Monday, August 15, 2022

Security Cameras in Medical Collage

 Security Cameras in Medical Collage

CCTV surveillance is now an integral part of the overall security apparatus across the world. The university has a significant responsibility to take appropriate steps to protect personal privacy and civil liberties when it operates security camera systems. When successfully deployed, security camera systems enhance overall campus safety and security, deter crime, and otherwise support the protection of people and property. A security camera is defined as video surveillance technology that records people’s activities in order to detect, deter, prevent, or investigate crime or other threats to public safety.

In a bid to improve the quality of medical education in the country, regulatory body NMC has issued an advisory recommending installation of cameras in the premises of all medical colleges and institutions. This is in continuation of the digital mission mode project being run by the National Medical Commission (NMC) and the erstwhile Medical Council of India to ensure and monitor availability of adequate number of patients teaching faculty and also to monitor regular teaching programs in the medical colleges. This is a step forward towards developing a robust monitoring mechanism and providing for transparency and accountability in functioning of medical colleges, official sources said.

If utilised properly, this would also be a way forward for digitisation of the assessment process for approvals being granted to medical colleges either for enhancement of under graduate courses or starting or enhancement of postgraduate courses, they said. "Use of such technology and artificial intelligence would make assessments and instructions transparent and an ongoing process instead of the current one time process," an official source said.

The most important things they can incorporate on all IP equipment are much more tangible—Trusted Platform Module (TPM) and National Defense Authorization Act (NDAA) complianceThe primary concern should be that the vendor is providing a system that is secure and in compliance with ISO 20243, particularly when it comes to assurances regarding the supply chain. Today more than ever, it is essential that video appliances are held to an IT standard, including TPM and NDAA compliance. The importance of making these properties a top priority has become a standard for end-customer expectations.
But installing a CCTV camera doesn’t mean you’re safe; here is a list of seven things you ought to consider before securing your territory with closed-circuit television cameras:

#1) Deciding how you’ll be monitoring the system

If you decide to monitor your system using the Internet, getting an IP Address for your Digital Video Recorder (DVR) or Network Video Recorder (NVR) will equip it to survey and record easily; an Ethernet cable carries all information via the Ethernet witch.

#2) Determining the number of Closed Circuit Television Cameras required

Depending upon the nature of your requirement and the expanse of the area you want to survey, decide on the number of cameras required to ensure complete security. As per the NMC guidelines, the medical colleges have been advised to install cameras at OPDs (depending upon number of OPDs in the college). The cameras should cover the medicine, surgical, gynaecological, paediatrics and orthopaedics OPDs, the highly-visited OPDs in a medical institution.

#3) Positioning the CCTV cameras

Cameras if visible could caution the trespasser. Thus most people prefer having clandestine cameras to having exposed and evident ones! Contemporary CCTV cameras can be easily hidden from view by being in the most exquisite of crevices and clefts in the wall; these places also offer the advantage of protecting the cameras from extreme weather conditions such as hailstorms, high-speed winds, and rains. One camera needs to be installed at the main entrance of the hospital and college and two cameras at the patient registration counter. All lecture theatres in the medical college should be equipped with cameras.

The pre-anaesthesia area, recovery area in the operation theatre complex, faculty lounge and attendance marking areas, anatomy dissection hall, physiology laboratory, biochemistry UG laboratories, pharmacology laboratory, patient attendant waiting area and emergency and casualty ward need to be equipped with cameras, the NMC stated.

#4) Placing the DVR/NVR

It is paramount to secure the digital video recorder (DVR) or the network video recorder (NVR). If you lose the DVR or the NVR to the trespasser, needless to say, you lose all the money you spent on your CCTV camera along with your stolen valuables! If you place your DVR or NVR centrally, you can minimize your cabling cost and reduce the complexity of your closed-circuit television system.

#5) Deciding on power backup of CCTV Camera

The constant power supply would ensure incessant surveillance. Thus make sure you have both constant power supply and a reliable power backup in case of power cuts to ensure security at all times.

#6) Deciding how you’ll be create Secure Network system

NDAA compliance assures that the video recording appliance does not include System on Chip (SoC) or other components capable of processing software from banned Chinese companies. All servers and workstations use NDAA-compliant chipsets as a standard. Having the NDAA seal of approval guarantees that the product is fully supported under those regulations as federal agencies have banned all non-compliant equipment from RFQ’s and projects. Those companies not adhering to NDAA standards are unable to work with any federal organization via a published blacklist. Business and commercial entities are also following suit, as they have privacy concerns consistent with the federal government as well.

