front door. You will have to select a safe location for this camera and preferably place a protective covering over it so that the risk of tampering is minimized.
2.     Back Door
Expert state that 22% of all intruders use the back door hence this is also an important spot to place a surveillance camera. Make sure you place it at a location where it is out of reach and safe from projectiles.
3.     Off-Street Windows
Burglars often use windows that are not visible from the streets, to break into houses as this reduces their chances of being caught. Motion detectors or glass-break detectors are designed to detect such break-ins.
4.     Backyards
These can be an ideal place for robbers or burglars to start off at night. Night-vision surveillance cameras can be used in backyards along with motion-sensor floodlights.
5.     Basement Stairs
Basements usually have multiple small entry points like hatches, doors or windows which can be used to sneak in. A motion sensing alarm can be placed here to help catch any intruders.
Whether, its wired or wireless, surveillance cameras play a central role in protecting you and your loved ones. Installing surveillance cameras at the right points and keeping on top of your security system is essential and necessary.