SECAM Systems Product Presentation SECAM Systems © 2010.

Slides:



Advertisements
Similar presentations
Secure File Transfer Protocol (SFTP) With Secure Copy (SC) What is a Secure File Transfer Protocol with Secure Copy???
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Network Systems Sales LLC
Using the Self Service BMC Helpdesk
Module 5: Configuring Access for Remote Clients and Networks.
Unauthorized Reproduction Prohibited SkyPoint Alarm Integration Add-On Using OnGuard Alarms to create events in SkyPoint Also called ‘SkyPoint V0’ CR4400.
Database Management System
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Security Controls – What Works
Chapter 19: Network Management Business Data Communications, 4e.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Systems Analysis and Design in a Changing World, 6th Edition
Accounting & Billing System for the WEB Centre GDP 19 Donna Crawford (dc899) Chris O’Neill (ckjon101) Amit Shah (ams401) David Newman (drn101) Supervisor.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Best Practices – Overview
Chapter 8 Security Transparencies © Pearson Education Limited 1995, 2005.
Computer Security: Principles and Practice
Digital Surveillance. Danish Software Company specialized in development of security solutions. Started in year 2000 with HQ in Copenhagen. All solutions.
Maintaining and Updating Windows Server 2008
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 14: Troubleshooting Windows Server 2003 Networks.
Information Resources and Communications University of California, Office of the President System-Wide Strategies for Achieving IT Security at the University.
Tutorial Introduction Fidelity NTSConnect is an innovative Web-based software solution designed for use by customers of Fidelity National Title Insurance.
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
CCTV with POS Overlay Fully integrated Database search facility S.A.Cash Register (Pty) Ltd.
Trimble Connected Community
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Computers Are Your Future Tenth Edition Chapter 12: Databases & Information Systems Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
The University of Akron Dept of Business Technology Computer Information Systems DBMS Functions 2440: 180 Database Concepts Instructor: Enoch E. Damson.
Employee Guidelines for Acceptable Use of Technology Resources.
Team Members David Haas Yun Tang Robert Njoroge Tom Kerwin Clients Facilities Management Don Anderson Rick Klein.
CSU - DCE Internet Security... Privacy Overview - Fort Collins, CO Copyright © XTR Systems, LLC Setting Up & Using a Site Security Policy Instructor:
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
University of Palestine Faculty of Applied Engineering and Urban Planning Software Engineering Department Prepared By Ahmed Obaid Wassim Salem Supervised.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Computer Emergency Notification System (CENS)
First in Service -Best in Banking Pavan Anna Shirish Nadella Maneeshpal Bandlamudi.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Information Security What is Information Security?
Module 7 Planning and Deploying Messaging Compliance.
Chapter 2 Securing Network Server and User Workstations.
Enigma Mutiara Sdn Bhd Computer Based Learning (CBL) HSE Procedures.
PCI-DSS: Guidelines & Procedures When Working With Sensitive Data.
1 A Look at the Application Authorized users can access Communicator! NXT from any Internet-capable computer via the Web.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Anytime, Anywhere Access Benefits Functionality Work Order Administration Dispatch Work Order Work Order Details New Work Order Additional Functionality.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition.
 1- Definition  2- Helpdesk  3- Asset management  4- Analytics  5- Tools.
Engineered Security Systems, Inc. Access Control Systems CCTV Systems Asset Protection Systems Fire Alarm Systems Laptop Protection Systems Burglar Alarm.
REDCap General Overview
DOCUSHARE AND THE TOWNSHIP OF TINY
Blackboard Security System
Review of IT General Controls
Chapter 19: Network Management
Data and database administration
Chapter 2: System Structures
THE STEPS TO MANAGE THE GRID
Designed for powerful live monitoring of larger installations
PLANNING A SECURE BASELINE INSTALLATION
Chapter 21 Successfully Implementing The Information System
Presentation transcript:

SECAM Systems Product Presentation SECAM Systems © 2010

Team Members Caleb Shortt Tubego Phamphang Vikram Sandhu David Cheperdak Moffat Sehudi SECAM Systems © 2010

Problem The 2009 academic year at the University of Victoria saw rampant theft throughout the campus. Particularly targeted was the ECS. Offices and labs were broken into, and thousands of dollars worth of equipment was either destroyed or stolen. SECAM Systems © 2010

Problem The problem comprises of the following items: 1.There are thefts in the ECS building 1.Student’s inability to work in the labs after hours due to this 2.Video camera monitoring system deemed too expensive 1.Lacks desired functionality SECAM Systems © 2010

