Life Safety Networks A Parallel Network Approach Matthew K. Arthur, CISSP Director – Enterprise Networks Washington University in St. Louis ACUHO-I, 30.

Slides:



Advertisements
Similar presentations
Saif Bin Ghelaita Director of Technologies & Standards TRA UAE
Advertisements

Homeland Security at the FCC July 10, FCCs Homeland Security Focus Interagency Partnerships Industry Partnerships Infrastructure Protection Communications.
PARK IT HERE! Real-Time Parking Information in Uptown Charlotte PARK IT HERE! Real-Time Parking Information in Uptown Charlotte Presenters: Cole Dagerhardt.
How Electronic Security Solutions can Help the Government in Securing its Assets and Reduce Energy expenditure Presented By- Nimish Vishnoi Manager-Product.
The Federal Jeanne Clery Act requires all institutions to collect crime reports from a variety of individuals and organizations that the Act considers.
Accident Incident Policy Changes to Policy September 2007.
Community Crime Prevention CCTV in Victoria A Guide to Developing CCTV in Victoria Presenter:Simon Walker Title:Senior Policy Officer Date:13 November.
Washtenaw County Strategic Space Plan Recommendations November 1, 2006.
Steps to Prevent School Violence Steve Wilder, BA, CHSP, STS Sorensen, Wilder & Associates Bradley, IL.
FACILITY SAFETY: Creating a Safe and Secure Environment in the Community Health Center Presented by Steve Wilder, BA, CHSP, STS Sorensen, Wilder & Associates.
Presentation Retail Security Key Holding Mobile Patrols Access Control Systems Manned Security Receptionist CCTV Monitoring.
1 Introduction to Security Chapter 15 Institutional Security.
Chuck Barry (702)
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
MOTOROLA and the Stylized M Logo are registered in the US Patent and Trademark Office. All other product or service names are the property of their respective.
Gefördert durch das Kompetenzzentrenprogramm DI Alfred Wertner 19. September 2014 Ubiquitous Personal Computing © Know-Center Security.
WebCast 5 May 2003 NERC Cyber Security Standard Overview of Proposed Cyber Security Standard.
Network Security In Education A Balancing Act Doug Klein CTO Vernier Networks, Inc.
Information Security Policies Larry Conrad September 29, 2009.
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
1 What Does the Chief Know? Chief video. 2 Fundamental Principles of Implementing Information Technology Chapter 1.
Parnassus Heights Campus Security Work Group Recommendations Jeffrey Bluestone, Director UCSF Diabetes Center Pamela Roskowski, Chief of Police October.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Affiliated Information Security Collaborative An Affiliated Enterprise Approach to Information Security Deans and Vice Presidents Meeting April 17, 2014.
Agenda University Services The State of the Campus Campus Safety Central Corridor Light Rail.
Session 3 – Information Security Policies
THE STATE OF HEALTHCARE SECURITY Past, Present, and Future Jeff Aldridge, CEO Security Assessments International June 16, 2005.
1 Customer Network Operations Center. 2 Agenda Overview Benefits Value Additional Services Questions Monitoring Options.
Agenda  Introduce key concepts in information security from the practitioner’s viewpoint.  Discuss identifying and prioritizing information assets through.
Using technology to increase the value of Real Estate
Lessons Learned in Smart Grid Cyber Security
The Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act is the landmark federal law, originally known as the Campus Security.
Physical Security By: Christian Hudson. Overview Definition and importance Components Layers Physical Security Briefs Zones Implementation.
HOMELAND SECURITY ADVISORY SYSTEM. Established after the terrorist attacks on America September 11, 2001.
SECURITY & THE UNIVERSITY INCLUDING A HOSPITAL October 3, 2008 Doyle Friskney Chief Technology Officer University of Kentucky.
PANTHER SECURITY AND PRIVATE INVESTIGATION Security is degree of protection against danger, damage, loss and crime.
Case Studies Healthcare. Christus Spohn Hospital - USA Monitoring a hospital’s pulse deep in the heart of Texas.
Massachusetts Digital Government Summit / Session - Smile You're On CameraPage 1.
Infrastructure Security Leveraging the ITS Experience Base Presented at ITS America Commercial Vehicle and Mobility Forum K.K Saxena, CCP Principal Kimley-Horn.
Securing Critical Chemical Assets: The Responsible Care ® Security Code Protection of Hazardous Installations from Intentional Adversary Acts European.
Kellie E. Tomeo, Esq Rampart International, LLC. AdvantageChallenge Increase existing security personnel productivity Increase existing facility personnel.
How to Sell T-Link TL250/300. T-Link Internet & Network Alarm Communicators Internet alarm communications for multi-branch Financial Institutions, Governments,
1 LOW CURRENT  FIRE & SAFETY………………………………. 1) Fire Alarm ( EDWARDS ) Smoke, Heat and GAS detectors connected to audible and visual devices to convey the.
WebCast 5 May 2003 Proposed NERC Cyber Security Standard Presentation to IT Standing Committee Stuart Brindley, IMO May 26, 2003.
1 Drivers for Building Life Cycle Integrations Jim Sinopoli.
Corporate Security Strategy Presentation to Strategy & Regeneration Overview & Scrutiny Committee Councillor David Lancaster (Lead Member for Crime & Disorder)
Security aspects in the construction and maintenance of infrastructures of the inland transport sector Richard Harris Director Intelligent Transport Systems.
Developing a Security Program. Exercise Plan Develop/Update Plan Review/Revisit Plan.
RESPONSIBLE CARE ® SECURITY CODE Daniel Roczniak Senior Director, Responsible Care American Chemistry Council June 2010.
Site Security Policy Case 01/19/ : Information Assurance Policy Douglas Hines, Jr.
NDSU Personal Safety and Security Assist. Project Introduction Leverages: –People and Partnerships –Philosophies –Centralized and Integrated Systems.
1 ITS STRATEGIC INITIATIVES Ken Orgill Assistant Vice Chancellor, Information Technology Services and Campus Chief Information Officer.
School Safety and Security Proposed Projects and Upgrades.
IS3220 Information Technology Infrastructure Security
Regional Telecommunications Workshop on FMRANS 2015 Presentation.
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
SEC 410 Entire Course (UOP) SEC 410 Week 1 DQ 1 (UOP)  SEC 410 Week 1 Individual Physical Security Paper   SEC 410 Week 1 DQ 1   SEC 410 Week 1 DQ.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
March 23, 2015 Missouri Public Service Commission | Jefferson City, MO.
The Physical Security in UTM NAWAF OMAR MAN Prof Hafiza Abas.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
Protecting Houses of Worship Security Plan Development Considerations Glenn Moore Protective Security Advisor – Oklahoma District National Protection and.
CAMPUS LAN DESIGN GUIDE Design Considerations for the High-Performance Campus LAN.
Argus CMS Private Limited A group company of Argus Electronic Security Systems Pvt. Ltd. (An ISO 9001:2008 Company) For trade enquires and care call -
Module 5: Designing Physical Security for Network Resources
Commercial CCTV Systems – Recording your Business.
Safety and Security- From Assessment to Implementation
IT Development Initiative: Status & Next Steps
Physical Security.
Presentation transcript:

