Wednesday, August 16, 2023

Difference Between CCTV and Surveillance Cameras?

Difference Between CCTV and Surveillance Cameras?

When it comes to matters of security, there is a great deal of misunderstanding regarding the distinction between closed-circuit television and surveillance cameras. In spite of the fact that many people use these phrases synonymously, there is a significant difference between the two.

In this article, we will go over the key distinctions between closed-circuit television (CCTV) systems and surveillance cameras, and then we will assist you in selecting the system that is most suited to meet your requirements and how to Select The Right CCTV System.

What Is CCTV?

A CCTV system consists of a number of cameras to record activity, a digital video recorder (DVR) to store footage, and a monitor to view the recordings. You can also add security features like motion detectors and alarms.

Most people install CCTV systems for security purposes. They deter burglars and can help identify criminals after the fact. But they have other uses too. For example, you can use them to keep an eye on employees or children.

CCTV systems come in all shapes and sizes. They can be as simple as a single camera connected to a DVR, or they can be more complex with multiple cameras, different types of storage, and remote viewing capabilities. The type of system you need depends on your specific needs.

Installing a CCTV system can be a great way to improve security at your home or business. But it’s important to make sure you understand all the ins and outs before making any decisions.

What Is A Security Camera?

The word “security camera” is often used, although many people have no idea what they are. Monitoring and recording activity in a certain area is the primary function of security cameras.

They’re commonly found in public locations like shops, banks, and other establishments of a commercial nature. The usage of security cameras to discourage criminals and safeguard families is becoming more common.

There are a wide variety of security cameras to choose from. Small enough to fit in your hand, yet with a wide range of size options.

The region you want to keep an eye on will dictate the kind of camera you require. In order to watch your front entrance, you’ll need a different kind of camera than you’ll need to monitor your backyard, for instance.

Wireless and wired security cameras are available. A cable connects a wired camera to a recorder, such as a DVR. Wi-Fi is a common method of transmitting footage from wireless cameras.

Wireless cameras are preferred by many people since they are easy to set up and can be put anywhere in your house or company.

Analog and digital security cameras are two of the most common varieties. Analog cameras record footage using an analogue signal. Unlike digital cameras, this sort of camera is older and less prevalent.

What is The Main Differences Between CCTV and Security Camera

CCTV cameras, or closed-circuit television cameras, are a type of security camera that is typically used in public places in order to deter crime.

Security cameras, on the other hand, can be used in both public and private settings and are often used in homes in order to provide extra security. Here are five main differences between CCTV cameras and security cameras:

-CCTV cameras typically have a wider field of view than security cameras.

-CCTV cameras are usually mounted on ceilings or high up on walls, while security cameras can be placed anywhere that provides an adequate view.

-CCTV footage is usually monitored by security personnel in a separate location, while many home security systems allow users to monitor their own footage remotely.

-CCTV cameras typically record footage continuously, while security cameras can be set to record only when motion is detected.

-CCTV cameras are usually larger and more noticeable than security cameras.

Both CCTV cameras and security cameras serve an important purpose in terms of security. It’s important to choose the right type of camera for your needs in order to ensure that you’re getting the most out of your investment.

Comparison Table Between CCTV and Security Camera

CCTV

Security Camera

CCTV stands for ‘closed-circuit television’ 

Security cameras are also known as IP cameras; Internet Protocol Cameras.

As wired network cords, CCTV cameras utilize

Power over Ethernet (POE) is used by security cameras to reduce the requirement for electrical cables.

CCTV systems have a lesser video quality and image quality than security cameras.

Security cameras provide greater video quality and pixel density than CCTV cameras.

A television is used to transmit feeds from CCTV cameras.

Wi-Fi, LAN, or cellular networks are used to link security cameras.

CCTV is not wirelessly accessible and can be disarmed easily.

Security or IP cams are much more efficient and can be controlled wirelessly regardless of distance.

