Jump to content
Security Installer Community

Search the Community

Showing results for tags 'ip'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Main Public Area
    • Site News, Events, and Feedback
    • Name And Shame Area
    • Introduce Yourself
    • Product / Service News
    • Members Lounge (Public)
    • Guest Forum
    • FORUM TRADE MEMBERSHIP
    • Regulations & Standards
    • Misc Area
    • UK Security Installers by regional Police Force
    • Collectors And Vintage Security & Fire Parts
  • Global Section
    • Security Job Requests and Vacancies
    • Equipment Reviews
    • General Security & Fire Queries
    • !!..DIY Installers..!!
    • Electrics
    • Inspectorate Queries
    • UK Security Sub-Contractors
    • User Manuals
    • Security Horror Stories
    • Setting-up Business Queries
    • Trade ADT Only Engineer Forums
  • CCTV & Access Control Area
    • CCTV & Access Control
    • Trade Access Control
    • Trade CCTV Forums
  • Fire Area
    • General Fire Alarm Queries
    • Trade Fire Forum
    • Restricted Trade Fire Forum
  • Intruder Alarm Section
    • Control Panels (Public)
    • Detector Queries (Public)
    • Home / Building Automation (public)
    • Trade Only Area
  • Telecoms & I.T. Forum
    • General Telecom Queries
    • Networks
    • Computing etc
    • Mobile Devices
  • Trade Security Resources
    • Security Intruder Manufacturers
  • BSIA Commitees
    • SSS TC1
    • SSSTC
    • Regulation Drafts
  • Communal Trade`s Forums
    • Members Lounge
    • Trade Member Listings
    • Security News
    • Installers & Engineers Forum
    • Getting Approved..?
    • Rules and Regulations
    • Health & Safety
    • Basic Electronics
    • Trade Job Vacancies & Queries.
    • Equipment Wanted....
    • Engineer Manuals
    • The SWAP's Shop
  • Trade - Intruder Forums
  • Trade ACCESS & CCTV
  • Trade Fire Alarm Forums

Categories

  • Applications
  • Documents
  • Documents (Trade Members Only)
  • Engineer / Installation Manuals, Training & Application
    • Access Control
    • CCTV
    • Fire
    • Intruder Alarms
    • Training
  • User Manuals
    • Access Control
    • Fire
    • Intruder Alarms
  • Sales Brochures
    • CSL Dualcom
    • Honeywell
    • Texecom
    • Web Way One

Blogs

  • Service Engineer's Blog
  • Service Engineer's Blog
  • arfur mo's Blog
  • therealmophead's Blog
  • jb-eye's Blog
  • jb-eye's Blog NICEIC making up charges for certs
  • jameswilson's Blog
  • Smoke Screen's Blog
  • Jim's Blog
  • The Messenger
  • Electronic Security & Technology
  • digitalwitness' Blog
  • Operational Security & Management
  • The Scantronic & Menvier Tat Blog

