scholarly journals Reliability Analysis of Alarm Signals Transmitting Systems Used to Monitoring Buildings

2020 ◽  
Vol 50 (3) ◽  
pp. 1-20
Author(s):  
Krzysztof Jakubowski ◽  
Jacek Paś

AbstractThe article presents a general method for identity the security risk factor for alarm signal transmission systems (ASTS), which are used in monitoring buildings and critical infrastructure. The security of the transmission of alarm signals to an alarm receiving center (ARC) is a property of the process, which is associated witch performing of tasks and functions, human factor, hardware and environment components. The process of transmitting alarm signals should be characterized by minimizing risk of external and internal interception/distortion or deformation of transmitted signals and in ideal case signals should be encrypted and integrity checked. Determining the security risk indicator for ASTS will allow optimal organization of electronic security systems.

2020 ◽  
Vol 50 (2) ◽  
pp. 43-61
Author(s):  
Jacek Paś ◽  
Krzysztof Jakubowski

AbstractThe article presents a method for determining the security risk indicator for electronic systems that are used to secure field command posts (FCP). Security of FCP of army groupings is a property of the process they carry out which is related to the tasks and functions performed, the human, hardware and environment components. Determining the security risk indicator for FCPs with different organizational structures will allow optimal organization of integrated electronic security systems, including: selection of these devices, their configuration, project implementation and optimal implementation of technical structures, which should also take into account reliability and operational aspects.


2018 ◽  
Vol 6 ◽  
pp. 1013-1016
Author(s):  
Martin Boroš ◽  
Martin Halaj ◽  
Andrej Veľas

Security has been and will probably be one of the basic human needs that we work on every day. Some of the popular options nowadays is the use of modern technologies in security, which is increasingly popular with alarm systems. Mostly alarm systems are electrical security systems, which in many cases can be supplemented by various additional functions according to the owner's requirements. More often, they are also able to connect a secured object to a centralized protection center so that the owner has the possibility of verifying a declared alarm signal through the intervention of the alarm system company operator.This article is aimed at transmitting the indicated alarm signal over a radio network to the centralized protection desk located in the monitoring and alarm receiving center with identification of the most appropriate option.


Author(s):  
S. Marjanishvili ◽  
Mikheil Chikhradze

<p>Physical security challenges from explosions are amplified in confined spaces. The air-blast shock waves reflect and propagate throughout the confined space. This paper describes the process of designing, constructing, and validating a wireless system for identification of explosions in real time. Protection of critical infrastructure requires the creation of a reliable system which provides quick and accurate identification of the hazards and subsequent transmission of the alarm signal to response and rescue services. The proposed wireless system consists of transmitter and receiver modules spaced throughout the tunnel. The transmitter module contains sensors and a microprocessor equipped with blast identification software. The receiver module produces an alarm signal and activation signal for the operation of protecting devices. The experimental validation has been carried out at the underground experimental base of G. Tsulukidze Mining Institute, Tbilisi, Georgia. The results of the testing validated the main characteristics of the system, notably:</p><p>No false signals were generated during the series of 20 experiments</p><p>After a blast event, the duration for analyzing the potential threat is 2.4 msec and the duration for activating the protection device is 11 msec</p><p>The reliable transmission distance is 150 m (492 ft) in a straight tunnel and 50 m (164 ft) in a tunnel with a 90° bend.</p>


Author(s):  
Thangavelu S. D. ◽  
Supriyanto E. ◽  
Yunus J.

Almost all medical devices in ICU/CCU have a built-in clinical alarm system to alert when there are changes in a patient’s condition. The objective of this study is to investigate the effectiveness of the existing alarm system in ICU/CCU. Two summative usability tests were conducted to test the effectiveness of existing and new alarm signals based on IEC 60601-1-8:2006 standard. Further formative test is conducted to study the perception of urgency associated with a number of tones in the alarm signals. The findings indicate that the existing auditory alarm signal in ICU/CCU does not indicate the urgency of the alarm conditions. The simulation test indicates that the respondents preferred 282Hz, 500Hz and 800Hz for low, medium and high-risk alarm respectively. The one-sample proportion z test on urgency mapping indicates that the proportion of responses for the highest risk is more than 50% for a single tone test signal. These results show that a single tone test signal being perceived as the highest risk is regardless of frequency. It can be concluded the auditory alarm designed based on this IEC 60608-1-8:2006 standard is not effective. As such it is proposed that the incorporation of the new alarm frequencies and tones will improve the effectiveness of the alarm signal


Author(s):  
Oleksandr Yermenchuk ◽  
Maksym Palchyk

This article provides systematic international experience of legal regulation of critical infrastructure protection in foreign jurisdictions. Some aspects of national critical infrastructure security systems of such as countries Germany, Spain, USA, and Denmark are described. The article determines that at national levels in different countries critical infrastructure protection is mainly regulated by national security strategies, defense strategies and other basic regulatory acts related to the functioning of critical infrastructure and its protection. The article considers aspects of legal regulation of relations in the sphere of public-private partnership and critical infrastructure protection in modern Ukraine. According to the results of the research, it has been established that in Ukraine there are documents of strategic character that regulate the implementation of public-private partnership, which should become a mutually beneficial factor that will facilitate mutual integration processes. Main directions for developing public-private partnership in the field of critical infrastructure protection in Ukraine have been suggested. Key words: public-private partnership, legal regulation, critical infrastructure, critical infrastructure protection, international experience.