How To Select The Right CCTV System

When it comes to choosing a CCTV system, there are many things to consider in order to find the right one for your needs. Here are a few tips on how to select the right CCTV system:

-First, you need to determine what type of coverage you need. Are you looking for indoor or outdoor coverage?

-Second, you need to decide on the features that are important to you. Do you need night vision or motion detection?

-Third, you should consider the size and placement of the cameras. You will need to make sure that they are placed in strategic locations in order to get the best coverage possible.

-Fourth, you will need to choose a system that is compatible with your existing security system. If you don’t have a security system, you will need to choose one that is easy to install and use.

-Finally, you will need to decide on a budget. There are many different CCTV systems on the market, so you will need to find one that fits your needs and budget.

When it comes to choosing a CCTV system, there are many things to consider. With these tips in mind, you should be able to find the perfect system for your needs!

How To Select The Right Security Camera

It’s important to do your research when selecting a security camera. You want to make sure you’re getting a high-quality product that will be effective in protecting your home or business. Here are a few things to keep in mind when making your selection:

– The type of camera you need will depend on the area you’re trying to monitor. Indoor cameras are typically small and unobtrusive, while outdoor cameras need to be weatherproof and durable.

– Resolution is an important factor to consider. Higher resolutions mean better image quality, but they also require more storage space and processing power.

– Night vision is another key feature to look for. Many cameras now come with infrared LEDs that allow them to see in low-light conditions.

– Some cameras come with additional features like motion detection and two-way audio. These can be useful in certain situations, but they’re not essential for everyone.

Take your time to compare different security cameras and find the one that’s right for you. With so many options on the market, there’s sure to be a perfect match for your needs.

Conclusion

Make sure you’re getting exactly what you want with SSA INTEGRATE’s services.
We ensure that the solutions we are implementing will meet your demands now and in the future by going through our clients’ requirements.

No matter how many cameras you need, our team can manage all the design, estimating, specifications, equipment use and new equipment installation along with the necessary training and maintenance. We are not recommended to install HikVision, Dahua & Huawei.

It is our goal to give the best possible customer service prior to and following the installation. Regardless of the situation, customers can always rely on our knowledge and team.

Tuesday, August 1, 2023

IoT - How it Works in Access Control

Internet of Things - How it Works in Access Control 

The "Internet of Things" precisely known as IoT is an integrated network of intelligent computing devices connected through the internet to communicate with each other without any human interference.

What is IoT?

The Internet of Things (IoT) is a technological concept of connecting multiple devices that have the possibility of switching on and off the web in order to use software and automation processes for smart living. IoT is an innovation that changes the way we organize our lives at home and at work, as well as the way we move and use transportation means and manage industrial machinery. Any object, even people, in terms of smartphones and wearables, can be a part of the IoT grid.

The IoT is not limited to computers or other most common devices used for web connections. It’s typical to expect a desktop, a tablet, and a mobile to find their place in the IoT, but the concept encompasses way more. For example, smart vehicles, whose navigation systems depend on a computer dashboard connected to the web can be part of the Internet of Things. Any equipment that can support the smart sensor technology is viable for the IoT environment.

It’s not too difficult to imagine how the IoT grid is and how it will be transforming our workplaces. The Internet of Things at work enables smart buildings that automate business processes and improve security. In a way, IoT office solutions are a bridge from the physical to the virtual workplace.

Taking the physical information and transforming it into virtual data via IoT sensors results in the ability to manage many processes from anything that has a computer processor. Although we haven’t exhausted all IoT ideas for offices, many organizations have benefited from accepting the basics of the concept, creating smart lighting and aircon systems, as well as smart access control systems.

The access control mechanisms restrict unauthorized users from accessing the system by introducing appropriate mechanisms. Data sharing is the process of exchanging information among IIoT users. The access control and data sharing strict the legitimate users can only exchange their data. The access control defines which type of users can access the information of the particular IIoT system and is permitted to perform the control activities.

