StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Surveillance Security - Essay Example

Cite this document
Summary
This paper 'Surveillance Security' tells that In this global technological evolution of information systems, every organization protects the network by firewalls, intrusion detection systems etc. The widespread implementation of these network defence equipment facilitated the organizations to be more secure…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.2% of users find it useful
Surveillance Security
Read Text Preview

Extract of sample "Surveillance Security"

In this report, a digital surveillance system is proposed for the protection of organization’s critical databases, servers and equipments. The threats that will be countered are physical theft, floods, earthquakes, hacking, and unauthorized access. Moreover, biometric systems are incorporated at the doors of critical department for tracking employee existence and activity. IP based cameras are installed on critical server equipments, servers and departments. In order to detect advanced viruses, intrusion detection systems are implemented. Introduction In this global technological evolution of information systems, every organization protects the network by firewalls, intrusion detection systems and other dedicated hardware. The widespread implementation of these network defense equipments facilitated the organizations to be more secure. However, the other side of the picture demonstrates that it has also maximized opportunities for hackers to breach in the systems. Security is essential part of any computer network that is operational. Security measures are mandatory as ‘www.businessdictionary.com’ covers the basics and states it as “Prevention of and protection against assault, damage, fire, fraud, invasion of privacy, theft, unlawful entry, and other such occurrences caused by deliberate action”. Another definition in the context of network security stated as “Network security covers such issues as network communication privacy, information confidentiality and integrity over network, controlled access to restricted network domains and sensitive information, and using the public network, such as Internet, for private communications ”. Organizations spend enormous funds only for implementing advanced security devices and security applications The reason for doing large investments in order to protect networks is understandable as the impacts of security breaches are also equivalent. Security breaches related to data theft, hacking, unauthorized access etc. impacts on organizations reputation in the market as customer data is exposed to hackers, who can use it for many purposes for financial gain. Likewise, this will also lead in severe revenue loss. The current network of 1-Click Mobile Phones Ltd has only a firewall to combat all the threats. No internal access policies are implemented, no advanced security appliances are present, and no surveillance security framework is implemented. 1-Click Mobile Phones Ltd has recognized the importance of securing the network and hence decided to equip the network with a surveillance security cameras and biometrics, advanced security appliances, wireless security and internal access policies. The objectives of this report are to identify and prevent Unauthorized Access, Monitoring Employee activities by surveillance, Monitoring critical server, database and equipments by surveillance and Preventing Wireless access. Although, advanced firewalls support packet-filtering technology to analyze every packet before granting access. Moreover, ‘computer security incident response teams’ are deployed to perform recovery whenever an incident generates on the network. Physical Infrastructure Policy The physical infrastructure policy will add surveillance security to the current network. There are no definitions available for video surveillance security apart from this one that states it, as “Intelligent Video Solution is a system of hardware and software that aids the security executives in performing their daily tasks. An intelligent video solution can be from a single manufacturer or it can be a compilation of components (both hardware and software) from a variety of manufacturers. The net end result is that it is the sum of all of its parts performing the tasks they were designed to do” (Elliott 2010). For the current network of 1-Click Mobile Phones Ltd, a cost effective network video recording surveillance solution s required. The ‘VS-8024 VioStor NVR (Network Video Recorder)’ will fulfill all the requirements of the network as it supports high definition real time monitoring from 24 simultaneous channels. Some of the recording features of this device are Remote live monitoring, recording and playback, High definition H.264, MxPEG, MPEG-4 and M-JPEG Recording as recording features are available in three modes i.e. Continuous, manual and schedule recording. Moreover, motion detectors perform alarm recording (, QNAP Systems, Inc. (VS-8024 VioStor NVR) - Quality Network Appliance Provider). Furthermore, alarm recording can also be scheduled on maximum 15 specific cameras to save storage. In addition, the network video recorder also supports, picture in picture capability, multi mode display, digital zooming, and multi server monitoring that are limited to 128 channels that can be accesses from a remote workstation on LAN or WAN interface (, QNAP Systems, Inc. ( VS-8024 VioStor NVR ) - Quality Network Appliance Provider ). ‘AXIS M30 Network camera series’ is recommended. Ultra-discreet fixed dome design, ‘AXIS M30 Network camera series’ shares multiple features as it supports Multiple H.264 streams, simple installation, Power over Ethernet and many features on an economical price (, AXIS M30 Network Camera Series ). Fig 1.1 shows the hardware specifications for ‘AXIS M30 Network camera series’. Feature Specifications Indoor AXIS M3014 Max video resolution 1280 x 800 Min illumination(color) 1 lux Megapixel sensor/HDTV 1 MP/720p Motion detection and tampering alarm Available Digital Pan/Tilt/Zoom Available Power over Ethernet Available Fig 1.1 (Data retrieved from (, AXIS M30 Network Camera Series ) Moreover, the surveillance cameras support security Password protection, IP address filtering, HTTPS* encryption, digest authentication and user access log. The supported network protocols are IPv4/v6, HTTP, HTTPS, QoS Layer 3 DiffServ, FTP, SMTP, Bonjour, UPnP, SNMPv1/v2c/v3(MIB-II), DNS, DynDNS, NTP, RTSP, RTP,TCP, UDP, IGMP, RTCP, ICMP, DHCP, ARP and SOCKS. System integration supports Application Programming Interface (API) along with intelligent video. The video: motion detection technology provides active tampering alarms. Events associated with alarms perform file upload via FTP, HTTP and email. Moreover, notification via email is also supported along with HTTP and TCP. Video buffers for the camera are 40 MB pre- and post alarm. In order to make the digital surveillance system operational, the IP cameras will be connected to the network video recorder. The ‘AXIS M30 Network camera series’ has a 1-mega pixel camera that will demonstrate clear images in both modes of the day i.e. morning and night. The video recording will be conducted by ‘VS-8024 VioStor NVR that will save recording on 8 bays with over 16 terabytes of storage. The NVR is embedded on a Linux