Saturday, October 15, 2022

Difference of Core i3, Core i5 & Core i7

Difference of Core i3, Core i5 & Core i7

 During Security Software installation we are giving some pre requisite to customer / we assumed what type of System hardware is required, accordingly get costing from Vendor. If you are System integrator, your design team must know about the processor.

Intel Core i3 Processor

This particular Intel processor is the entry level processor of this new series of Intel processors. While it may not be the fastest one of the bunch, it can get the job done, at least for most applications.

Mind you, if you need high speed, I suggest one of the other processors that I will unveil in front of your eyes later on in this post. Here’s some of the Core i3 features.

·        Uses 4 threads. Yes, it uses hyper-threading technology which is the latest craze due to its improved efficiency over earlier processors that were put on the market.

·        This processor consists of 2-4 cores, depending on which one you get your hands on.

·        Contains A 3-4 MB Cache

·        Uses less heat and energy than earlier processors, which is always a good thing in this day and age.

Intel Core i5 Processor

·        This is the mid-size processor of this bunch, recommended for those who demand a little speed, but not quite enough where the user will be running resource-intensive applications.

·        As with the Core i3 processor, this comes with 2-4 cores, the main difference is that it has a higher clock speed than the Core i3.

·        This is also a heat and energy efficient processor, but it does seem to be better at this particular job than the Core i3 processor.

·        The number of threads used in this is no different than the Core i3 with 2-4 threads, and it also uses hyper threading technology for a boost in performance.

·        The cache of the Core i5 is bigger than the Core i3, it’s at 3-8 MB.

·        The Core i5 is where the turbo mode is made available, this provides users with the opportunity to turn off a core if it’s not being utilized.

Intel Core i7 Processor

·        This is for the users that demand power, yes it does provide more power and if Tim Allen gets one of these, this would be the beast that he gets his hands on. Great for gamers and other resource intensive users. 

·        The cache on this one is 4-8 MB.

·        This processor comes with 8 threads, definitely enough to get the job done quickly, maybe even at the speed of light if you’re lucky.  And yes it also utilizes hyperthreading technology.

·        You will have four cores to take advantage of with this particular series.

·        And just like the other ones in this Intel series of processors, it is more energy efficient and produces less heat.

Below reviews the specifications (high-level) of 10th Gen Intel Core i7 processors as of late 2020.*

 

Cores/ Hyperthreading

Base Frequency

Maximum Turbo Frequency

Cache

Core i7 Laptops

4-8 / Yes

1.00-2.70 GHz

3.80-5.10 GHz

8-16 MB

(10th Generation)

Core i7 Desktops

8 / Yes

2.00-3.80 GHz

4.50-5.10 GHz

16 MB

(10th Generation)

The Intel Core i9 is often called Intel's processor line for "CPU enthusiasts," the early-adopters who always demand the industry’s latest and greatest. A Core i9-powered desktop or i9-powered laptop is great for users whose work requires extremely advanced computing capabilities (editing 4K video, for example). It’s also popular with high-end gamers who play live-action, multi-player, VR-based titles that can benefit from a CPU with hyper-fast cycle times and high core-thread counts.

The Core i9 debuted in 2017 along with a new socket-motherboard combination to support it. As this FAQ was written, the i9 had evolved to a deliver up to10 cores and 20 threads (desktop version). It costs more than the other members of the Intel Core family, but for certain applications, games and other workloads, the difference could be meaningful.

Table below lists the top-level specifications of Intel Core i9 processors (10th gen) as of late 2020.

 

Cores/ Hyperthreading

Base Frequency

Maximum Turbo Frequency

Cache

Core i9 Laptops

8 / Yes

2.40 GHz

5.30 GHz

16 MB

(10th Generation)

Core i9 Desktops

10 / Yes

1.90-3.70 GHz

4.60-5.30GHz

20 MB

(10th Generation)

Here are some broad statements addressing the comparative cost of Intel Core i9-enabled systems versus models with lesser processors, along with the kinds of users (and use cases) that are most likely to benefit from an advanced Core i9 PC:

  • Core i9 PC – Cost category
    • The Core i9 is the “enthusiast” line of Intel Core CPUs
  • Core i9 PC – Typical users
    • Processor early-adopters
    • Users of extremely demanding software
    • Gamers who always want the latest/greatest
    • Workstation users, server operators, etc.
  • Core i9 PC – Use cases
    • Everything the lesser Intel processors can do plus core-intensive activities such as editing huge video files, rendering complex engineering designs, acting as a server, and so on.

