It's the way that detects the intrusion the quickest and most accurately. And, that is done how?
Keep these in mind:
• What are you protecting and where is it? [the asset]
• What are you protecting it from and how will it get there? [the threat]
• What accommodations are needed to function with and within the protected area? [your activities]
The Assumptions:
The goal of the alarm system is to deter a criminal with a siren once an intrusion is detected and to summon a law enforcement (or private security) response. It is also going to provide some insight into the intruders path and possibly their intentions during the attack.
The asset is inside your home or business. There is most likely more than one asset and they are not necessarily grouped together. This makes for multiple areas to specifically protect.
The threat is coming from outside. This may not be true in reality; however it is an assumption for this exercise. It will need to pass through a door, window, wall, floor or ceiling to gain access.
You, your family, or your business associates might want to conduct some limited activity inside sometimes when the alarm is armed. Most of the time the location will be vacated when it is alarmed.
The Basics:
1. All exterior doors should certainly have a magnetic contact or other point sensor installed.
2. Exterior windows should also have magnetic contact or point sensor installed.
3. The areas directly inside the exterior doors and windows should have at least one volumetric sensor.
4. Large areas of glass, or glass that may be targeted by street punks, should have a glass break sensor.
5. Some individual assets may warrant specific protection such as sensors inside safes, or liquor cabinets (for teenagers).
6. The alarm control panel should be in a well protected location (rapid access to this will disrupt the alarm communication and response)
6a. If the communications module for the panel are located away from the panel it too should be well protected.
The Next Step (for the Unoccupied State):
The most likely path(s) that an intruder might use should be monitored by sensors. This offers insight to their activity during the intrusion. The degree of insight comes from the nature of the sensors that are focused on that asset.
The Next Step (for the Occupied State):
Think about where you wish to move while the alarm is armed. Plot this area on a set of floor plans if necessary. Now is it still possible to effectively detect an intrusion with these areas not monitored? In a perfect environment you and your family will be able to use the restroom and walk to each other without activating the alarm. This may not be ultimately possible; although it is with some creative planning. Keep in mind that some burglars have been known to move around the bedrooms of their victims while they were sleeping in the room.
With the sensors planned - we'll jump beyond the whole installation part - there is at least one more step. And it is quite possibly the most important one....
Comments, thoughts, and pet peeves about the application (or misapplication) of security today.
Beware the snake oil salesman with baubles and talismans for your every ill, because
security is what you do more than what you have.
Friday, October 28, 2011
Sunday, October 23, 2011
Cyber Security Awareness Month - what's the hype about
"Every American has a stake in securing our networks and personal information" All the daunting and cool hacker stories today may leave the everyday citizen feeling... well a little uninvolved. NOT SO! Consider for a moment how this directly affects you....
You are a but a cog in the machine is the global information systems. You could be an important cog and never know it. First it's important to realize that most "hacking" is similar to the average burglary. Really it is. Remember the average burglary gains entry through an open or unlocked door or window, right? Well the average malware (malicious software - the projection of the hacker) gains access to your computer by getting past poorly maintained firewalls, anti-virus software that is not updated, and through unpatched/updated software applications. And what does this malware do you ask? What does a burglar do? The malware may roam your machine and look for interesting data, it may lay in wait for you to enter interesting information and it carries it away to for someone else to use. A burglar takes you TV and fences it. A hacker using malware may steal your credit card, social security number, phone numbers, addresses and what not, and then fence them on a website. Or they may just use them for their ends.
What is the most significant difference between a burglar and a network hacker? Threat Population! At any given time there are only so many people within travel distance of your home or office with the tools, expertise and desire to break into your home or office. Let's just make it easy and say the population of the metro area where you live and work. Now the available population for attacking your online presence is everyone connected to the Internet who can download a free software to seek out vulnerable machines and exploit them (so nearly everyone connected). The population difference for the threat is several orders of magnitude larger. Imagine a burglar that was able to cast out their thoughts (fanciful I know but bear with me) and in the telepathic scan can know who did not lock a door or window to their home or office without ever leaving the comfort of their warm soft couch and the other amenities that bring any lazy minimalist pleasure. That is what a hacker may do when they scan the portion of the Internet where your machines are connected. The easiest targets become apparent - the low hanging fruit of cyber theft.
Now an updated firewall, anti-virus software, and application software will not protect you from everything - not even close. Though it will cover the laziest of online miscreants. If you apply the Pareto Principle to this it means that 20% of your effort will be sufficient for 80% of the problems. Updating software also helps to keep it operating smoothly and efficiently.