Trusted Platform Module enhances computer privacy and security. Consider it a hardware-level security measurement to protect your video recording device from malicious attacks. Once the TPM module is enabledthat physical chip is now permanently tied to that specific server or workstation and cannot be moved to any other system. TPM-based microchips on system boards offer another layer of hardware and intrusion security.

This software agnostic TPM module is utilized for high-level security file encryption, network security, and password management. These modules are secured by cryptographic algorithms and ensure total system security for the most sensitive data on your video recording system. As a matter of fact, TPM modules are a standard requirement from every video management software manufacturer and independent software vendor in the security marketplace.

#7) Testing the CCTV Camera system

After you’re done with the installation process, it is very important to have a test run. Any problems that you might face with your closed-circuit television system, can be best fixed before it’s too late – a stitch in time, does save nine!

#8) Maintaining the CCTV-cameras

Best practices include cleaning the cameras on a monthly basis to rid them of any dirt, cobwebs. Timely replacement of the cables used is also advised to keep the systems from any potential failures in the most crucial of hours.

#9) "Cameras never lie". But how will one know, unless one 'sees' what the camera 'saw'?

Encourages all medical collage authority of CCTV to audit their own CCTV video footage as a standard operating procedure. Regular auditing of CCTV footage by the public means that the Police/LEA have more 'eyes' working for them through crowdsourced surveillance. This enables the Police/LEA in identifying potential threats and dangerous situations before they occur. Also, in the case of a crime, if a standardized incident report is delivered to the Police/LEA by the affected party in PowerPoint carrying the entire story (what, where, when, why, who, how, and the video clip), crime will get solved faster.

The aim is to bring the colleges under the National Medical Commission’s surveillance, protect doctors from any attack during duty hours. There are a lot of brands in the market selling closed-circuit television cameras. The best brands include Infinova, Hanwha Techwin, Avigillon, Pelco, Axis, NUUO, Milestone and GVD etc Solution for reliable CCTV cameras. To get free consultation contact us.



সুষ্ঠ প্রশাসন রোগীস্বার্থকে সামনে রেখে মেডিক্যাল কলেজগুলির দৈনন্দিন কাজে সরাসরি নজরদারি চালাতে উদ্যোগী ন্যাশনাল মেডিক্যাল কমিশন। আর এই জন্য দেশের সব মেডিক্যাল কলেজের মূল প্রবেশদ্বার-সহ ২৫টি স্থানে সিসিটিভি বসানোর ফরমান জারি করল কমিশন। কমিশনের এই সিদ্ধান্তকে বেনজির বলেই মনে করে শিক্ষক-চিকিৎসকদের বড় অংশ। দেশের সব সরকারি বেসরকারি মেডিক্যাল কলেজ হাসপাতালে সিসিটিভি (CCTV) বসানোর নির্দেশ জারি করা হল। আর এই নির্দেশকে ঘিরে চিকিৎসকদের মধ্যে শুরু হয়েছে বিতর্ক। ন্যাশনাল মেডিক্যাল কমিশনের (The National Medical Commission) তরফে একটি অ্যাডভাইজারি করে দেশের সব রাজ্য সরকারকে মেডিক্যাল কলেজ হাসপাতালের মূল প্রবেশদ্বার-সহ রোগীর নাম নথিভুক্ত করার কাউন্টার, আউটডোর এমনকী প্রতিটি ফ্যাকাল্টির শিক্ষক, চিকিৎসকগণ যে জায়গায় দৈনিক উপস্থিতি স্বাক্ষর করেন সেই জায়গাতেও সিসিটিভি বসাতে প্রস্তাব দেওয়া হয়েছে। জাতীয় মেডিক্যাল কমিশনের আদেশনামায় একটি মেডিক্যাল কলেজের অন্তত ২৫টি স্থানকে নির্ধারিত করা হয়েছে যেখানে সিসিটিভি বসাতে হবে। ক্যামেরা IP সম্বলিত ও 4K মাত্রার বিশ্লেষণ যোগ্য সংরক্ষক যন্ত্র সাথে 4K  মাত্রার বিশ্লেষণ যোগ্য প্রদর্শিত  মাধ্যম ব্যবহার করা। 