Saturday, October 1, 2022

Electronic Surveillance Threats

Electronic Surveillance Threats 

In 2017 the Supreme Court ruled in a landmark judgment that privacy is a fundamental right. From sophisticated spyware attacks to mass phishing via smartphones and the rise of facial recognition technology, the range and reach of surveillance threats to human rights defenders is growing.

For security teams trying to keep activists safe, it is a cat-and-mouse game as attackers rapidly adapt to developments aimed at protection.

“When cyber-attackers see people are switching to using (messaging app) Signal, for example, then they will try to target Signal. If people start changing to VPN technology, they will start blocking VPN technology. If people are using Tor browser, they will target Tor traffic,” says Ramy Raoof, tactical technologist with Amnesty Tech.

Automated surveillance equipment has become increasingly common and connected, making the technique more covert and pervasive.  Mobile hacking, social engineering, network monitoring, face recognition technologies, GPS tracking, and various other methods commonly employed to catch and prevent crime and terrorism can also be used against civilians.

Electronic surveillance threats – defending a facility against electronic surveillance is a serious challenge and one that hasn’t been made any easier by the proliferation of computer networks and wireless. Not only are businesses under threat from phone tapping, and video and audio surveillance, wired and wireless computer networks offer attackers a new dimension of intrusion.

Even the simplest electronic surveillance devices are diverse, with room transmitters being among the most common. Their role is to detect all the environmental noise emanating from the location in which they’re planted.

Primary variations with room transmitters relate to differences in power sources. In this case, either battery or mains power and it’s the battery powered devices that are most diverse. Such devices can be secreted inside almost any object allowing for their minimal space requirements. Examples include the inside of pens, calculators, clocks, photo frames, under carpet, behind curtains and underneath or inside furniture.

The types of battery used to power these devices varies too, depending on the design, size and planned use of the device. Self-contained transmitters designed for surreptitious surveillance favour small button batteries or higher performance hearing aid batteries. When size is less of a concern and length of transmission a higher priority, larger and longer lasting batteries can be used, including the latest lithium types.

Average transmission devices typically have dimensions around 19mm x 12mm x 9mm. Should a small transmitter be built into a pen or a calculator, transmission range will be limited, around 15-20m, though the use of lithium batteries will increase the range.

Mains-powered room transmitters draw current either directly from the mains voltage or trickle charge a battery that’s also used to power the device. The advantages of this technique where electronic intruders are concerned include the fact there will be less impact on main power sources that could be monitored for fluctuations. Should mains power be lost the device will continue to operate.

The key technical issue for mains powered transmitters is to reduce 240V of alternating current to a direct current, low voltage output of 6-18V. Designers are required to combine transmission circuitry along with a voltage dropper, rectification, smoothing and voltage stabilization circuits.

As a rule, the most popular way to get the small current and voltage requirements is to use a high voltage capacitor to act as resistance at the 50/60Hz mains supply frequency. Low power can be partially offset by injecting some radio power into the mains.

Should there be enough room and a sufficiently low risk of detection, it’s sometimes possible for a stepdown transformer to be used – this is inherently more reliable that capacitor leakage or dropper resistance techniques. It’s also possible for a transformer to supply a far greater level of power to a strong transmitter.

AC units can be located inside walls, ceilings, under floors, inside office equipment, in mains-powered clocks and within lamps and lamp holders to name just a few possibilities. One of the favoured methods of installing an AC bug is to simply plug in a dummy double adaptor to a power point in the room you wish monitor. Despite the simplicity of this technique, only the most observant would notice and even then, would be most unlikely to consider the appearance of the unit a threat to security.

Electronic intruders wishing to secure a standalone mains-powered transmitter are usually supplied with a square plastic box about 50mm x 50mm x 18mm, or an encapsulating board. There will be a pair of trailing leads coming from these units for connection to the live and neutral lines of domestic AC.