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Location

Found 9 results

  1. Hello guys, I have a Risco Agility 3 with IP and GSM - both comms working fine. I have defined two Follow Me (FM), 1 = Me via SMS and 2 = The Wife via SMS also. I as FM1 get all SMS for events defined no probs. However, FM2 (i.e. The wifes phone) does not get anything - her phone is defined correctly - FM test successful (she gets a text) and she can set/unset via sms no probs. Is this by design perhaps, that the system tries the FM numbers in order and if FM1 IS successful, i.e. a SMS was sent ok to FM1 THEN IT IGNORES ALL OTHER DEFINED FMs? If so then it's a bit silly, as we would both like to get SMS for all events defined. Any thought and ideas will be appreciated. Many thanks.
  2. Hello, We are looking for sub-contractors who have good knowledge of IP systems, preferably Samsung (Hanwha). We have an number of sites across the UK with these systems installed, which we are needing serviced. If you have IP knowledge or know of someone who does, please contact me at ###REMOVED### Many thanks, Katherine Stubbs
  3. We are a CCTV/EAS installer/servicer located in the south of England. We cover the whole of the UK and Ireland, and we are looking for sub-contractors to join our ever expanding team. Currently we are very busy with a lot of opportunities available all over the UK, in particular we are looking for service and installation engineers in Southern Ireland. Experience with Pelco & Samsung systems is preferable, also a good knowledge of Analogue and IP. If interested, please contact us on ******************* for further information.
  4. WOT Security are currently recruiting for two permanent Senior Engineer positions. To apply please email your resume and a brief cover letter to: ##REMOVED## This role will involve installing security and fire alarm equipment on new sites and running major projects, including managing a team of engineers. The successful candidates will be responsible for safe, high quality, and timely installation of the equipment following WOT Security installation methods. Successful candidates will have extensive experience installing high specification security equipment (especially IP) in large commercial buildings, running a team of engineers and taking responsibility for installations from first fix through to commissioning. We are ideally looking for Senior Engineers with strong networking experience (programming IP equipment, switches, servers, client PC's on LAN & WAN) however may consider a candidate who requires further training in this area if they have sufficient experience running large projects and setting up basic IP systems. What we are looking for: Installation experience of Fire and Security Alarms, CCTV, Access Control, Entry systems and integration. Knowledge of current NSI regulations, BS5839, BAFE and IP Systems would be advantageous. Electrical qualifications desirable but not essential, NVQ level 3 or 17th edition ideal FIA modules 1 to 6 qualified ideal but not essential Positive, self-motivated proactive individual. The ability to operate effectively under pressure to rapidly changing circumstances. Flexible – able to successfully accept and implement change. Strong communication skills, with the ability to encourage, negotiate and persuade others to achieve objectives. Well organised and disciplined. Team player. Reliable, trustworthy, open and honest. Minimum 5 to 8 years’ experience Ideally living in London or around the M25 Full driving license CSCS/ECS card Desirable experience: Plan C-Cure Gallagher Avigilon Milestone Indigo vision Texecom Galaxy BPT Commend Notifier Kentech PASMA IPAF SSSTS Benefits: Highly competitive salary dependent upon experience Company vehicle and phone Pension 21 days holiday plus 8 bank holidays Career progression Training opportunities Overtime available About WOT: Established 30 years ago, WOT Fire and Security Group has grown into one of the UK’s leading specialist companies in the Fire & Security industry. We are an independent, British owned company and a member of the Plexus Group. WOT Security Group are NSI Gold accredited installers, NSI Gold Fire/ BAFE accredited installers and members of the Master Locksmiths Association. Our mission: To provide superior quality electronic security services that: existing clients recommend to their associates, Consultants prefer for their clients, Manufacturers promote and Employees are proud of. Our values: · Embrace and Drive Change · Be Adventurous, Creative, and Open-Minded · Pursue Growth and Learning · Build Open and Honest Relationships with Communication · Build a Positive Team and Family Spirit · Be Passionate and Determined · Be Humble ##REMOVED##
  5. 5INACM D_ACM Installation and Programming Instructions.pdf View File Submitter secureiam Submitted 05/12/2016 Category Risco / Gardtec
  6. Hi All, We have a situation where we are using a Dell Inspiron 5759 Laptop as a Monitoring/ Client workstation using a DVTel Horizon 7.0 LNVR. One of three identical laptops has been commisioned on a system with 17 Cameras and is working perfectly - no problems to speak of as yet. The other two are now failing to pull up the CCTV footage in the Control Center application on a separate site with 26 Cameras. We know that the network is good as our personal computers are able to pull up the footage instantly using the same port and IP details. DVTel Tech support have told us that our graphics card is not up to the minimum system requirements to render the footage at speed. If anyone could provide me with some sort of insight as to how our system is fully functioning on one site and not on the second, then please do! Thanks in advance
  7. i'm working on a 92 channel IP cctv system tomorrow. i don't know much about the system other than it has 92 ip cams, cathexis NVRs, and all the cameras on the outside of the building are down (which is what i'll be fixing). i've worked with IP systems before, but nothing on this scale. and i've never heard of cathexis before. i'm not having the best of luck finding installation/engineer manuals for them so if any of you have one you could send me i'd be very grateful! Thanks in advance p.s: how do i get trade status on this forum?
  8. Summary Many specific industries in the UK are currently being targeted for online attacks in order to access the information which they hold. This information is rapidly becoming a new commodity in these changing times. The financial sector saw a 3000% increase in the volume of attacks directed specifically at them in the first quarter of 2012. [1] [2] The electronic security industry is a definite target due to the ‘low risk, high yield’ target nature of ARCs & Installers for potential attackers coupled with the lack of up to date awareness in many parts of the industry. The risk from DDoS type attacks in particular is a well founded one but also comes on the back of other concerns in respect of “information security”. Our industry is at particular risk from this threat for a number of reasons: In the first case we hold (as an industry) vast amounts of sensitive data on our clients. We are ourselves a means by which access can be granted to further information from our clients. As an example consider an attacker armed with a security firms authorisation credentials or a site password then contacting a client of the ARC whilst performing a social engineering attack. Mobile telephone numbers can lead to location data or voicemail access of end users. The other aspect to consider is that as an industry we face an increased exposure from this type of attack that can be very detrimental to business. “Electronic security” is not the same thing as information security but to end users and clients this distinction is not so clear. We operate in an environment of