যেসব স্থানকে সিসিটিভি বসানোর জন্য চিহ্নিত করা হয়েছে তার মধ্যে উল্লেখযোগ্য হল : মেডিসিন, শল্য চিকিৎসা, স্ত্রী শিশুরোগ এবং অস্থিরোগের আউটডোর। ) রোগীর অ্যানাস্থেশিয়া জ্ঞান ফিরিয়ে আনার এলাকা। ) প্রতিটি বিভাগের ফ্যাকাল্টি লাউঞ্জ এবং উপস্থিতি এলাকা। ) লেকচার থিয়েটার। ) মেডিক্যাল পড়ুয়াদের অ্যানাটমি ডিসেকশন হল। ) ফিজিওলজি, বায়োকেমিস্ট্রি ল্যাবরেটরি। ) প্যাথলজি মাইক্রোবায়োলজি ল্যাবরেটরি। ) ফার্মাকোলজি ল্যাবরেটরি। ১০) রোগীর অপেক্ষার স্থান। ১১) জরুরি ক্যাজুয়ালটি ওয়ার্ড।

ন্যাশনাল মেডিক্যাল কমিশনের চেয়ারম্যান ডা, সুরেশচন্দ্র শর্মা তাঁর প্রস্তাবে নির্দিষ্ট করে জানিয়েছেন, সিসিটিভিগুলি যেন ডিভিআর উচ্চক্ষমতার নেটওয়ার্ক যুক্ত হয়। সাংসদ তথা চিকিৎসক সংগঠন আইএমএ তরফে শান্তনু সেন বলেন, ‘‘কিছু অসাধু রয়েছেন। তাঁদের নিয়ন্ত্রণ করতে কমিশনের এই পদক্ষেপ।’’ জাতীয় মেডিক্যাল কমিশনের এই প্রস্তাবে চিকিৎসক-অধ্যাপকদের একাংশ যেমন অসন্তোষ প্রকাশ করেছে তেমনই আরেকাংশ বলছে, এই নিয়ম আগেই ছিল। কলকাতা মেডিক্যাল কলেজের অধ্যক্ষ ডা. রঘুনাথ মিশ্র বিষয়টিকে গুরুত্ব দিতে নারাজ। তাঁর কথায়, কলেজ বা হাসপাতালের কোনও জায়গা সিসিটিভিতে দেখতে না পেলে মাঝে মধ্যে ফোন করে।

মেডিক্যাল কলেজগুলির দৈনন্দিন কাজে সরাসরি নজরদারি চালাতে উদ্যোগী ন্যাশনাল মেডিক্যাল কমিশন। দেশের সব মেডিক্যাল কলেজের মূল প্রবেশদ্বার-সহ ২৫টি স্থানে সিসিটিভি বসানোর ফরমান জারি করল কমিশন যেটা খুব ভালো প্রস্তাব, কিন্তু পাশাপাশি ক্যামেরা চলছে কিনা এবং তা ঠিকমতো সংরক্ষিত হচ্ছেকিনা তা দেখার জন্য প্রতিদিন ভিডিও চিত্র নিরিক্ষণ করা উচিত। IP ক্যামেরা বর্তনীতে যেন এই ভিডিও প্রতিলিপি সুরক্ষিত থাকে সেবিষয়ে নজর রাখতে সেই ধরণের IP ক্যামেরা DVR / NVR  বসানো উচিত। আপনাকে দেখতে হবে সেই IP দ্রব্যটি যেন NDAA অনুমোদিত হয়।  


Monday, August 1, 2022

Control physical access to rack level

Control physical Access to Rack Level 

In our networked and internet-dependent world, securing personal and business data from theft, hacking and other forms of cybercrime has become an issue of paramount importance – and the world’s data centers, where data has its physical presence, are key points where multiple layers of security need to be established and sustained. Electronic locks offer audit trail reporting capabilities and can also be set up to provide local alerts, including indicator lights, beacons or alarms.

Securing information within the data centre presents heightened physical security and access control challenges. Heavy-duty perimeter security and room level access control prevents access to the building and server rooms, but once inside, data storage equipment may not include that same level of security. In some co-location centres for instance, cabinets containing particularly sensitive data are protected by a chain link fence enclosure; however, these cabinets are still at risk should an unauthorised individual gain access to that enclosure.

For complete physical security, the actual server cabinets should be secured to the same degree as the data centre itself. Verification of credentials for access control and, where required, auditing rack-level access can prevent costly data breaches and stiff penalties for non compliance. Data centre managers can avoid these risks by incorporating intelligent, reliable electronic locking systems at the racklevel to protect access to sensitive information.