Why mess with it if it works. I like to install it and leave it alone you say? Consider this analogy for unmaintained firewall. A firewall is a device or software used to separate networks. It's the difference between an open door and a door with an armed receptionist to manage authorized traffic. So you have a security officer come to your home every night to check and make sure everything is locked up and no one can get it. Now everything requires maintenance, even the officer. After a time the vision in his right eye begins to fade but he keeps reporting to you that everything is locked up tight. Then one day you hire a new officer because you had too and suddenly he reports that the last guy didn't see that one of the windows had been unlocked - the one on the right. Who knows how long that window has been open and your resources have been leaving through it.
When you get infected with malware you may be sending to your friends, and their friends, and their acquaintances. Just like a nasty STD. You send an email or message that the malware has attached itself to without your knowledge. Your friend trusts you and opens the email and maybe even an attachment. They're infected now too. The malware that your half-blind security let it might be sending these emails without your knowledge as well. So, please keep your software, firewall, anti-virus, and applications up-to-date. It's a start.
You are a but a cog in the machine is the global information systems. You could be an important cog and never know it. First it's important to realize that most "hacking" is similar to the average burglary. Really it is. Remember the average burglary gains entry through an open or unlocked door or window, right? Well the average malware (malicious software - the projection of the hacker) gains access to your computer by getting past poorly maintained firewalls, anti-virus software that is not updated, and through unpatched/updated software applications. And what does this malware do you ask? What does a burglar do? The malware may roam your machine and look for interesting data, it may lay in wait for you to enter interesting information and it carries it away to for someone else to use. A burglar takes you TV and fences it. A hacker using malware may steal your credit card, social security number, phone numbers, addresses and what not, and then fence them on a website. Or they may just use them for their ends.
What is the most significant difference between a burglar and a network hacker? Threat Population! At any given time there are only so many people within travel distance of your home or office with the tools, expertise and desire to break into your home or office. Let's just make it easy and say the population of the metro area where you live and work. Now the available population for attacking your online presence is everyone connected to the Internet who can download a free software to seek out vulnerable machines and exploit them (so nearly everyone connected). The population difference for the threat is several orders of magnitude larger. Imagine a burglar that was able to cast out their thoughts (fanciful I know but bear with me) and in the telepathic scan can know who did not lock a door or window to their home or office without ever leaving the comfort of their warm soft couch and the other amenities that bring any lazy minimalist pleasure. That is what a hacker may do when they scan the portion of the Internet where your machines are connected. The easiest targets become apparent - the low hanging fruit of cyber theft.
Now an updated firewall, anti-virus software, and application software will not protect you from everything - not even close. Though it will cover the laziest of online miscreants. If you apply the Pareto Principle to this it means that 20% of your effort will be sufficient for 80% of the problems. Updating software also helps to keep it operating smoothly and efficiently.
Why mess with it if it works. I like to install it and leave it alone you say? Consider this analogy for unmaintained firewall. A firewall is a device or software used to separate networks. It's the difference between an open door and a door with an armed receptionist to manage authorized traffic. So you have a security officer come to your home every night to check and make sure everything is locked up and no one can get it. Now everything requires maintenance, even the officer. After a time the vision in his right eye begins to fade but he keeps reporting to you that everything is locked up tight. Then one day you hire a new officer because you had too and suddenly he reports that the last guy didn't see that one of the windows had been unlocked - the one on the right. Who knows how long that window has been open and your resources have been leaving through it.
When you get infected with malware you may be sending to your friends, and their friends, and their acquaintances. Just like a nasty STD. You send an email or message that the malware has attached itself to without your knowledge. Your friend trusts you and opens the email and maybe even an attachment. They're infected now too. The malware that your half-blind security let it might be sending these emails without your knowledge as well. So, please keep your software, firewall, anti-virus, and applications up-to-date. It's a start.
Friday, October 21, 2011
A bit more on sensors
Arranging sensors to protect asset(s) just isn't as simple as looking at set of property plans and sprinkling a pepper shaker over it and placing sensors where the pepper falls. The most likely impact is budgetary - these things cost real money. Next is the unlikeliness that the pepper shaker has such mystical powers as to predict an intruder's path. Lastly, there are some design considerations you might want to entertain that affect the usability of the system. For instance, you might want to be able to use the restroom in the middle of the night without summon the local SWAT team for assistance.
Placing sensors in your home, business or other facility must work within your financial constraints, protect the asset(s), and facilitate your use of the space. We'll work with a home for now as an example.
It is important to detect the intrusion as early as possible. The farther away that the attack is detected and assessed the greater the opportunity to prevent them from being successful - regardless of their intent. It is essential to keep in mind that simply detecting activity is not sufficient. It must be assessed to ensure the detection is legitimate and not an error. There is a point between when a attack begins and when they are successful called the Critical Detection Point. It is that point after which a response will not be quick enough to thwart the success of the attack. With home burglaries it is an unfortunate fact that a response is not likely to arrive very quickly. Why is this you ask. Police departments are overwhelmed with service calls, most alarm activations are false alarms, and a burglar doesn't need to spend very much time in a home to get some good stuff and escape. This may not be as true if you live in a very large house that resembles a museum. In that case there are other concerns. The average home burglar will either be sent away when a loud siren activates or they will not. We'll address the bad guy a little later.