2021 ◽  
Vol 3 (9(111)) ◽  
pp. 63-83
Author(s):  
Serhii Yevseiev ◽  
Yevgen Melenti ◽  
Oleksandr Voitko ◽  
Vitalii Hrebeniuk ◽  
Anna Korchenko ◽  
...  

To effectively protect critical infrastructure facilities (CIF), it is important to understand the focus of cybersecurity efforts. The concept of building security systems based on a variety of models describing various CIF functioning aspects is presented. The development of the concept is presented as a sequence of solving the following tasks. The basic concepts related to cyberattacks on CIF were determined, which make it possible to outline the boundaries of the problem and determine the level of formalization of the modeling processes. The proposed threat model takes into account possible synergistic/emergent features of the integration of modern target threats and their hybridity. A unified threat base that does not depend on CIF was formed. The concept of modeling the CIF security system was developed based on models of various classes and levels. A method to determine attacker's capabilities was developed. A concept for assessing the CIF security was developed, which allows forming a unified threat base, assessing the signs of their synergy and hybridity, identifying critical CIF points, determining compliance with regulatory requirements and the state of the security system. The mathematical tool and a variety of basic models of the concept can be used for all CIFs, which makes it possible to unify preventive measures and increase the security level. It is proposed to use post-quantum cryptography algorithms on crypto-code structures to provide security services. The proposed mechanisms provide the required stability (230–235 group operations), the rate of cryptographic transformation is comparable to block-symmetric ciphers (BSC) and reliability (Perr 10–9–10–12)


Author(s):  
Kambiz Mokhtari ◽  
Mehrdad Behforouzi ◽  
Kais Ali Hassan ◽  
SDS Dadwal ◽  
Arife Tugsan Colak ◽  
...  

Nowadays, the pressure for enhanced attention to critical infrastructure security and the focused concern on threats emanating from both domestic and foreign terrorist groups have fostered new challenges for Petrochemical Seaports and Offshore Terminals (PSOTs). These tendencies dictate to maintain comprehensive security regimens that can be integrated with national and international strategies to support the country’s security against terrorism. Therefore, the need for a Security Risk Management (SRM) programme will be an essential part of the business of running a seaport particularly if the addressed port or terminal is handling hazardous chemicals produced from a nearby plant or refinery for export purposes. As a result, by the use of a case study in this paper, the identified security risk factors for an offshore Single Point Mooring (SPM) terminal located inshore side of the seaport of Mina al Fahal in Sultanate of Oman will be assessed by introducing its designated Security Risk Factor Table (SRFT) in order to examine the vulnerability of the addressed terminal. Consequently, the proposed framework can be used by intelligence analysts or port security and risk managers for the protection of these critical infrastructures. Suitable mitigation measures and further treatments for lessening the impact of a successful terrorist attack or potential likelihood of other threats in PSOTs facilities will be studied carefully.


Author(s):  
Richard Boddington

Digital evidence, now more commonly relied upon in legal cases, requires an understanding of the processes used in its identification, preservation, analysis and validation. Business managers relying on digital evidence in the corporate environment need a greater understanding of its true nature and difficulties affecting its usefulness in criminal, civil and disciplinary proceedings. This chapter describes digital evidence collection and analysis, and the implications of common challenges diminishing its admissibility. It looks at determining the evidentiary weight of digital evidence that can be perplexing and confusing because of the complexity of the technical domain. Digital evidence present on computer networks is easily replaced, altered, destroyed or concealed and requires special protection to preserve its evidentiary integrity. Consequently, business managers seeking the truth of a matter can find it a vexing experience, unless provided with a clear appraisal and interpretation of the relevant evidence. Validating evidence, that is often complex and incomplete, requires expert analysis to determine its value in legal cases to provide timely guidance to business managers and their legal advisers. While soundly configured security systems and procedures enhance data protection and recovery, they are often limited in the way they preserve digital evidence. Unprepared personnel can also contaminate evidence unless procedural guidelines and training are provided. The chapter looks at the benefits for prudent organisations, who may wish to include cyber forensic strategies as part of their security risk contingency, planning to minimise loss or degradation of digital evidence which, if overlooked, may have adverse legal repercussions.


Author(s):  
M. J. Warren

Understanding and managing information infrastructure (II) security risks is a priority to most organizations dealing with information technology and information warfare (IW) scenarios today (Libicki, 2000). Traditional security risk analysis (SRA) was well suited to these tasks within the paradigm of computer security, where the focus was on securing tangible items such as computing and communications equipment (NCS,1996; Cramer, 1998). With the growth of information interchange and reliance on information infrastructure, the ability to understand where vulnerabilities lie within an organization, regardless of size, has become extremely difficult (NIPC, 1996). To place a value on the information that is owned and used by an organization is virtually an impossible task. The suitability of risk analysis to assist in managing IW and information infrastructure-related security risks is unqualified, however studies have been undertaken to build frameworks and methodologies for modeling information warfare attacks (Molander, Riddile, & Wilson, 1996; Johnson, 1997; Hutchinson & Warren, 2001) which will assist greatly in applying risk analysis concepts and methodologies to the burgeoning information technology security paradigm, information warfare.


Sign in / Sign up

Export Citation Format

Share Document