Extending physical security to the rack level

Effective rack-level access control systems are specifically designed for server cabinets with a flexible, open architecture that allows them to be easily integrated with any existing security system. An effective physical security system is typically comprised of three key elements: user interface, intelligent lock, and remote control and monitoring. Many data centers focus security efforts on access control to the grounds, the buildings and the secure areas within:

·       Access to the building is often gated, with exterior physical protection elements to secure the entire site and requires a guard to verify and document entry through the gate.

·       Once an individual enters the facility, they typically sign in with a live guard and receive a credential for access to specific areas.

·       In some facilities, access to a specific floor or enclosure area is further controlled by a “man trap” with two sets of doors accessed via an electronic credential, either RFID or biometric.

Electronic access solutions, like electronic locks and latches, offer a modular security solution designed for simple integration into Data Center Infrastructure Management (DCIM) systems and existing server rack enclosure designs.

Electronic Access Solutions (EAS) typically consist of four main components:

·       Electromechanical Lock or Latch– The most critical component of any electronic access system,  this mechanism performs the electromechanical locking or unlocking function upon receipt of a valid electronic signal and provides an output of its status to external monitoring systems.

·       Access Control Device – The access controller acts as the human interface, allowing the electronic lock  to be remotely operated through a variety of options, such as digital keypads, biometrics, RFID readers, and other wireless communication devices such as  BLUETOOTH enabled smartphones and tablets.

·       Remote Monitoring – Electronic access solutions have the unique ability to capture an electronic "signature" for each access attempt. This info, together with additional security and environmental data, can be output to a variety of devices, from simple indicator lights to networked, software-based remote monitoring systems.

·       Manual Override – In some cases, an override system is required to provide access in the event of a system power failure. This override system can be mechanical, providing direct mechanical actuation of the lock, or electrical, providing external power in the event of a system power failure.

The key element of effective rack level electronic access systems is the use of intelligent electronic locks that restrict access through the validation of user credentials. Electronic locks can be integrated with a variety of rack level access control devices, such as digital keypads, RFID card readers, biometric readers and electronic key systems.

Suprema Mobile Access allows you to use your own smartphone as a key to access doors, facilities, and more. By using your smartphone as a credential, managing and using an access card becomes easier, faster, and safer. The smartphone can then send audit trail data wirelessly to the cloud via a cellular or Wi-Fi connection for audit trail reporting. This unique solution provides remote access control without the need for a physical network connection. Mobile Access supports both NFC and BLE for full compatibility with various types of smartphones.

Additionally, maintaining automatic digital documentation is more convenient than manually tracking and recording access. Rather than keeping track of mechanical keys – particularly in a co-location setting – electronic access allows administrators to upload (or delete) electronic credentials from their user database. With networked systems, these updates to the approved list can be made remotely, from anywhere in the world. With cloud-based solutions, this can be accomplished wirelessly, using Bluetooth enabled mobile devices.

Integrating rack level EAS into existing data centers

The entire IT and data center industry must continue to apply every tool available to secure personal and corporate data and applications from identity theft, malware, hijacking and other hacking attacks. Using electronic access solutions to secure the server racks is the final component in creating a fully secure data center. Rack level electronic access provides a controlled physical security solution that, when integrated into existing security and monitoring systems, provides a complete end-to-end data center security solution.

Cost-effective rack level security solutions are available, depending on the specific application. For example

·       Self-contained solutions that are generally battery-operated and offer simple, drop-in installation and programming to provide integrated access control and electronic locking in a single self-contained device.

·       Standalone solutions that offer basic plug-and-play access control without the need for software or network administration where remote control and monitoring is not needed.

·       Wireless remote controlled solutions that leverage NFC and BLE connectivity with cloud based web portal credential management and monitoring to provide the simplicity of a standalone system with the benefits of a networked control system

·       Integrated solutions that can be combined with building access control and monitoring systems to incorporate cabinet-level access control into existing security systems.

·       Independent networked solutions that can be used to monitor and manage rack access across networks from a host computer for remote system configuration, access control and the monitoring of multiple access points.

Streamlining migration between platforms

Rack-level electronic locks may incorporate an RFID reader with industry standard Wiegand outputs that can tie into any traditional building system. When integrating rack-level access control solutions, there may be a need to support both proximity and smart card RFID protocols. By integrating an industry standardised electronic locking and access control solution that reads multiple RFID formats, data centre managers can leverage their existing building security system for rack-level access control regardless of card technology used. This type of solution offers simplified installation, allowing personnel to use their existing credentials to access multiple areas within the data centre – from the server room to the rack level.