Early detection and assessment. In some areas the alarm must be assessed by phone contact by the central station, or by remotely viewing closed-circuit television (CCTV) or microphones, or possibly just through multiple sensor activations. Let's assume you do not want to have any CCTV systems in or around your home. It may just be enough to arrange the sensors to demonstrate the intent of an intruder and decrease the opportunities for unnecessary police dispatches. This is simply done with layers of sensors.
Many security professionals discuss "Concentric Circles." This is just as it sounds. Layers of protection wrapped around the asset being protected. This is also called "Defense in Depth" as well. Unfortunately this is not so easy in a typical residential structure. There simply aren't enough worthwhile layers. The wall of the house is typically the first line of physical defense (excluding the deterrent value of lighting and other features) and maybe there is a sturdy bedroom door after that - unless the bad guys uses a window.
Think in terms of occupied and unoccupied conditions. Will you be setting the alarm in the evenings while you rest or just when the home is vacant? If you plan on arming the system while you are inside the structure, try to created "protected corridors." These should let you move where you need to while wrapping the adjacent areas with reliable detection zones. In addition to the restroom and childrens' rooms, allow yourself enough movement to assess any odd noises or activities while keeping the alarm armed!
Next we can consider sensor types and locations...
Placing sensors in your home, business or other facility must work within your financial constraints, protect the asset(s), and facilitate your use of the space. We'll work with a home for now as an example.
It is important to detect the intrusion as early as possible. The farther away that the attack is detected and assessed the greater the opportunity to prevent them from being successful - regardless of their intent. It is essential to keep in mind that simply detecting activity is not sufficient. It must be assessed to ensure the detection is legitimate and not an error. There is a point between when a attack begins and when they are successful called the Critical Detection Point. It is that point after which a response will not be quick enough to thwart the success of the attack. With home burglaries it is an unfortunate fact that a response is not likely to arrive very quickly. Why is this you ask. Police departments are overwhelmed with service calls, most alarm activations are false alarms, and a burglar doesn't need to spend very much time in a home to get some good stuff and escape. This may not be as true if you live in a very large house that resembles a museum. In that case there are other concerns. The average home burglar will either be sent away when a loud siren activates or they will not. We'll address the bad guy a little later.
Early detection and assessment. In some areas the alarm must be assessed by phone contact by the central station, or by remotely viewing closed-circuit television (CCTV) or microphones, or possibly just through multiple sensor activations. Let's assume you do not want to have any CCTV systems in or around your home. It may just be enough to arrange the sensors to demonstrate the intent of an intruder and decrease the opportunities for unnecessary police dispatches. This is simply done with layers of sensors.
Many security professionals discuss "Concentric Circles." This is just as it sounds. Layers of protection wrapped around the asset being protected. This is also called "Defense in Depth" as well. Unfortunately this is not so easy in a typical residential structure. There simply aren't enough worthwhile layers. The wall of the house is typically the first line of physical defense (excluding the deterrent value of lighting and other features) and maybe there is a sturdy bedroom door after that - unless the bad guys uses a window.
Think in terms of occupied and unoccupied conditions. Will you be setting the alarm in the evenings while you rest or just when the home is vacant? If you plan on arming the system while you are inside the structure, try to created "protected corridors." These should let you move where you need to while wrapping the adjacent areas with reliable detection zones. In addition to the restroom and childrens' rooms, allow yourself enough movement to assess any odd noises or activities while keeping the alarm armed!
Next we can consider sensor types and locations...
Picking up where we left off.... (so many years ago)
I sincerely hope no one has waited all this time to plan their alarm system. If you have I can only scratch my head...
We left off with the promise of some discussion of sensor types as they relate to planning an alarm system. Here we go...
But first, it is important to determine whether the system will be monitored remotely by a central alarm station or just a local alarm with a siren. Monitored systems provide the opportunity to summon help and come with a fee for the service. Local systems may be cheaper but with the limitation that the only help will need to be within the sound of the alarm and choose to respond. Insurance companies will often require the system to be monitored as well
Alarm systems use sensors to detect activity and there are a very wide variety of sensors to choose from. They can be classified a number of different ways. There are sensors to detect movement, changes in temperature, the presence of water (flooding), capacitance (changes to an electrical field), light and so on. The typical consumer system will normally be a combination of balanced magnetic switches, some sort of volumetric sensors, possibly glassbreak sensors, and maybe panic buttons. Here's a real quick translation:
A balanced magnet switch is commonly referred to as a "door contact" and consist of a magnet next to the sensor to complete the electrical circuit. When the door opens the magnet moves and the sensor detects the break in the circuit. The balanced aspect of the magnet makes it more difficult to defeat the sensor as shown in one of the Beverly Hills Cop movies. These sensors are useful on doors and windows or any objects that may be moved.