Problem Domain knowledge: Unauthorized intrusion in to ECS facilities during the day-especially after hours Web Camera activated to record and save the video to the database Campus Security personnel observe web interface Requirement: Security personnel must be notified if there is an unauthorized intrusion SECAM Systems © 2010

SECAM has developed a solution SECAM Systems © 2010

Solution SECAM has developed a web-based monitoring system where users may utilize their own web cameras to secure their office spaces and labs. The only hardware the user would need is a basic web camera and a computer. SECAM Systems © 2010

Solution: General Idea A client application must be installed on the user’s computer to secure the video feed and provide motion and sound detection. The client activates the system through the client application. If there is motion, the system starts recording and notifies the user. If the setting is selected, the system will also notify security personnel. The user can access their webcam feed via the web controls interface. There they can change settings and capture images of the video stream. SECAM Systems © 2010

Solution: General Idea All video recorded is stored in SECAM’s SECURE database and can NOT be modified. This provides tamper-proof evidence for police and security. SECAM Systems © 2010

Solution: Cost The SECAM Solution reduces the cost of securing office spaces and labs exponentially by only requiring the user to provide a relatively cheap web camera and a computer for the camera to connect to. Most offices and labs already have computers which reduces the cost even further. SECAM Systems © 2010

Solution: Components The SECAM Solution consists of three main components: 1.SECAM SECURE: A secure database to which all video is sent and stored. Once video data is in the database the data is only available in a read only format. 2.WebControls: Allows the user to view and modify the current video stream. 3.SysControls: An application that is installed on the user’s computer to manage the webcam and it’s connection to the SECURE database. SECAM Systems © 2010

Functionality SECAM Systems © 2010

Who can use the SECAM system Users of the system Anyone who installs the SECAM client in their office, laboratory etc. i.e. people needing a secure environment 1.Log into the application 2.Customize camera settings 1.Video quality resolution of Camera 2.Activate Motion Capture from remote location 3.Digital zoom 4.Record Time 5.Transmit video or images 6.Choose a sound threshold 7.Notify Security?

Who can use the SECAM system Security Personnel: Security Personnel can access the video feed from any camera and take required action 1.Log into the system 2.Choose room to view from available list 3.View the feed

Who can use the SECAM system System Administrators Responsible for creating new accounts 1.Click Create Account on website 2.Enter required information on form 3.Save information 4.Edit Account 5.Delete Account 6.Renew Account

The diagram to the right depicts a component overview of the SECAM System The system is comprised in to four major components: SECAM SysControls SECAM WebControls SECAM SyServe The system operates off of four major functional information nodes: SECAM WebServer SECAM SECURE Local Computer Local Camera Device The following slide will go into greater detail. SECAM Systems © 2010

A registered local computer to the SECAM SECURE database A video camera device attached to a local computer Primary web server for SECAM WebControls Black Box database solution to protect sensitive recorded data SECAM Systems © 2010

Locally installed application That facilitates camera operation Encrypts video feed Facilitates video transmission Monitors system status Obtains and implements system settings SysControls web based monitoring solution Facilitates modification of SysControl settings Allows user control over the SysControls application Facilitates the viewing of a video stream SysControls connection and video streaming facilitator Functions as a server and handles incoming connection requests from SysControls installations Authenticates SysControls SECAM Systems © 2010

During the planning of this project the SECAM team encountered several challenging problems: Defining the functionality of a SECAM SECURE database Defining the user procedures to maintain high system security Defining account management and user access levels to maintain security Problem definitions are in greater detail and the following slides. SECAM Systems © 2010 Issues

Maintaining the integrity of sensitive data Facilitation and maintenance of sensitive data without human interference Systems to prevent external exploitation of secure connections Efficiently maintain size of data store (Video Compression, etc) Ensure performance meets system wide criteria and parallel processing requirements SECAM Systems © 2010 Defining the functionality of a SECAM SECURE database

Ensure validity of registered SECAM Systems and users Ensure appropriate permission levels are granted Ensure privacy of account information and resources Ensure a secure and unobtrusive account recovery process Ensure a secure and unobtrusive account creation process SECAM Systems © 2010 Defining account management and user access levels to maintain security

Maintaining an intuitive system with desired features Prevent data tampering and ensuring appropriate privacy measures Allowing security personnel to respond to an incident at discretion SECAM Systems © 2010 Defining the uses processes to maintain high system security

Conclusion The SECAM Solution is a cheap, accurate, and fast-response system that solves the ECS theft problem. The owners of the offices and labs will have the means to secure their own spaces, and the correct security personnel will be automatically notified when a breach does occur. SECAM Systems © 2010