Home Security System Components:
In planning on installing a home alarm in either yourself or professionally, it is important that having enough knowledge in the components that make up a complete home security system.
A home security system is made up of four separate groups.
1. Alarm System Control – "the Brain"
2. Alarm System Keypad – "the Heart"
3. Alarm System Detection Device – "the Eyes and Ears"
4. Alarm System Siren – "the Attention Getter"
Having these four grouped together as a single component, thereby forming a complete home security system.
The Control or Control Panel
It is the Brain of the home alarm security. Control Panel is where all the information ...view middle of the document...
It checks the system status, turn the alarm system on (arm) and off (disarm) and the program user codes. It also gives the status of the alarm system at a glance using Light Emitting Diode (LED) or Liquid Crystal Display (LCD).
3 led light on the keypad:
• Green – system ok ready to arm
• Red – alarm system is armed
• Yellow – indicates there is a trouble condition or problem with the control device
The Eyes and Ears – Security Devices
Intrusion Detection System (IDS) generally detects unwanted manipulations of computer systems, mainly through the Internet. The manipulations may take the form of attacks by crackers.
An intrusion detection system is used to detect several types of malicious behaviors that can compromise the security and trust of a computer system. This includes network attacks against vulnerable services, data driven attacks on applications, host based attacks such as privilege escalation, unauthorized logins and access to sensitive files, and malware (viruses, trojan horses, and worms).
An IDS is composed of several components:
• Sensors which generate security events
• Console to monitor events and alerts and control the sensors,
• central Engine that records events logged by the sensors in a database and uses a system of rules to generate alerts from security events received.
Types of Intrusion-Detection systems
In a network-based intrusion detection system (NIDS), the sensors are located at choke points in the network to be monitored, often in the demilitarized zone (DMZ) or at network borders. The sensor captures all network traffic and analyzes the content of individual packets for malicious traffic. In systems, Perimeter intrusion detection system (PIDS) and appication Protocol-based intrusion detection system APIDS are used to monitor the transport and protocols illegal or inappropriate traffic or constructs of language. In a host-based system, the sensor usually consists of a software agent, which monitors all activity of the host on which it is installed. Hybrids of these two systems also exist.
• A network intrusion detection system.
• A protocol-based intrusion detection system.
• An application protocol-based intrusion detection system.
• A host-based intrusion detection system.
• A hybrid intrusion detection system.
A burglar alarm detection point or Passive Infrared (PIR) sensor . Burglar, fire and safety alarms are found in electronic forme today. Sensors are connected to a control unit via either a low-voltage hardwire or narrowband RF signal, which is used to interact with a response device. The most common security sensors indicate the opening of a door or window or detect motion via passive infrared (PIR). New construction systems are predominately hardwired for economy while in retrofits wireless systems may be more economical and certainly quicker to install. Some systems are dedicated to one mission, others handle fire, intrusion, and safety alarms simultaneously....