Volumetric sensors monitor an area (volume) and include such examples as acoustic (microphones), microwave (radar), passive infrared (ambient heat). There are dual-technology sensors that use a combination of these capabilities to either increase the likelihood of detection (increases false positives) or to increase to the certainty of a valid detection (increases false negatives). The difference between the two choices is nothing more than how the logic within the sensor is configured. This can be referred to as an "And" versus an "Or" that either requires one or both of the technologies to detect the activity. Glassbreak sensors are a form of volumetric sensor that listens for the sound of breaking glass. These are nice because they do not need an intruder to actually intrude before activating. They can also react to other loud sounds as well.
Panic buttons are personal alarm devices that simply allow a user to manually activate the alarm system. The central monitoring station sees each sensor type differently and therefore can place a greater emphasis on a panic button.
What makes the system valuable is the selection and arrangement of these sensors. Poorly selected technologies will generate excess false positives (nuisance or false alarms) and reduce the effectiveness of the response over time. You may have heard the story of the boy who cried wolf? Well alarm systems that cry intruder too often stop being believed too.
One important point to the selection and arrangement of the sensors is considering the asset(s) the system is meant to protect. Is it an expensive collection of something in one spot, random stuff scattered about, or just the piece of mind that no one is waiting inside when you open the door enter?
For a much greater (in every way) discussion of sensors try The Design and Evaluation of Physical Protection Systems by Mary Lynn Garcia.
Next... we'll take a look at arranging the sensors - tricks, tips, and pitfalls.
We left off with the promise of some discussion of sensor types as they relate to planning an alarm system. Here we go...
But first, it is important to determine whether the system will be monitored remotely by a central alarm station or just a local alarm with a siren. Monitored systems provide the opportunity to summon help and come with a fee for the service. Local systems may be cheaper but with the limitation that the only help will need to be within the sound of the alarm and choose to respond. Insurance companies will often require the system to be monitored as well
Alarm systems use sensors to detect activity and there are a very wide variety of sensors to choose from. They can be classified a number of different ways. There are sensors to detect movement, changes in temperature, the presence of water (flooding), capacitance (changes to an electrical field), light and so on. The typical consumer system will normally be a combination of balanced magnetic switches, some sort of volumetric sensors, possibly glassbreak sensors, and maybe panic buttons. Here's a real quick translation:
A balanced magnet switch is commonly referred to as a "door contact" and consist of a magnet next to the sensor to complete the electrical circuit. When the door opens the magnet moves and the sensor detects the break in the circuit. The balanced aspect of the magnet makes it more difficult to defeat the sensor as shown in one of the Beverly Hills Cop movies. These sensors are useful on doors and windows or any objects that may be moved.
Volumetric sensors monitor an area (volume) and include such examples as acoustic (microphones), microwave (radar), passive infrared (ambient heat). There are dual-technology sensors that use a combination of these capabilities to either increase the likelihood of detection (increases false positives) or to increase to the certainty of a valid detection (increases false negatives). The difference between the two choices is nothing more than how the logic within the sensor is configured. This can be referred to as an "And" versus an "Or" that either requires one or both of the technologies to detect the activity. Glassbreak sensors are a form of volumetric sensor that listens for the sound of breaking glass. These are nice because they do not need an intruder to actually intrude before activating. They can also react to other loud sounds as well.
Panic buttons are personal alarm devices that simply allow a user to manually activate the alarm system. The central monitoring station sees each sensor type differently and therefore can place a greater emphasis on a panic button.
What makes the system valuable is the selection and arrangement of these sensors. Poorly selected technologies will generate excess false positives (nuisance or false alarms) and reduce the effectiveness of the response over time. You may have heard the story of the boy who cried wolf? Well alarm systems that cry intruder too often stop being believed too.
One important point to the selection and arrangement of the sensors is considering the asset(s) the system is meant to protect. Is it an expensive collection of something in one spot, random stuff scattered about, or just the piece of mind that no one is waiting inside when you open the door enter?
For a much greater (in every way) discussion of sensors try The Design and Evaluation of Physical Protection Systems by Mary Lynn Garcia.
Next... we'll take a look at arranging the sensors - tricks, tips, and pitfalls.
Saturday, May 12, 2007
What's wrong with this?
Or, maybe the title should have been is this the best way to deal with the problem. This news story from North Carolina brings up a couple of key points in a just a few lines.
First the problem is on-going and not a single loss event.
"An uptown church is shutting its doors more often after a recent rash of robberies."