There are still PSTN telephone transmitters. These are connected to target telephone systems and transmit information to a receiving station located nearby. The 2 basic models are the series-connected transmitter and the parallel-connected transmitter. Both types either draw their operating voltage from the PSTN phone line itself, or carry their own batteries that may be trickle-charged from the phone line.

Series connected transmitters are connected between a telephone socket and a telephone. In this configuration, only that extension will be accessed by the listener. But in the event a series transmitter is used and located on the incoming wires of a 2-pair cable on the other side of a telephone socket, all extensions of the line can be accessed.

Muliplex telephone systems make life extremely hard for electronic intruders trying to record communications. Because these systems multiplex more than one signal onto a 2-pair cable, an intruder would need to employ a de-multiplexer to access phones.

Partially connected transmitters are different. Both incoming feed wires are connected to the parallel connected device, and this means the information will be transmitted if either phone is used. With a series device, the wiring of the telephone must be disconnected to allow insertion of the transmitter. But installation doesn’t mean cutting and stripping of feed wires. Instead, the device can be installed in a junction box that offers sufficient room, or even in a telephone.

Series devices are easiest for security managers to detect using one of the counter surveillance devices on the market that alert security staff to temporary disconnection of phone lines. It’s possible for alarm panels monitoring alarm systems to also monitor phone lines for integrity, with any breaches then reported.

Parallel series devices, however, can be installed without temporary line breaks and without effect on resistance. This makes them harder to detect, though if the unit is drawing power from its host, this will cause a voltage drop. Parallel devices are often equipped with alligator clips requiring no more than a few millimetres of cable to be stripped or a pair of bare terminals.

Battery-powered types are harder to detect and more effective in their operation. With their greater operating current, they can achieve greater operating ranges than bugs, giving 500-1000m ranges instead of 25-50m. Even harder to detect are small rain-proof telephone transmitters that can be connected to any point of the exterior wiring as it leaves a building or joins a telephone pole. Such a device might never be detected.

Mobile phones are usually tapped using spyware. This is a whole other science – it’s possible for experts to search for spyware and users might notice quirks like rapid battery drain, though it can be difficult to know whether this is caused by an illicit piece of software, too many open apps, or simply an aging battery.

There are 2 primary groups of microphones available to an individual or organization seeking illicit access to communications. These are omnidirectional and unidirectional. Unidirectional microphones are portable and can be aimed at a target. They’re a parabolic dish-mount device that can be hand-held or tripod mounted. Such units offer excellent results for the electronic intruder. Using a 45cm reflector, high quality sound can be obtained at 250m. This performance increases fourfold if the reflector size is doubled but the unit becomes much more visible.

Omnidirectional units pick up audio signals coming from any point of the compass and in surveillance devices they usually have a diameter of about 6mm. As a rule, these devices will be more effective towards the front. Another type of microphone, the spike mike, is mounted on the end of a spike or probe. Microphones can be connected to the audio input of a miniature transmitter, allowing remote monitoring of conversations.

Like any other internet-connected device, surveillance systems can be vulnerable to attacks without the right cyber-security measures in place. Hackers can easily gain access to poorly configured devices with design flaws or faulty firmware and manipulate or steal data. With cyber-attacks accelerating, surveillance systems need to be protected from vulnerabilities, and require the same vigilance provided to IT systems.

Closed-circuit video cameras to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast television in that the signal is not openly transmitted, though it may employ point-to-point (P2P), point-to-multipoint (P2MP), or mesh wired or wireless links but transmit a signal to a specific place only. Not for open to all.

Cities in at least 56 countries worldwide have deployed surveillance technologies powered by automatic data mining, facial recognition, and other forms of artificial intelligence.

The ban that prohibits the purchase and installation of video surveillance equipment from HikVision, Dahua and Hytera Communications in federal installations – passed on year 2018 National Defense Authorization Act (NDAA). In conjunction with the ban’s implementation, the government has also published a Federal Acquisition Regulation (FAR) that outlines interim rules for how it will be applied moving forward. Like NFPA, now NDAA law accept globally.

