Abstract

This chapter reveals that system finalization includes commissioning, training, and acceptance. Steps include device Internet Protocol (IP) addressing and start up, device communications and programming, and securing the security system. The security system must itself be secure. The best way to do that is to secure the system at all seven layers of the open system interconnection (OSI) network model. It is the responsibility of the designer to ensure that the security system design includes securing the security system. Wherever possible, security measures should be taken at all seven layers of the OSI networking model. Radio frequency (RF) systems in particular should be secured because their infrastructure has no physical security. Common RF attacks include: probing/network discovery, denial of service (DoS) attacks, surveillance, impersonation, client-to-client intrusion, client-to-network intrusion, rogue Aps, and ad hoc networks. Archived data must also be secured, and a business continuity program should be developed for the security system. User classes and authorities should be set up, and logon/logoff security should be considered. The system cutover should be well planned so as to occur smoothly.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.