Life Safety Networks A Parallel Network Approach Matthew K. Arthur, CISSP Director – Enterprise Networks Washington University in St. Louis ACUHO-I, 30 September 2007

AGENDA Background Requirements Planning Implementation Current Status Futures Questions

BACKGROUND WU Network Setup - A Federated Model Core Network, Departmental Control Facilities - Pain and Frustration Layer 2 requirements, Departmental Control Spring 07 Tragedy CCTV Requirement for Residence Halls

REQUIREMENTS General Principles of the WU CCTV Policy Protection of individuals, including students, faculty, staff, and visitors Protection of University owned and/or operated property, and buildings, including building perimeters, entrances and exits, lobbies and corridors, … Verification of alarms and access control systems; Investigation of criminal activity and serious disciplinary activity, such as, for example sabotage of research projects; and Protecting the University interest against negligence liability

REQUIREMENTS Camera Viewing Criteria As a reaction to known threats and incidents (theft, assault, vandalism, sabotage, etc.) Coverage of residential housing and parking areas. Coverage of emergency audio assistance stations located on University property Coverage of access control devices on University property Coverage of general property & assets Proactive coverage for heightened security needs (events, construction, ralies, etc.)

REQUIREMENTS IT Requirements Latency, Jitter, Packet Loss, Network Availability, Mean to Repair Network Vulnerability: A disruption to security surveillance information represents another level of concern for physical security professionals. If the network can be proven to be reliable and secure, the technology would be embraced. Privacy and Security Sensitive Information (SSI): A key advantage to an IP based CCTV system is the availability of live and archived video to system stakeholders. Network software and hardware design would need to ensure that video could be viewed, but not saved or stored under any circumstances.

REQUIREMENTS Must Be UP and accessible ALL the time Student Network Cant Be in Position to Overwhelm Must Be Able to Provide Evidence Quality Video Private, Secure, Private, Secure, Private, Secure

PLANNING CCTV Policy + Chancellors Committee on CCTV + Spring 07 Tragedy = Meetings & Planning CCTV + Facilities Hopes and Dream = Parallel, Private, Secure Network AVC Facilities and AVC IS&T level meetings Budget for Residential Implamentation

IMPLEMENTATION POE Building Switches => Fiber Pick-up Switches => Core Router Establish Fiber Routes Configure Building Switches Private Address Space CCTV, Monitoring, Access Control, & Laundry/Vending…

IMPLEMENTATION 38 Buildings 132 Cameras 46 POE Switches 4 Fiber Pick-up Switches 2 Monitoring Stations Network Monitoring - NOC IT Costs = $213K (including fiber upgrades)

CURRENT STATUS All Buildings Installed Prior To Move-In Communications/Coordination Problems Add-Ons Fraternity House Change Over Parking Garage New Venue in Bad Neighborhood Main Campus Planning Fiber Infrastructure Problems…

FUTURES Coordination w/ Medical School Change From: Life Safety Network To University Services Network Financing USN and Fiber Upgrade Traction Works…

QUESTIONS??? Matt Arthur