Rules outlined in this FAR include:

·        A “solicitation provision” that requires government contractors to declare whether a bid includes covered equipment under the act;

·        Defines covered equipment to include commercial items, including commercially available off-the-shelf (COTS) items, which the rule says, “may have a significant economic impact on a substantial number of small entities;”

·        Requires government procurement officers to modify indefinite delivery contracts to include the FAR clause for future orders;

·        Extends the ban to contracts at or below both the Micro-Purchase Threshold ($10,000) and Simplified Acquisition Threshold ($250,000), which typically gives agencies the ability to make purchases without federal acquisition rules applying.

·        Prohibits the purchase and installation of equipment from Chinese telecom giants Huawei and ZTE Corporation. This would also presumably extend to Huawei subsidiary Hisilicon, whose chips are found in many network cameras;

·        And, gives executive agency heads the ability grant a one-time waiver on a case-by-case basis for up to a two-year period.

Specifically, NDAA Section 889 creates a general prohibition on telecommunications or video surveillance equipment or services produced or provided by the following companies (and associated subsidiaries or affiliates):

·        Huawei Technologies Company; or

·        ZTE Corporation

It also prohibits equipment or services used specifically for national security purposes, such as public safety or security of government facilities, provided by the following companies (and associated subsidiaries or affiliates):

·        Hytera Communications Corporation;

·        Hangzhou HikVision Digital Technology Company; or

·        Dahua Technology Company

While the prohibitions are initially limited to the five named companies, Section 889 authorizes the Secretary of Defense, in consultation with the Director of National Intelligence or the Director of the FBI, to extend these restrictions to additional companies based on their relationships to the Chinese Government. The prohibitions will take effect for executive-branch agencies on August 13, 2019, one year after the date of the enactment of the 2019 NDAA, and will extend to beneficiaries of any grants, loans, or subsidies from such agencies after an additional year.

The provisions of Section 889 are quite broad, and key concepts are left undefined, such as how the Secretary of Defense is to determine what constitutes an entity that is “owned or controlled by, or otherwise connected to” a covered foreign country, or how the head of an agency should determine whether a component is “substantial,” “essential,” or “critical” to the system of which it is part. The statute also fails to address the application of the prohibitions to equipment produced by U.S. manufacturers that incorporate elements supplied by the covered entities as original equipment manufacturers (“OEMs”) or other kinds of supplier relationships.

Section 889 contains two exceptions under which its prohibitions do not apply:

(1) It allows Executive agencies to procure services that connect to the facilities of a third party, “such as backhaul, roaming, or interconnection arrangements.” This likely means telecommunications providers are permitted to maintain common network arrangements with the covered entities.

(2) It permits covered telecommunications equipment that is unable to “route or redirect user data traffic or permit visibility into any user data or packets” it might handle, meaning a contractor may still be able to provide services to the Government so long as any covered equipment provided is unable to interact or access the data it handles.

The Constitution of India guarantees every citizen the right to life and personal liberty under Article 21. The Supreme Court, in Justice K.S. Puttaswamy v. Union of India (2017), ruled that privacy is a fundamental right. But this right is not unbridled or absolute. The Central government, under Section 69 of the Information Technology (IT) Act, 2000, has the power to impose reasonable restrictions on this right and intercept, decrypt or monitor Internet traffic or electronic data whenever there is a threat to national security, national integrity, security of the state, and friendly relations with other countries, or in the interest of public order and decency, or to prevent incitement to commission of an offence.

Only in such exceptional circumstances, however, can an individual’s right to privacy be superseded to protect national interest. The Central government passed the IT (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009, that allow the Secretary in the Home Ministry/Home Departments to authorise agencies to intercept, decrypt or monitor Internet traffic or electronic data. In emergency situations, such approval can be given by a person not below the Joint Secretary in the Indian government. In today’s times, when fake news and illegal activities such as cyber terrorism on the dark web are on the rise, the importance of reserving such powers to conduct surveillance cannot be undermined.

Risk of Electronic Security Threats to EHR/HIS is a critical issue because as per the privacy and security rule of The Health Insurance Portability and Accountability Act (HIPAA) the patient’s medical records are to be secured and private which can be accessible only the hospital authorities and the doctors in charge of the patient and the patient himself.