Internet of Things Ecosystem

IoT is a new concept of integrated network of different kinds of computing devices in the field of information technology. It is based on the IP network in which every individual machine used in manufacturing, security, transportation, and other fields of our day-to-day life is assigned a unique IP to communicate with each other.

Every machine/device is connected with the related sensors, which trigger the control system to issue instructions to a particular machine for some action to perform automatically. This network can communicate through both wireless and wired internet connectivity.

How is IoT used in access control system?

Internet of things is a backbone of modern IoT access control system commonly known as intelligent door locking systems. In this system, every lock, lock access controller, card reader and other associated devices are assigned a separate IP address, which is used for communication among the devices.

In a single building, all those intelligent machines are normally connected through wireless networks to their consolidated management software or mobile application. These applications can be configured for automatic as well as manual operation of different locks and controllers. The security alerts and notifications can also be configured to receive on mobile apps in real time.

Each device/machine is configured for its operating conditions, criteria, sensitivity and authority in core management control software, which is used as controller of the entire system. A duplicate control of this system is used as a mobile app on your mobile devices too; you can receive the status of your access system and you can also issue instructions from your app. Any malicious activity in your access system generates an alert and detailed notification on your mobile app or main management software controller.

What products use it?

Internet of things is used by thousands of types of products in general and almost all parts of the IoT security system commonly used in modern buildings. In access control, intelligent lockscard readerskeypads and other related devices use the technology behind the concept of the internet of things.

Every authorized mobile device also uses its unique IP address in the network to get an access into the main controller for using the intelligent locking system. The main server also has a unique IP address to establish iot communication among the components of entire IoT access control ecosystem.

Advantages of IoT in Access Control

The main benefits of using IoT security system based on IoT include:

- Fully integrated and highly intelligent system

- Accessible from anywhere around the world

- Capabilities to configure for different level authorities

- Can be used for both automatic and manual operations

- Easy to track the records of events

- A comprehensive approach towards secure life

Disadvantages of IoT in Access Control

The main disadvantages of using IoT access control system include:

- Certain hacking and security related issues still persist

- Not so mature technology

- Complex and costly

The nodes maintain an access control list that includes information about IoT devices, users, and associated access levels. Generally, the IIoT is formed using a group of embedded devices like sensors, cameras, and actuators to achieve a specific task. Designing access control and data sharing in such environments are very challenging owing to limited resources and heterogeneity. Context awareness, inter-domain operation, privacy assurance, resource efficiency, manageability, and accountability are some of the requirements of IIoT access control. The access control strategies are categorized into rule-based, capability-based, user control, and attribute-based.

The phrase “knowledge is power” has been taken to a whole new level by IoT technology that has been adapted in diverse areas. Governments have implemented the use of IoT devices in their activity processes such as the use of military drones while IoT devices are used by healthcare facilities and hospitals to provide high-quality healthcare services.

While smartphone and computers have been around for a long time, IoT is a relatively new phenomenon. Therefore, manufacturers and software developers have had sufficient time to address the susceptibilities pertaining to their data breach. IoT devices, alternatively, are extremely useful and come with various capabilities. Manufacturers still encounter problems such as dearth of passable hardware that is strong enough to examine and encode data yet trivial enough to fit inside the restricted space. Cybercriminals can access your home Wi-Fi network through such indiscreet devices and use the opportunity to watch your home surveillance camera to carry out a crime.

The fundamental purpose of implementing IoT devices across numerous segments is to create a completely cohesive smart city. With this integration, any device used in a manufacturing industry can link to another being used by government organizations, healthcare providers, trades or even one’s home network. Nevertheless, the law is yet to formulate privacy protection laws that cover all weaknesses across the different sectors. Cybercriminals continue to take advantage of this shortcoming, which results in the loss of revenue already invested into the project.

How to secure IoT networks

Here are some of the steps that can boost the security of your IoT network.