Ok good, at least we know they aren't making knee-jerk reactions and spending money for just one loss event. Sadly in many instances, and it sure as heck isn't limited to houses of worship, organizations get a little nuts after some event and jump through hoops to make themselves feel better - or that they are safe again. This is not to say that after each and every loss event there shouldn't be a review to improve security planning; it just means that this review need not always result in more spending.
Second, there is a societal fixation on cameras.
"The church plans to buy newer, better security cameras"
Does anyone out there still believe that closed-circuit television cameras (CCTV, aka security cameras) deter any crime? Maybe they do, a little, but if they were effective at it then we might not see so many videos of crime on the news. Consider this, cameras offer a tools for following up, or investigating, activities after they occur. Now this is indeed a very important tool and one that should not be overlooked. Unless someone is monitoring the CCTV system there will be no immediate response to a wrongful act.
So third, just installing better cameras will not likely reduce the number of incidents that occur, unless they are being committed by a select few individuals who, once apprehended, are not able to continue. If not, the losses will continue and the police will more arrests - AND the organization will continue to lose valuable assets. CCTV systems, in a traditional sense, create a nice record of what happened but they are not effective at facilitating the intervention necessary to stop the event.
Look, I'm not saying they shouldn't upgrade their CCTV system. What I am saying is, "hey, let's look into how we might be able to prevent these events from happening in the first place." Maybe, just maybe, catching one of these thieves in the act and counseling them might result in a much better outcome than just having them arrested at some later time.
So how could we prevent it from happening??? I think in the next I might discuss some newer tools - and some old tools.
First the problem is on-going and not a single loss event.
"An uptown church is shutting its doors more often after a recent rash of robberies."
Ok good, at least we know they aren't making knee-jerk reactions and spending money for just one loss event. Sadly in many instances, and it sure as heck isn't limited to houses of worship, organizations get a little nuts after some event and jump through hoops to make themselves feel better - or that they are safe again. This is not to say that after each and every loss event there shouldn't be a review to improve security planning; it just means that this review need not always result in more spending.
Second, there is a societal fixation on cameras.
"The church plans to buy newer, better security cameras"
Does anyone out there still believe that closed-circuit television cameras (CCTV, aka security cameras) deter any crime? Maybe they do, a little, but if they were effective at it then we might not see so many videos of crime on the news. Consider this, cameras offer a tools for following up, or investigating, activities after they occur. Now this is indeed a very important tool and one that should not be overlooked. Unless someone is monitoring the CCTV system there will be no immediate response to a wrongful act.
So third, just installing better cameras will not likely reduce the number of incidents that occur, unless they are being committed by a select few individuals who, once apprehended, are not able to continue. If not, the losses will continue and the police will more arrests - AND the organization will continue to lose valuable assets. CCTV systems, in a traditional sense, create a nice record of what happened but they are not effective at facilitating the intervention necessary to stop the event.
Look, I'm not saying they shouldn't upgrade their CCTV system. What I am saying is, "hey, let's look into how we might be able to prevent these events from happening in the first place." Maybe, just maybe, catching one of these thieves in the act and counseling them might result in a much better outcome than just having them arrested at some later time.
So how could we prevent it from happening??? I think in the next I might discuss some newer tools - and some old tools.
Fresh start - in more ways than one
Clearly I haven't been posting any information to this blog in quite some time, and for good reasons... Today, however, signals a fresh start for the blog counter for another really good reason. I just learned that Sitemeter had started installing ad cookies on its member sites. So I've moved to a new counter service, and I figured I'd take this time to go ahead and start over - with the counter and with new posts.
Also, some of you may know that I've stopped consulting full-time and returned to the world of "doing" security. I know, I know. You're asking why anyone would do that; give up the cushy hours, the fun travel, eh, you get the point. Suffice it to say it was just time to go ahead and get back into the game.
Stay tuned. More to come (hopefully more regularly)
Also, some of you may know that I've stopped consulting full-time and returned to the world of "doing" security. I know, I know. You're asking why anyone would do that; give up the cushy hours, the fun travel, eh, you get the point. Suffice it to say it was just time to go ahead and get back into the game.
Stay tuned. More to come (hopefully more regularly)
Monday, February 5, 2007
Wireless Sure... But how do I plan a system anyway?
Not to put the cart before the horse as I did with the previous post... Before you can plan to go wireless with a burglar alarm system you should really plan it a little. After all wired vs. wireless may not be the right question to ask at the beginning anyway. What is the right questions and how do you begin your system plan? Come in and see...
Burglar alarm systems, hereafter referred to just as alarm systems (gotta love the legalese once in a while), are there for piece of mind. Let me make this point clear first - THEY DO NOT STOP A DETERMINED INTRUDER!!! These systems will let you know if someone has activated a sensor which may mean they have already gained access. But they fill other purposes as well. How do you know when you enter your home that someone isn't waiting for you inside? Well that might be the greatest value of an alarm system. An adversary that abducts you inside your house wins in every way possible. They are not in the travelled way, not in public view, and it is highly unlikely that you will have time to dial 911 for help. You alarm system should be planned well enough so that you can be reasonably confident that you are the only person that has entered your home when you open your door.