More advanced techniques now no longer require a target to actively click on a link in order to infect a device, explains Amnesty Tech security researcher Etienne Maynier. An attack using NSO spyware on an activist in Morocco covertly intercepted the activist’s web browsing to infect their phone with spyware. “Instead of waiting for you to click on a link, they instead hijack your web browser’s traffic and redirect you to a malicious website which tries to secretly install spyware,” says Maynier.

Successful targeting of well-protected phones is becoming more common and security teams are under added pressure from a burgeoning industry in so-called ‘zero-day’ exploits, in which unscrupulous hackers seek to find unknown vulnerabilities in software to sell. In May 2019, NSO Group exploited a zero-day vulnerability in WhatsApp that was used to target more than 100 human rights activists across the world with spyware.

How to keep your communications safe:

Using public Wi-Fi and VPNs: When you connect to Wi-Fi in a cafe or airport your internet activities are routed through that network. If attackers are on the network, they could capture your personal data. By using a VPN app on your devices, you protect your online activities when accessing public connections, preventing your internet activities from being seen by others on the same network. If you want to explore options, try NordVPN and TunnelBear.

Password management: Using a password manager means you don’t have to worry about forgetting passwords and can avoid using the same ones. It’s a tool that creates and safely stores strong passwords for you, so you can use many different passwords on different sites and services. There are various password managers such as KeePassXC , 1Password or Lastpass. Remember to back up your password manager database. Do not use password like password, ddmmyyyy, admin@123, administrator, administrator1, Super@1234 etc.

Messaging apps: When we advise human rights defenders about messaging apps, we assess each app on its policies (such as terms of service, privacy agreement), its technology (if it’s open source, available for review, has been audited, security) and finally the situation (if the app provides the features and functionality that fits the need and threat model). Generally speaking, Signal and Wire are two apps with strong privacy features.  Remember: Signal requires a SIM card to register, and for Wire you can sign up with a username/email.

Phone basics for iPhone or Android: Only download apps from the official app store to prevent your personal information from being accessed without your consent and to minimise the risk of attacks. Update your system and apps frequently to ensure they have the latest security patches. Enable ‘account recovery’ in case you lose access to your phone. Finally, choose a mobile screen lock that is not easily guessed, such as an 8-digit pin or an alphanumeric code.


Thursday, September 15, 2022

The 5 D’s Of Outdoor Perimeter Security For Business

The 5 D’s Of Outdoor Perimeter Security For Business 

When it comes to your business, you must ensure that every inch of it is protected. Many people ignore the outdoor perimeter of their establishment and focus on the inside. However, the outdoor security of your business is equally important. To protect your building’s entire structure, there is a key security principle that you can use: The five D’s. They are Deter, Detect, Deny, Delay and Defend. Each plays a specific role in securing your business’ exterior.

Deter

Your first line of defence is deterrence. In order to keep criminals away, you have to deter them from even thinking about setting foot on your property. To create a shield of deterrence, you need to start simple with signs. Put up signs that say “No Trespassing,” “Property Under Surveillance,” “We review CCTV footage Everyday”, “Guard Dog on Premises” and “Security Personnel On Duty 24-7.” You may not have a guard dog but the suggestion of one could be enough to keep criminals at bay. Another line of deterrence is to have surveillance technology. Having CCTV security cameras visible will discourage criminals.

Detect

Protect your building’s perimeter with equipment that can detect trespassers. Surveillance cameras, motion sensors, and other security equipment that can sense movement are all must-haves to ensure that anything out of the ordinary is detected.

Deny

To keep your perimeter secure while letting authorized personnel come and go, you need to deny those who aren’t supposed to be there. With a manned security gate at the main point of entry, anyone who isn’t supposed to be coming and going will be stopped immediately. Another way to deny criminals entrance to your property is with card access. This is an added security measure that ensures that even when people are in the building they need to use an access card to get into certain areas. You can even have your employees scan their cards at the manned security gate.

Delay

A delay system should be in place in case something should go wrong with your security system and an intruder is able to penetrate the building’s perimeter. This can be done through interior locking doors and barriers. By having a delay system you give your security team and the police enough time to respond to the intrusion and the criminal cannot get away.