based operating system. The requirements for a separate workstation will be eliminated and will be consider as a cost saving option for 1-Click Mobile Phones Ltd. The business continuity options includes power over Ethernet. Network dictionary defines PoE as “Power over Ethernet (PoE) technology describes any system to transmit electrical power, along with data, to remote devices over standard twisted-pair cables in an Ethernet network. This technology is useful for powering IP telephones, wireless LAN access points, webcams, Ethernet hubs, computers, and other appliances where it would be inconvenient or infeasible to supply power separately.”The PoE will contribute to the organization’s network continuity planning, as alternate sources of electricity will augment network availability. The policy also includes the protection of data, software and hardware. This concludes that the highly secured are of the organization for instance, server room, or finance department, must requires protection in terms of biometric systems and IP surveillance. The cost of hardware is summarized as: Product Cost VS-8024 VioStor NVR $ 2899 AXIS M30 Network Camera Series $ 200 Biometric Systems (Associated with Finger Identification) x 4 38.49 x 4 = $ 153.96 User Access Control and Authentication Policy 1-Click Mobile Phones Ltd requires a user access and authentication policy in order to deploy a framework that will operate in strict compliance. There is a requirement for a centralized configuration framework that will control all the access policies of all users on the network. The framework will also provide user credentials to each employee. The user credentials includes the username and password. Implementation of a centralized access policy will only be possible by implementing a domain. The domain will combine all the network components on the network including network devices, Printers, workstations, switches etc. moreover, the next step will be to optimize the domain with active directory. Microsoft active directory will allow the network administrator to set file permissions against each user. Likewise, Internet access to everyone is not possible, as it will augment the risk from viruses and spywares. Active directory can restrict internet access as well. Before setting rules and policies, users and workgroups are created and then policies and restrictions are applied to them. Additional domain server is required with these hardware specifications: Processor Intel Dual Core E5400 2.7GHZ (2MB cache – 800MHZ FSB) Motherboard Intel DG41RQ (LGA775-SND+AGP+GIGA LAN-800MHZ FSB) Memory 4GB DDRII (800 Bus) Hard drive 320GB 3.5" SATA-II 7200RPM Optical drive HP DVDRW 24X SATA LCD Monitor 17 inch Total Cost $ 2300 Network Policy 1-Click Mobile Phones Ltd already has a firewall in place. Firewall can prevent network from viruses, spywares, Trojans etc. Most likely, organizations do not reply completely on firewalls as they can only provide logical security as compared to physical security. Moreover, viruses are intelligent and now stated as advanced persistent threats. Intrusion detection systems are ahead from firewalls in terms of advanced security for a computer network. 1-Click Mobile Phones Ltd will incorporate an Intrusion Detection System for advanced security. “Intrusion detection system (IDS) is a type of security management system for computers and networks. An IDS gathers and analyzes information from various areas within a computer or a network to identify possible security breaches, which include both intrusions and misuse” (Network-Based Intrusion Detection System. 2007). Organizations save activity patterns in IDS databases so that they can continuously match the patterns with the current activity on the network. ‘Secure Solutions Ltd’ recommends an implementation of an IDS to secure the network environment from denial of service attacks and major security breaches. IDS has a comprehensive alerting system and alerts are send via any medium available (differs from model to model). 1-Click Mobile Phones Ltd is also facing one more issue that involves a vulnerable wireless network. The network is vulnerable due to absence of encryption and privacy configuration. SSID is “The name assigned to a wireless Wi-Fi network. All devices must use this same, case-sensitive name to communicate, which is a text string up to 32 bytes long. Typically set to the equipment vendor's name, such as "linksys," it can be manually changed by going into the configuration settings of the access point with a Web browser. The client machines will identify all the wireless networks they find when they boot up, unless the networks are hidden”. ‘Secure Solutions Ltd’ recommends configuring SSID and WEP on the wireless network or devices. WEP is another wireless security protocol defined in network dictionary as “a security protocol, specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.11b, that is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is usually expected of a wired LAN”. Hardware based IDS will not be a feasible option as it is way to expensive. A conventional software based IDS will provide efficient security anf the price will be around $ 250 to $ 300. Business Continuity Policy For implementing business continuity policy, the countermeasures are illustrated below: Physical Threats Counter Measures Theft Lock Cabinets IP cameras, biometric fingerprint identification, Vandalism Hard steel box for Servers and Databases Flood Relocating or replicating the network room Create a duplicate or replica of crucial data servers that are geographically located away Fire water sprinklers, Fire extinguishers Earthquake Relocating data with data centers that are geographically located away Physical Infrastructure for 1-Click Mobile Phones Ltd Figure 1.1 shows the design of the ground floor. Figure 1.2 shows the design of the First floor. References , What is security policy? definition and meaning . Available: http://www.businessdictionary.com/definition/security-policy.html [5/8/2011, 2011]. Network Security. 2007. Network Dictionary, , pp. 339-339. , QNAP Systems, Inc. ( VS-8024 VioStor NVR ) - Quality Network Appliance Provider . Available: http://www.qnap.com/pro_detail_feature.asp?p_id=130 [5/12/2011, 2011]. Ssid. 2011. Computer Desktop Encyclopedia, , pp. 1. , Online Store - Ax3 Software . Available: http://www.ids-sax2.com/OnlineStore.htm [5/10/2011, 2011]. ELLIOTT, D., 2010. Intelligent Video Solution: a Definition. Security: Solutions for Enterprise Security Leaders, 47(6), pp. 46-48. , AXIS M30 Network Camera Series | Axis Communications . Available: http://www.axis.com/products/m30_series/ [5/12/2011, 2011]. Power over Ethernet. 2007. Network Dictionary, , pp. 382-382. Network-Based Intrusion Detection System. 2007. Network Dictionary, , pp. 340-340. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Surveillance Security research assingment Essay”, n.d.)
Retrieved from https://studentshare.org/environmental-studies/1421532-surveillance-security-research-assingment
(Surveillance Security Research Assingment Essay)
https://studentshare.org/environmental-studies/1421532-surveillance-security-research-assingment.
“Surveillance Security Research Assingment Essay”, n.d. https://studentshare.org/environmental-studies/1421532-surveillance-security-research-assingment.
  • Cited: 0 times