Planning a system requires a bit of discussion on sensor types, activities and spaces, and access/traffic patterns. So the next couple of posts will deal with each of these briefly.
Burglar alarm systems, hereafter referred to just as alarm systems (gotta love the legalese once in a while), are there for piece of mind. Let me make this point clear first - THEY DO NOT STOP A DETERMINED INTRUDER!!! These systems will let you know if someone has activated a sensor which may mean they have already gained access. But they fill other purposes as well. How do you know when you enter your home that someone isn't waiting for you inside? Well that might be the greatest value of an alarm system. An adversary that abducts you inside your house wins in every way possible. They are not in the travelled way, not in public view, and it is highly unlikely that you will have time to dial 911 for help. You alarm system should be planned well enough so that you can be reasonably confident that you are the only person that has entered your home when you open your door.
Planning a system requires a bit of discussion on sensor types, activities and spaces, and access/traffic patterns. So the next couple of posts will deal with each of these briefly.
Thursday, February 1, 2007
See this on wireless alarm systems
Wireless alarm systems are a real option especially when retrofitting a building. Wireless devices save money and time that is consumed trying to drag wire throughout a facility that is already built.
Wednesday, January 31, 2007
Why go wireless???
Ever thought about a burglar alarm but didn't want to deal with the wires? Ever think that wireless wasn't good enough? Maybe it's because of movies like The Score, The Italian Job, Heat, and the others that portray very talented thieves and complicated thefts. The kind that generally just don't happen everyday in real life. The common burglar will use the door or window that is left unlocked. Or they may put a foot against the door or destroy a window. Either way the greatest threat comes from the path of least resistance.
Realistically, what are the chances that someone would bring equipment to generate a radio signal to jam a wireless alarm system? But what if your wireless system could detect the jamming attempt and use that as a trigger for an alarm?
Welcome to the real world of quality wireless alarm systems. What is quality? See Zen and the Art of Motorcycle Maintenance for a detailed discussion of that topic. But a worthwhile wireless alarm system will likely include all UL listed parts. And is should do some very important things like detect jamming attempts, prevent data collision, and device supervision.
Data collision is what occurs when two or more devices try to communicate to the system panel at one time. Worthwhile systems will not do this. While device supervision is just what it sounds like. The system panel periodically checks the status of each device. What a device fails to respond then the panel makes notifications that something needs to be done.
What might be the best reason for looking at a wireless systems is their resilience during power outages. The backup battery that should be fitted with the system panel is good and may last for 12 hours, but when that battery does not have to support each individual sensor it lasts much longer. See with wireless systems each device has its own battery and thus is not affected by power outages in the same way as a traditional wired system.
Now you may think that he batteries are expensive, but its not the expense that is likely to cause a problem since they usually last for about one to two years. The greatest issue the annoyance of actually changing the batteries every so often. But there are trade-offs with everything.
Keep in mind that there are disadvantages to wireless systems as well, but for the most part they should work just fine for you home and small business needs.
More on planning an alarm system and monitoring options next...
Realistically, what are the chances that someone would bring equipment to generate a radio signal to jam a wireless alarm system? But what if your wireless system could detect the jamming attempt and use that as a trigger for an alarm?
Welcome to the real world of quality wireless alarm systems. What is quality? See Zen and the Art of Motorcycle Maintenance for a detailed discussion of that topic. But a worthwhile wireless alarm system will likely include all UL listed parts. And is should do some very important things like detect jamming attempts, prevent data collision, and device supervision.
Data collision is what occurs when two or more devices try to communicate to the system panel at one time. Worthwhile systems will not do this. While device supervision is just what it sounds like. The system panel periodically checks the status of each device. What a device fails to respond then the panel makes notifications that something needs to be done.
What might be the best reason for looking at a wireless systems is their resilience during power outages. The backup battery that should be fitted with the system panel is good and may last for 12 hours, but when that battery does not have to support each individual sensor it lasts much longer. See with wireless systems each device has its own battery and thus is not affected by power outages in the same way as a traditional wired system.
Now you may think that he batteries are expensive, but its not the expense that is likely to cause a problem since they usually last for about one to two years. The greatest issue the annoyance of actually changing the batteries every so often. But there are trade-offs with everything.
Keep in mind that there are disadvantages to wireless systems as well, but for the most part they should work just fine for you home and small business needs.
More on planning an alarm system and monitoring options next...