Defend

To defend your perimeter against intruders you will need the help of local law enforcement and your security personnel. This involves having a protocol in place for making sure a criminal is being watched during the time period after they’ve been apprehended by your security personnel, and the time law enforcement arrives scene.

Creating optimal outdoor perimeter security requires planning. However, once you have the Five D’s in place, you can rest assured that your business is safe.

For, free suggestion consultancy about security alarm system can contact SSA Integrate via mail ssaintegrate@gmail.com 


Thursday, September 1, 2022

IP surveillance camera Installation for small industrial complex

IP surveillance camera Installation for small industrial complex 

As someone that is in the industry, I get this question on a Weekly basis. “Do I need IP or Analog cameras for my Company / Small Scale Industry?”  The answer to this question is quite simple, “How important is your stuff & Property?” There is one major truth about IP cameras that some people find hard to swallow and I am going to be very blunt about it, “Yes, they are more expensive”. Budget is another factor to consider. Small business owners often have to make budget their primary concern and want a quality camera that is easy to install, accessible on mobile, and hassle-free. Quite often selecting the best video surveillance camera is all about the best option within a limited budget.
End-users should look at the total cost of ownership, including warranties and cybersecurity protection. To achieve more cost efficiencies, end users will want an intelligent system, and again, this requires video analytics.

They are more expensive BUT the Cost vs. Price analysis shows that they are in essence less expensive when considering what you actually get with the IP camera solution.  So what do you get, Clarity is the huge one. With the right IP camera you can catch such great detail that you can not only see and describe who is walking up to the door, but the camera system can recognize the face, store it, and give you the exact time the person walked up to the door. While the camera system is doing this it also has the capability to catch the make, model and license plate of the car s/he drove up in. And if that wasn’t enough, the camera system can count the number of people that walk up to the door, pull into the drive way, or even walk by the house. And believe it or not, the system will even send you an email if someone walks up to the door after hours. The system can alert you if the UPS man walks up and leaves a package, or it can alert you if you have something on the porch and it suddenly walks off.
Can you get this type of clarity with an analog camera system?  Maybe?  On a clear day? The honest answer: probably not. Can you get these extra features like facial detection with an analog camera system? That answers easy, NO.
 
So now I ask the same question that I asked above, “How important is your stuff or property?”  or the real question is “How important is your safety?”.
 
Cybersecurity, encryption, and infrared imagery are also growing trends that are currently driving the selection of video surveillance cameras, especially for government and other critical infrastructure customers.
These facilities often prioritize cybersecurity, so procurement officers look for a system that meets regulatory requirements, is secure, and highly reliable — one that protects the data from the camera to monitoring.
Location and threat type factor into the decision as well. Even the best outdoor security camera system won't be effective if installed indoors. Thermal cameras can detect potential intruders at a distance of up to 15 miles, providing an extra margin of response time. Explosion-proof cameras, commonly used in hazardous industries, are hardened with protective housing.
Another factor end users need to consider is installing a completely new system or adding to an existing one. With a new build, they have a blank canvas to work with that can be customized to match the end user's needs rather than retrofit new equipment to an existing system.
 
The most critical factor in selecting the best video surveillance camera is to understand its ultimate purpose — the problems it's required to solve and what it's expected to provide in the way of detection, identification, and data-mining capability. Pain points such as 24/7 monitoring of the premises and compliance requirements set by the enterprise business policies all need to be considered during the selection process.
 
Determining the number of areas of interest, how much of them to cover, and how close they are to each other is the next step. These parameters will determine the types of cameras required and how many. For example, you can achieve adequate coverage of an area using multiple fixed cameras or with just a few pan-tilt-zoom (PTZ) cameras.
 