CHECK THESE SAMPLES OF Surveillance Security

Technology and Its Effect on Human Freedom and Happiness in Society

The writer discovers polar sides of technogen effects on our internal state, besides showing examples how technology affects on individual freedom, covering both variants as well.... … The writer discovers polar sides of technogen effects on our internal state, besides showing examples how technology affects on individual freedom, covering both variants as well....
4 Pages (1000 words) Term Paper

Big Switch Network Design

hellip; For providing a security mechanisms to the internal data communication, Virtual local area networks (VLAN) are recommended.... Addressing security Issues and Deployment Approach for WAN A router is a core computing and packet processing devices in the Bigswitch computer network.... The Cisco 3845 Integrated Services Router provides optimal performance for parallel services on the local area network including security, voice, and enhanced services....
9 Pages (2250 words) Report

Use of Satellites by the US Military to Improve Battlefield Awareness

Collection of intelligence and locating targets are mostly enabled by the satellite surveillance.... Their recent operations and raids have utilized space surveillance as a method of staying alert in the battle field.... echnological innovations increase the risk of vulnerability hence the Americans military to keep up their research and advancement in space satellite surveillance....
4 Pages (1000 words) Essay

The Totalitarianism in Modern Times

The Totalitarianism in Modern Times Introduction In the past, people have experienced a type of government that centered all its power, authority, policies, rules, and regulations on the mighty and vigor of a dictator.... A dictator is a person who solely runs the nation with a single government that rules every land and every freedom of the people as human beings and citizens of the country....
4 Pages (1000 words) Essay

Student Evaluation Form

For instance the intern has to stay mostly at the surveillance room to ensure that every Surveillance Security is running properly without any problems.... This is done for security purposes and to also keep a closer look on how everything runs in the company is running....
2 Pages (500 words) Assignment

Behavioral theory and Social cognitive (learning) theory and Behavioral concept paper

These include the Internet, YouTube, Surveillance Security cameras and tweeting.... Today's culture of social media and the internet has direct relevance to Skinner's hypothesis on environmental control on human behavior.... In his theory, Skinner highlighted various environmental factors… According to Skinner, human behavior is a subject of manipulation of one's environment....
2 Pages (500 words) Essay

Information Technology: Surveillance Security

In order to protect the computer network, organizations emphasize on implementing hardware and software application as well as a framework in terms of Surveillance Security.... Organizations require advanced protection and security from these threats and vulnerabilities.... security is mandatory to protect anything that needs to be protected as 'www.... A definition associated with information and communication technology will demonstrate the concerns related to network communication privacy, confidentiality of data over the network, accessing unauthorized classified data, access to prohibited network domains and utilizing the Internet for concealed communication (Network security....
8 Pages (2000 words) Assignment

Network-Based Intrusion Detection System

This report "Network-Based Intrusion Detection System" demonstrates a proposed digital surveillance system for the security and protection of critical assets of the organization.... In this global technological evolution of the digital era, every organization protects digital data by deploying hardware or software-based firewalls, security appliances such as intrusion detection systems, and other dedicated hardware.... However, in any case, security is paramount and every computer network possessing personal or confidential data has to be protected....
8 Pages (2000 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us