Tuesday, October 17, 2006
A short note on landscaping
Landscaping can be an indispensable tool for security, not to mention how much better it can make any building look. For security it can provide some very real benefits, and I'm not talking about those "tips" for home protection like placing thorny bushes around windows (which works or doesn't depending on who you consult).
So here are a few basics for incorporating security functions into your landscaping.
The most important bit has to do with Natural Surveillance, or making sure that everyone is able to see the goings on in a given area. To do this keep shrubs relatively low, particularly closer to the building, to reduce potential areas of concealment. Then keep trees high, or "canopy" them, with the lowest branches somewhere above five feet (six is event better). There reason for adjusting the trees is to highlight the silhouette of a person standing near it. The head is one of the most identifiable features on a human silhouette. This coupled with improved lighting makes it much harder for someone to conceal themselves around a building.
From there is becomes possible to use landscaping for "wayfinding" or assisting persons to remain on the proper path. Shrubs and trees can help guide people without the use of fencing, bollards or chains. It looks nicer, costs less over time, and can be just as effective. For instance, if folks like to "cut across" the lawn on their way to a nearby attraction then a row of shrubs can help deter this behavior. Again the shrubs can be kept relatively low and the height can be compensated with depth. While it might be easy to just over an 18" high row of shrubs, it is much more difficult to do the same for a row that is, say, four or five feet deep. Different types of shrubs can add color and texture for visual appeal while making it uncomfortable to force passage. Some shrubs are particularly adept had creating a sort of "tanglefoot" entrapment that is difficult (or even treacherous) and uncomfortable to pass through. Here again, lighting can help enhance the shrubbery by lighting the path around the plants to further assist in guiding individuals.
There. A couple of quick thoughts on the uses of landscaping in security.
So here are a few basics for incorporating security functions into your landscaping.
The most important bit has to do with Natural Surveillance, or making sure that everyone is able to see the goings on in a given area. To do this keep shrubs relatively low, particularly closer to the building, to reduce potential areas of concealment. Then keep trees high, or "canopy" them, with the lowest branches somewhere above five feet (six is event better). There reason for adjusting the trees is to highlight the silhouette of a person standing near it. The head is one of the most identifiable features on a human silhouette. This coupled with improved lighting makes it much harder for someone to conceal themselves around a building.
From there is becomes possible to use landscaping for "wayfinding" or assisting persons to remain on the proper path. Shrubs and trees can help guide people without the use of fencing, bollards or chains. It looks nicer, costs less over time, and can be just as effective. For instance, if folks like to "cut across" the lawn on their way to a nearby attraction then a row of shrubs can help deter this behavior. Again the shrubs can be kept relatively low and the height can be compensated with depth. While it might be easy to just over an 18" high row of shrubs, it is much more difficult to do the same for a row that is, say, four or five feet deep. Different types of shrubs can add color and texture for visual appeal while making it uncomfortable to force passage. Some shrubs are particularly adept had creating a sort of "tanglefoot" entrapment that is difficult (or even treacherous) and uncomfortable to pass through. Here again, lighting can help enhance the shrubbery by lighting the path around the plants to further assist in guiding individuals.
There. A couple of quick thoughts on the uses of landscaping in security.
Wednesday, October 11, 2006
Managing vandalism - Part II: an alternate approach
Although it may be well past the original event discussed in this series of postings, vandalism to Houses of Worship continues unabated throughout the world. This article is a bit more recent but similar acts occur nearly every day (or night depending on how you look at it).
I have received much feedback from some very vocal peers with a different view on how to respond to such vandalism. Their approach is certainly valid and is, and has been, used many times in many communities - successfully. So here is an alternate response:
As discussed in the previous post you must do a little leg work in advance, but if you don't you will simply have to do it on the fly afterwards. Get a feel for how long it may take to discover vandalism. Keep in mind that I am speaking of prominent vandalism not so much something small in an out of the way place. I mean the sensational stuff that the passing public will see. Will you be aware of it in an hour, a day, or longer?
Then discuss with your local law enforcement what steps they will take once the event is reported. Build your actions around their response. It's just easier that way. Given that your organization is probably a little more agile than the local government (but not always).
The real divergence in this alternate approach is when the vandalism is removed. In this scenario, rather than hiding the damage, covering it up, cleaning in expeditiously, it is used for public relations and awareness.
Organize a press conference with the local media. Include whichever partners may be most appropriate: the local police chief, prosecutor, mayor, or council members. The press conference becomes a time to speak out say that you are not afraid or ashamed. And to discuss how long the vandalism will remain as a symbol of defiance. Follow-up coverage should be arranged with local media to keep this thought fresh in the public mind and additional awareness activities may be planned as well.
Regardless of which approach might be used, or any method for that matter, it is without a doubt important to plan your actions. Even if this planning is done for just a few minutes after an event. Take the time to think through your actions. What is it you wish to accomplish and why. Then act accordingly with those goals. A few minutes of preparation can prevent embarrassment, annoyance, and further hurt from the event.