Know your IoT network

The first measure to take to enhanced security is to recognize and learn what you have and what needs to be protected. While it may appear one of the initial and basic steps, many companies tend to ignore this. Having an appropriate list of what’s on your IoT network and updating it frequently is key to security in any IoT network.

An IoT network usually comprises numerous devices and any of these devices can be used as a source to upset an entire IoT network. Organizations should focus on fixing the fundamentals to face the mounting cyber-risks in IoT.

IoT network security architecture

Most of the normally used surveillance devices barely support the wireless network security standards such as WPA2 or WPA3, which makes them highly vulnerable, capable of easily falling into the hands of hackers. Companies find upgradation of all these devices extremely expensive, so they should think about redesigning their network security architecture.

Divide the responsibility

One of the main problems with IoT security is that businesses often end up with security flaws since they have too much to achieve. Organizations that have their own IoT network characteristically purchase or hire paraphernalia and services from numerous services or device providers. Because IoT has to do with all these devices working together in a network, this medley of equipment can open up numerous holes that can be used to disrupt the system.

Setting up one-way connections

Setting up one-way connections is very important in an IoT network. If the endpoints in an IoT network have more privileges, cybercriminals can exploit them for cyberattacks. With the rise in the number of devices being a part of the IoT, the surface area for the invaders to attack is also increasing. Hence, businesses should restrict the skills of these IoT devices for security motives. Frequently, IoT devices are arranged in a way that they can start network connections by themselves. Although this provides much flexibility and other benefits, it can also lead to numerous security problems. By applying the exercise that all IoT devices are able to stay linked or start connections only using network firewalls and access lists will guarantee better safety.


Sunday, July 16, 2023

METHOD STATEMENT FOR ACCESS CONTROL SYSTEM INSTALLATION

METHOD STATEMENT FOR Access control System INSTALLATION


Ø TABLE OF CONTENTS

1. SCOPE

2. definitions

3. HEALTH  AND  SAFETY

4. OPERATION

5. installation and fixation

6. RESPONSIBILITIES

7. MANPOWER  REQUIRED

8. MATERIALS  REQUIREMENTs

9. EQUIPMENTs  REQUIREMENTs

10. WASTE MANAGEMENT

11. SPECIAL CONTROL MEASURES

12. SUPPORTING  DOCUMENTATION

13. DISTRIBUTION

 


1. SCOPE

Ø  This procedure to clear the method of the supply, installations of Access Control System for the project.

Ø  This document details the Access Control System Installation:

1.  Preparation of work.

2.  Delivery and inspection upon arrival of material at site.

3.  Installation of the system.

2. definitions

           PQP             : Project Quality Plan

PSP              : Project Safety Plan

QCP             : Quality Control Procedure

HSE             : Health, Safety and Environment

MS               : Method Statement

ITP               : Inspection Test Plan

QA/QC         : Quality Assurance / Quality Control Engineer.

WIR              : Inspection and Test Request

MIR              : Material Verification Record.

3. HEALTH  AND  SAFETY

Ø  Strictly followed as per the manufacturer's Health and Safety recommendations for handling and use of the materials.

Ø  Ensure all involved personnel shall be aware of the same.

Ø  Specific safety measures have to follow as applicable, and all the safety measures are covered separately in the project safety plan.

4. OPERATION

Ø  Material: 

1.     Material used will be as approved by the Engineer.

2.     The sizes and routes routing will be as per the approved Shop Drawings.

Ø  Storage and Protection: 

1.     Deliver components parts to site, completely identified in accordance with shop and certified CAD Drawings prepared for this work.

2.     Store in accordance with the manufacturer’s instructions, above ground, properly protected from the weather and construction activities.

5. INSTALLATION and Fixation

Ø  Pre-Installation:

§  Make sure that civil clearance done prior to start the installation.

§  Installation will be carried out as per manufacturer recommendations, Approved shop drawings and project specifications.

 

Ø  Installation:

§  The correct installation of Host controller and Door Controller which is essential to the success of the system.