Risk assessment should be performed to ensure the design of the system results in an installation that adequately addresses the threats and reduces the security risks. In order to identify the level(s) of security required (and potentially therefore the grading of the elements of the system), an assessment of the factors which are likely to come into play is required. In very global terms, from a security perspective these elements are typically considered as:
Threat (Who): The threat will typically be defined as the persons or events to be protected against. Threats will vary greatly in termsof objectives, determination, capability, resourcefulness,
Vulnerability (What / Where): The vulnerability will typically be the areas of concern that require protection. The level of vulnerability will be defined by numerous factors such as desirability of the objects in the area, ease of access, operational hours of the environment, exposure / secluded nature of the area.
Risk (What if?): Risk is effectively the consequence of a successful or attempted intrusion or event. These risks can be wide and varied and not immediately obvious. Risks and impact levels of each identified risk will typically vary depending on the nature of site. Risks can include:

1.   Immediate Financial Loss: Immediate value of items lost.

2.   Ongoing Financial Loss: Increased insurance premiums, time to return to profit.

3.   Personal Safety: Injuries to staff and / or members of public involved in violent incident.

4.   Stress Related Issues: Reduced staff morale, loss of staff due to safety concerns.

5.   Non-financial loss: May include loss of intellectual property, company data or similar.

Typically security systems cannot change the identified threat or alter the risk, but well deployed security measures significantly reduce the vulnerability. This in turn helps to reduce the likelihood of risks occurring.
 
These services are provided in different environments, such as swimming pools, fitness areas, dining halls, common areas and individual rooms. Each area has its own potential risks; for instance, guests can slip and fall near the swimming pool area if not properly maintained or they may get injured in the fitness area. Some of the most common causes of injury in these places are:

1.   Physical Attacks: Although the premises of hotel and hospitality providers are considered safe, in some crowded and low budget hotels, criminals may attack guests for their money. In these situations, the presence of outdoor surveillance cameras acts as an evidence against those criminals.

2.   Slips: Usually, the flooring is not similar in all areas of the premises. The guests being new generally do not pay much attention towards the uneven flooring and so they may slip and fall. Moreover, cracked flooring, worn-out carpets and wet floors are some of the major causes of slip and fall accidents.

3.   Broken Furniture: In order to save money, some hotels do in-house repair of furniture that broke down due to overuse. Because of its age and some guests’ weight, the furniture may collapse and injure the guests.

It is important to consider the level of detail required in an image so that it matches the need of the user. This should be discussed with the client. The practical effect of this is that a camera may need to have a wider or narrower field of view so that the necessary amount of detail can be seen and that in some circumstances more cameras may be needed, either to increase the area covered with the same detail or to allow for different levels of detail to be seen from the same view.
 
Whether the different levels of detail can be achieved using a single PTZ or single camera of high resolution is a matter that should be agreed.
 
A lens is a transparent optical device with perfect or approximate axial symmetry which transmits and refracts light, converging or diverging the transmitted light and to form images. A simple lens consists of a single optical element. A compound lens is an array of simple lenses (elements) with a common axis; the use of multiple elements allows more optical aberrations to be corrected than is possible with a single element. Lenses are typically made of glass or transparent plastic.

The measure of the fine detail that can be seen in an image. For analog systems this is typically measured in Television Lines or TVL. Higher TVL rating, the higher the resolution. Same way megapixel (MP) like 1.3mp, 2mp, 4mp, 8mp etc.
 
Resolution-horizontal
The amount of resolvable detail in the horizontal direction in a picture. It is usually expressed as the number of distinct vertical lines, alternately black and white, which can be seen in a distance equal to picture height.

Resolution-horizontal - vertical
The amount of resolvable detail in the vertical direction in a picture. It is usually expressed as the number of distinct horizontal lines, alternately black and white, which can theoretically be seen in a picture.
 
Detection, Recognition and Identification (DRI) in video surveillance is very important terms to get image details. DRI ranges, expressed in meters, km (or miles), can be found in the specification table of infrared camera brochures.
The terms “Detection”, “Recognition” and “Identification” were defined as follow:

·        Detection: ability to distinguish an object from the background

·        Recognition: ability to classify the object class (animal, human, vehicle,  …)

·        Identification: ability to describe the object in details (a man with a hat, a Jeep …)

As a best practice, do not assume the camera resolution is everything in regards to image quality. For a camera to operate in a day-night environment, (the absence of light is zero lux), the night mode must be sensitive to the infrared spectrum. It is highly recommended to conduct tests or pilot installations before buying large quantities of any model of camera.