Physical access control across the facility

In today’s highly regulated data centre environment, access control and monitoring at the rack level are a must. While significant resources are dedicated to fighting online cyberattacks, physical protection of stored data is equally as important. The need for increased security and compliance with a myriad of regulations necessitate access control and monitoring capabilities for the actual cabinets where data is stored.

Data centre managers can achieve physical access control by implementing electronic access solutions, which offer solutions for audit trail maintenance and compatibility with existing facility-wide security systems. Protecting data within facilities requires the same level of access control for racks as the buildings that house them.

Organizations should monitor the safety and security of the data center rack room with authenticated access through the following systems:

·        Closed-circuit television (CCTV) camera surveillance with video retention as per the organization policy

·        Vigilance by means of 24×7 on-site security guards and manned operations of the network system with a technical team

·        Periodic hardware maintenance

·        Checking and monitoring the access control rights regularly and augmenting if necessary

·        Controlling and monitoring temperature and humidity through proper control of air conditioning and indirect cooling

·        Uninterruptible power supply (UPS)

·        Provision of both a fire alarm system and an aspirating smoke detection system (e.g., VESDA) in a data center. A VESDA, or aspiration, system detects and alerts personnel before a fire breaks out and should be considered for sensitive areas.

·        Water leakage detector panel to monitor for any water leakage in the server room

·        Rodent repellent system in the data center. It works as an electronic pest control to prevent rats from destroying servers and wires.

·        Fire protection systems with double interlock. On actuation of both the detector and sprinkler, water is released into the pipe. To protect the data and information technology (IT) equipment, fire suppression shall be with a zoned dry-pipe sprinkler.

·        Cable network through a raised floor, which avoids overhead cabling, reduces the heat load in the room, and is aesthetically appealing.

 

Friday, July 15, 2022

Planning a Security Intrusion System Installation Location

Planning a Security Intrusion System Installation Location 

The first step when installing any alarm system is to determine what you will install and where. Below is a typical floor plan from a home builder that has been marked up to indicate where alarm components will be installed. These simple plans are the type that builders normally provide to people looking to build a new home and can sometimes be found on the builder's web site. Marking up a copy of these plans is a good place to start to determine how many window & door sensors and motion detectors you will need to protect the entire home.

Sample Alarm Wiring Plan:

Legend

P:     Main Alarm Panel

K:     Keypad

        Input Devices

M:     Motion Detector

D:     Door Sensor

W:     Window Sensor

G:     Glass Break Sensor

L:     Liquid/Water Sensor

        24 Hour Input Devices

F:     Fire/Smoke/Heat Sensor

        Output Devices

H:     Horn/Siren

S:     Strobe Light



The first major decision is to determine if you want to have sensors for every window in the home or are motion detectors good enough to provide coverage. A quick look at these floor plans shows that wiring sensors for every window more than doubles the amount of wires that you will need to run.

A typical entry level panel is limited to 8 zones. Even higher end panels need expander cards to support more than 8 zones. Even if you have more than 8 sensors you can still use an 8 zone panel. You will just need to wire multiple sensors to a single zone. When a zone with multiple sensors is tripped, you will not be able to determine which sensor is the cause. Also, if there is a fault/error with a multiple-sensor zone it will be more difficult to diagnose.

Here are some examples of 8, 16, & 32 zone setups.

8 zone: - Assumes Fire detectors are handled separately

·        Living Room Motion Detector

·        Family Room Motion Detector

·        Dining Room Motion Detector

·        Basement Motion Detector

·        Front Door

·        Back + Garage Door

·        Dinette Glass Break Sensor

·        Water Sensor

16 zone: - The above 8 zone layout plus window sensors (multiple windows per zone)

·        Dining Room Windows

·        Living Room Windows

·        Family Room Windows

·        Kitchen/Laundry Windows

·        Owner's Bedroom/Bathroom Windows

·        Bedroom 2 Windows

·        Bedroom 3+4 Windows

·        Basement Windows

32 zone: - With 32 zones, every sensor indicated in the floor plan above will have its own sensor. 

There are other considerations when combining sensors into a single zone. Alarm systems can be activated with some zones disabled. For example, if you activate the alarm at night when you sleep you want the doors and windows protected, but you do not the motion sensors active. You probably want the motion sensors disabled so that you can walk around the house without setting off the alarm. Therefore, you should not combine the window & motion sensors from the same room into a single zone. During a hot summer night you may want to leave the windows in your room open, but not any of the downstairs windows. Again, these windows would need to be in separate zones so that you could leave upstairs windows open but have the downstairs windows protected.

If you feel any support required, then mail us with your details ssaintegrtae@gmail.com