trust and robust security protocols. Clients would potentially steer clear of the victim of a data breach as they would be seen as ‘untrustworthy’; this can have a massive impact within the industry. [3] A small investment in time and resources now could save businesses a great deal of cost and time at a later date. Following some basic principles [4] of system management will help. In the long term a complete managed structure is the only effective solution to mitigate the increasing risk and exposure. To manage system updates, audit all of the many server and client machines, keep up to date with trends and exploits and to effectively harden the many networks, software platforms and systems is a lengthy and laborious task which businesses small and large may struggle to keep up with. [5] [6] Threats & Exposure To understand the risks and better manage them we ought to first understand who would be aiming to access data. I believe we can categorise the majority of potential attacks as coming from one of five primary sources presenting the highest risk factors for our industry: Hacktivists Whilst traditionally few ARCs or Installers are seen to have any specific political or corporate ties (which reduces exposure to this threat) the servers and bandwidth available to ARCs can be seen as a potentially lucrative target to use for attack redirection or to include within a zombie network for attacking other targets Staff / Industry competitors Whilst a lower risk it needs to be considered and accounted for. Attacks such as competitors taking up similar domain names in the hope of emails being mistakenly delivered to them needs to be monitored for and addressed. Sensitive commercial information is in itself of value to a potential attacker from this sector. Criminals Well, at least with this source it is one we are all very familiar with. It is interesting that information security and electronic security are both very similar when criminals form the source of the attack. Target hardening is effective and will cause criminals to instead opt for an easier alternative target. The reason and target of attack is financially motivated. The best defence here can be to make it labour intensive, time consuming and expensive for anyone to perform a successful attack and it will reduce the impact from this source. It must be remembered though that the criminal enterprises can have *significant* resources available to them and they are becoming wise to utilising cheap mass labour to perform the legwork which can complicate matters. Script Kiddies This is becoming a dwindling form of attack source, however, it cannot be discounted entirely. While this particular source of attack generally uses widespread and basic tools which can be protected against, there is also the opportunity for talented and determined individuals to find previously unknown 0sec (zero seconds / newly discovered) exploits, which would not be so easily detected. State sponsored This is the largest threat to our industry. The sheer numbers involved and the impunity in which attackers operate highlight the fact that the internet is now very much like the old west with very few laws and regulations and several different highly active groups (the UK is no exception). Please take a moment to consider the type of information that could be useful to a potential attacking state. Vast amounts of data is stored which can all be funnelled into pool of information for later analysis. Nation states have many Petabytes / Exabytes of data storage for just this purpose and in many cases employ very effective attack teams. They have staff dedicated to harvesting and categorising target clients (IPV4 means fairly limited numbers which they can go though quite literally one by one). In the case where a target client is not immediately exposed to any current risk their equipment and services can still be categorised. When a new ‘0sec’ exploit is then released / discovered or purchased then these categorised targets can all be revisited quickly and with ease. This is also a form of attack that will not entirely disappear in the future without significant changes, indeed there are claims that this is now the modern battlefield between nations, we need to be careful to ensure that as an industry we do not become the injured innocent bystanders. Attack Vectors For the modern ARC or Installer there are several attack vectors and points of exposure: External webservers / client interfaces Company websites Mail servers Corporate intranets USB / Removable media Precompiled VMs IP Signalling device connectivity Receiver software / firmware You must ask questions of yourselves in relation to each of the above vectors remaining honest with yourself whilst doing so. Are each of your systems adequately protected? Is the authentication procedure appropriate to the risk exposure? How do you know if you have already been infiltrated? What measures can you take to prevent exposure to each of the above? Are your staff members trained to respond to and recognise these risks? Are you opening up more data than is required to perform the task at hand? If so why? Are your contingency arrangements formed with these risks in mind? Does your backup procedure give you scope for recovering to a point prior to an attack occurring which may be discovered at a later date? The reality in our industry is that the technical expertise employed within and by third parties on behalf of ARCs and Electronic Security Installers is often quite specialised. Whilst there are very many incredibly talented individuals working in the industry, it does not follow that they are necessarily aware of all aspects which are required in order to effectively protect company assets. The Solution? There is no "one size fits all" solution that would work for all types of businesses. There are however, some good practises and recommendations that can be made. Where possible implement managed network provision from a suitable supplier. Ensure that you have the support of any ISP utilised in order to help counter DDoS types of attacks. There has been a gradual evolution of some signalling products and back office systems to utilise remote access and various forms of IP technology. Ensure that the systems you are utilising have approached the implementation of this technology with a sound understanding of the risks involved. Other products have been designed from the very start around the core principles of data security and robustness, this should be a primary consideration. With all the points raised above, the key thing is awareness. Understand the capabilities and weaknesses of each product and perform your own risk assessments. You may conclude that it is no longer appropriate to utilise some equipment or demand more robust solutions from the supplier. In either case at least you are prepared and aware. Ensure that you are able to accurately track the flow of data in and out of your business and be able to see the status of all critical equipment and networks instantly at any time (keep your fingers on the pulse). We are all in the habit of assuming the worst case scenario in order to minimise risk. This puts our industry in a good position to be able to overcome such issues as and when they arise as long as we continue to be prepared. Consider your existing networks and infrastructure carefully. What is your exposure to risk? Can action be taken to reduce or ideally, entirely negate the risk? It will become crucial in future for Installers and ARCs to communicate effectively to highlight and manage risks. We have already begun to see the efectiveness of this approach when nationwide issues occur and in future we should all take advantage of these networks to help mitigate and protect from risk.
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.