§  All Door Controllers should be networked.

§  The maximum length of one data line (Door equipment’s to door controller) must not exceed 90 meters.

§  Readers are to be wired in to appropriate colored terminals on the controller’s reader port.

§  Ensure that the Readers, EM locks , push button, door contacts are installed and terminated properly 

§  All consoles, terminals, and controllers shall be factory wired before shipment to the job site. 

§  Controller cabinet doors shall open a minimum of 170 degrees to avoid blocking personnel movement.  Each door shall be equipped with a cylinder lock, a tamper switch and a piano-type hinge with welded tamperproof pins.

§  Provisions shall be made for field wiring to enter the cabinet via standard knock-outs at the top, bottom and sides of controller cabinets.

 

Ø  Installation of Wires:

§  Each wire shall be identified at both ends with the wire designation corresponding to the wire numbers shown on the wiring diagrams that will attached in manufacturer recommendations.

§  All exposed wiring within the cabinets, consoles, and terminals shall be formed neatly with wires grouped in bundles using non-metallic, flame-resistant wiring cleats or wire ties.

§  All ferrous metal work shall be painted, in accordance with the manufacturer’s standards. 

§  All cables are to be numbered while laying the cable and wiring the system. Masking tape or proprietary numbering system can be used.

 


Ø  Wiring within Enclosures:

§  Bundle, lace, and train cables within enclosures.

§  Connect to terminal points with no excess and without exceeding manufacturer's limitations on bending radius.

 

Ø  Grounding:

§  Comply with requirements in Section "Grounding and Bonding for Electrical Systems." for grounding conductors and connectors.

§  Comply with Electricity Wiring Regulations, Sections.

§  Bond metallic equipment to the system grounding bus bar, using not smaller than the specified equipment grounding conductor by Electricity Wiring Regulations, Sections.

 

Ø  Identification

§  Identify system components, wiring, and cabling complying with ADDC Electricity Wiring Regulations. Comply with requirements for identification specified in Division 26 Section "Identification for Electrical Systems."

 

Ø  Programming

§  After making sure all the system installed in correct way from Subcontractor and supplier, programming of the system must take place before final testing and commissioning accourding to Consultant requirement and senario of the system.

§  Testing and commissioning of the system submitted separetly for this system mentioned all the procedure of Testing of the system and commissioning it.

 


Ø  Technical Assistance:

§  The installation supervising technician for the system trade shall instruct the CONSULTANT Engineer, and Construction Site Manager on the programming and correct operation of the system after the installation is completed.

§  This instruction shall be scheduled at the convenience of the staff.

§  All such instruction shall be properly recorded.

§  WIR will be issued for Consultant approval upon making sure that the installation of the system equipment’s done as per approved shop drawings, approved specs and manufacturer recommendations.

6. RESPONSIBILITIES

Ø  PROJECT MANAGER

1.     To ensure that all the preparation and application works are carried out according to the Contract Specification and with the approved drawings.

2.     To ensure that the progressing of works is carried out according to the planned program and as per the approved method of statement.

3.     To ensure that all the equipment and material required executing the work are available according to the planned construction program.

4.     To co-ordinate with the Main contractor, MEP coordinator, Safety Officer for a safe and proper execution of the works.

Ø  SITE ENGINEER

1.     To ensure that the works are carried out according to the Contract Specification, approved method statement and the shop drawings.

2.     To provide all necessary information and distribute responsibilities to his construction.

3.     To monitor the progress of work in relation with the work program and to report to the Project Manager.

4.     To co-ordinate with the safety officer and to ensure that the works are carried out in safe practicing method.

Ø  FOREMAN

1.     The foreman will carry out his duties by maintaining continuous coordination with the site engineer on daily basis, and ensure proper distribution of the work force on the required and planned locations.

2.     To ensure that his assistant foreman/ charge hand are aware of the job requirements and they have enough information to carry out their duties properly.