Good luck.
I have received much feedback from some very vocal peers with a different view on how to respond to such vandalism. Their approach is certainly valid and is, and has been, used many times in many communities - successfully. So here is an alternate response:
As discussed in the previous post you must do a little leg work in advance, but if you don't you will simply have to do it on the fly afterwards. Get a feel for how long it may take to discover vandalism. Keep in mind that I am speaking of prominent vandalism not so much something small in an out of the way place. I mean the sensational stuff that the passing public will see. Will you be aware of it in an hour, a day, or longer?
Then discuss with your local law enforcement what steps they will take once the event is reported. Build your actions around their response. It's just easier that way. Given that your organization is probably a little more agile than the local government (but not always).
The real divergence in this alternate approach is when the vandalism is removed. In this scenario, rather than hiding the damage, covering it up, cleaning in expeditiously, it is used for public relations and awareness.
Organize a press conference with the local media. Include whichever partners may be most appropriate: the local police chief, prosecutor, mayor, or council members. The press conference becomes a time to speak out say that you are not afraid or ashamed. And to discuss how long the vandalism will remain as a symbol of defiance. Follow-up coverage should be arranged with local media to keep this thought fresh in the public mind and additional awareness activities may be planned as well.
Regardless of which approach might be used, or any method for that matter, it is without a doubt important to plan your actions. Even if this planning is done for just a few minutes after an event. Take the time to think through your actions. What is it you wish to accomplish and why. Then act accordingly with those goals. A few minutes of preparation can prevent embarrassment, annoyance, and further hurt from the event.
Good luck.
Monday, August 21, 2006
More on your home computer
Here is a link to some sound advice on securing your home computer from the folks over at CERT at Carnegie Mellon.
Sorry folks there just wasn't much more to say about this one.
Sorry folks there just wasn't much more to say about this one.
Thursday, August 17, 2006
Personal Firewalls
This article on Personal Firewalls does a really nice job of discussing the "long and the short of it."
Firewalls are a necessity, period (fullstop for those speaking the Queen's English). Folks in the security industry often speak of "Defense in Depth." In other words, you don't put everything you have in place, much like the French did prior to WWII with the Maginot Line. This incredible fortress was bypassed by the Germans, making it useless to the defense of France. Unfortunate for their history and disasterous for your data if you try it on your home computer or home network.
However, that is exactly what most folks do when they only use Anti-virus protection. And it some ways it is similar to using the same vendor for all phases of your defense. Many folks use the all-in-one packages (firewall, anti-virus, anti-spyware) from the major vendors like McAfee or Norton, but again all of the muscle is in one product. And that puts all the work on the processor of one computer as well.
My thoughts on this are simple for those with broadband internet access. Start with a hardware firewall (perimeter firewall). It's a box that is physically between your cable/DSL modem and your computer. There are several brands such as Netgear. Now do you need all the muscle it offers? Probably not, but for about $100 why not add that extra layer of protection. With this the work of your software protection products is a little less intensive. It only needs to focus on everything that gets by the hardware firewall.
Think of it this way. You keep the front door of your house open so you can speak with your neighbor across the street. Bugs tend to fly through the door and you have to spend a bunch of time and effort with a flyswatter getting rid of them. Then you install a screen door and you only have to open your door once in awhile, so your "flyswatter time" is reduced.
It think that might be enough today.
Firewalls are a necessity, period (fullstop for those speaking the Queen's English). Folks in the security industry often speak of "Defense in Depth." In other words, you don't put everything you have in place, much like the French did prior to WWII with the Maginot Line. This incredible fortress was bypassed by the Germans, making it useless to the defense of France. Unfortunate for their history and disasterous for your data if you try it on your home computer or home network.
However, that is exactly what most folks do when they only use Anti-virus protection. And it some ways it is similar to using the same vendor for all phases of your defense. Many folks use the all-in-one packages (firewall, anti-virus, anti-spyware) from the major vendors like McAfee or Norton, but again all of the muscle is in one product. And that puts all the work on the processor of one computer as well.
My thoughts on this are simple for those with broadband internet access. Start with a hardware firewall (perimeter firewall). It's a box that is physically between your cable/DSL modem and your computer. There are several brands such as Netgear. Now do you need all the muscle it offers? Probably not, but for about $100 why not add that extra layer of protection. With this the work of your software protection products is a little less intensive. It only needs to focus on everything that gets by the hardware firewall.
Think of it this way. You keep the front door of your house open so you can speak with your neighbor across the street. Bugs tend to fly through the door and you have to spend a bunch of time and effort with a flyswatter getting rid of them. Then you install a screen door and you only have to open your door once in awhile, so your "flyswatter time" is reduced.
It think that might be enough today.
Subscribe to:
Posts (Atom)