Considering Small Scale industry owner agreed to install PTZ cameras & as per below drawing want to execute this project.

Considering Product Make is under NDAA Compliant IP Surveillance Cameras

BOQ of this Projects are

SL NO

Item Description

Qty

1

Supply of 1080p Resolution IP IR Outdoor PTZ Camera 4.6mm-165mm Vari focal Lens, 36X optical Zoom, 1/2.8" SONY Starvis Back-illuminated CMOS Sensor. IR 120Mtr and True Day/Night.

2Nos

2

Supply of 04CH Embedded Linux NVR with upto 6TB SATA Port; H.265; 1nos HDMI out, 1Nos USB.

1Nos

3

Supply of 2 TB Surveillance Hard Disk for NVR

1Nos

4

Supply of 04 PORT Network Switch for IP  Surveillance Camera

2Nos

5

Supply of 2C 1.5sqmm Armour Copper FRLS Cable.

90Mtr

6

Supply of 20mm PVC Conduit/ PVC Casing with accessories

30Mtr

7

Supply of CAT6 Cable to connect IP Camera to switch

 

8

Supply of 2U Rack for Network Switch.

1Nos

9

Supply of 9Mtr PTZ Camera MS Pole Powder Coated without Junction Box arrangement for One PTZ camera installation.

1Nos

10

Supply of Junction Box, Welded body construction in CRCA MS sheets.
Size: 600mm(W) x 200mm(D) x 450mm(H). Single hinged front door in 2mm thk with lock and foamed in place gasketing. Powder coating shade RAL 7035. For One Antenna injector, Camera Power Supply & Switch etc.

1Nos

11

Supply of 867Mbps 5G High Power Outdoor PTP Antenna for Two Camera

2Nos

12

Supply of 32” Surveillance Monitor for Viewing two PTZ camera

1Nos

13

Supply of CCTV Signage (We Checked Video Footage Every day)

2Nos

14

Installation, Testing, Commissioning & Handover including all documentation, arrangement, Transportation, Lodging Fooding.

1 Lot

 Note: Civil work in customer Scope. UPS power arrangement is in Customer Scope.

Display screens may be desk or wall mounted with consideration given to the ergonomics of the operator. The display screens should be installed to minimise the effect of lighting, particularly sunlight, which can adversely affect the viewing experience. Wall or ceiling mounted display screens should be mounted using suitable brackets in accordance with manufacturer’s instructions.
Consideration should be given to the positioning of such screens to ensure they are above head height or not in a position where people may bang their head on them.
Your guest needs to be aware that they are entering hotel area that is being monitored by CCTV surveillance equipment. Signs should be placed so that they are clearly visible and legible. The size of the sign will vary according to the circumstances of its location.



Incident Response

Locally agreed procedures should detail the action to be taken in the event of an incident. These procedures should conform to those laid out as below:
• Action to be taken
• Who should respond?
• The timescale for response
• The times at which observation should take place
• The criteria for a successful response
• CCTV operators should maintain a record of all incidents in the appropriate incident log.

The overall indicator of successful response to incidents is that the CCTV scheme fulfils its objectives, i.e.:
• Restoration of tranquility
• Dispersal or control of the situation
• Prevention or minimization of injury and damage
• Reduction of crime and disorder, to improve safety and reassure the guest
• Identification of a suspect
• Gathering relevant information to assist in the subsequent apprehension of offenders
• Apprehension of a suspect with evidence
• Guest safety through effective evacuation
• Traffic flow restored
 
Our CCTV projects are intended to reduce cases of theft and misconduct in the organisation premises. Like any other project, our CCTV projects will involve a degree of cost to the client, in terms of the cost of the installation, maintenance as well the impact it will have on personal privacy within the precincts of the organisation/ business premises.
SSA Integrate  will carry out a detailed survey of the area under surveillance and armed with experience in the field of public / social control techniques is proposing to install/ deploy CCTV and/ or alarm surveillance system that will make it possible to have a real time total visibility of the Areas under surveillance.
CCTV can be effective in reducing or preventing crime if it is part of a broader crime prevention and community safety strategy, as such, it should not be implemented as the only means of addressing crime in public places.