3.     To ensure that the daily work is progressing as planned and advice the site engineer of any requirement for additional resources.

4.     To ensure in consultation with the site engineer that the manpower involved in the works are moving as agreed and planned for the work.

5.     To control disposal of waste materials according to the instructions received from the site engineer.

6.     To ensure full coordination with the safety officer to maintain safe working and proper house keeping of the site, following the proved safety measures and further ensure that all his working team are aware of the same to prevent accident and losses.

7.     To inform the site engineer regarding areas ready for inspection.

8.     Foreman and the storekeeper are responsible for the distribution and control of materials.

Ø  SAFETY ENGINEER

1.     Ensure the implementation of all the safety measures in accordance with the HSE plan and everybody aware of it for it’s proper implementation.

2.     Ensure all the implemented safety measures are adequate to maintain safe working on the site.

3.     Inspect all the site activities and train the person to prevent accidents and it’s proper implementation.

4.     Ensure that the site is maintained clean and tidy.

Ø  TECHNICIAN FROM SUPPILER

1.     The carrying-out of work and the proper distribution of all the available resources in coordination with the sub-contractor Site Engineer on a daily basis.

2.     Daily reports of the works are achieved and coordinated for the future planning with the Site Engineer.

3.     Complying with the sub-contractor basic design practices, particularly those related to safety and engineering

4.     Meeting with any type of unforeseen incident or requirement and reporting the same to the Site Engineer immediately.

Ø  STORE KEEPER

1.     Responsible for overall Store operations in making sure to store the material delivery to the site and keep it in suitable area that will keep the material in safe from rusty and damage.

2.     One who will acknowledge the receiving of materials at site in coordination with QA/QC and concerned Engineer.

7. MANPOWER  REQUIRED

Ø  Charge hand and Experienced Technicians.

8. MATERIALS  REQUIREMENTS

Ø  ACS Components and Accessories.

9. EQUIPMENTs  REQUIREMENTs

Ø  The Equipment that will be engaged for ACS Installation will be as follows:

1.     Tools for fixing the control panel on a vertical surface.

2.     Tools for fitting the Remote Units (either Surface or Flush mount).

3.     A small flat-bladed (terminal) screwdriver.

4.     A large Posi-drive screwdriver for internal screws

5.     A pair of wire cutters/strippers appropriate for the type of cable used,

6.     Ferules and ferruling tool for dressing the ends of cables (if stranded conductors are used),

7.     Digital Multimeter for voltage and continuity tests.

8.     Pulling Spring

9.     Hammer

10. Measuring Wheel.

11. Drilling tools.

12. Ladders.

13. Scaffolding (to be provided by the contractor for the High level Area).

14. Commissioning Laptop

15. Safety requirements tools such as safety shoes, safety helmet, safety glasses, fluorescent vest, and safety gloves to insure maximum ability of safe work and dust mask when required.

 

10. WASTE MANAGEMENT

Ø  The Rubbish which would be created from our scope of works will be disposed to the designated dumping ground.

11. SPECIAL CONTROL MEASURES

Ø  The following general control measures against Safety, Environment and Quality shall be required for our scope of work and special control measures are not applicable for us :

·         Proper PPE must be worn at all time

·         Permit to work at height > 2m where applicable

·         Lifting operation permit (using crane) where applicable.

·         Confined space permit where applicable.

·         Approved work method statement and risk assessment will be made available to site.

·         All workers doing the work shall be briefed on this method statement and risk assessment.

12. SUPPORTING  DOCUMENTATION

Ø  This method Statement should be read in conjunction with the below referenced documentations :

  • ITP for Anti – termite Treatment.
  • Insulation Resistance and continuity Test Report.

13. DISTRIBUTION

Ø  Copy of this method statement shall be issued to the following for information/ action/ comments:

  1. Project Manager
  2. Site Engineer
  3. Foremen
  4. Safety Engineer
  5. Technician From Supplier
  6. Store Keeper