Tag Archives: Security Systems

Web Based Remote Device Monitoring – An Overview

To check status of automation systems over web pages are convenient. This is necessary often in this always changing, always evolving and fast paced world. You have application existing which involves lots of things like Input-Output modules and PLCs. You could bring systems to local PC Based SCADA Control and Monitoring System. You could configure systems of SCADA for pulling data from data acquisition and controller modules. You could configure those controls which monitors lots of things like valves, temperature and conveyor status. You could use Web Server such as Web Publishing for KingView for making SCADA systems having web accessibility. In software of SCADA, drivers provide enabling communications with various Data Acquisition modules, PLCs and devices. Web Server installation allows serving systems of SCADA out such that web clients in remote machines have accessibility to data over web pages.

In case you have simplified projects which consist of Modbus RTU base device, you bring this to Internet for data collections with Modbus RTU to Modbus TCP gateways such as tGW-718 that has 1 RS-232/422/485 port. Then you create custom web servers on computers for showing data in fashion organised.  You could use preferred programming languages of web like PHP, JAVA, and ASP.net or C #. You could create accessibility to user logins to pages from whatever locations thereby limiting accessibility to personnel related. In case you have complexed projects you use customizable sophisticated web server controllers such as WP-5141-XW107. You could create programs running in controllers with any .NET languages like C++, C# or VB.NET. You could use also web servers inside for allowing web based SCADA systems for checking remote status or turning device lights off or on. SCADA systems web based offers convenience and flexibility. You could configure systems of SCADA for scheduling alarms being sent when unwanted conditions occurs. This could be when tank leaks, temperature is out of ranges, pump working out, refrigerator door is left opened or occurring of flood. Then you could log to PC and check system’s status over web pages. You click buttons or make changes for best protection of entire system. This results in overall great savings and preventing damages in future. Web based systems of SCADA allows collecting data from all around world. Then have it being displayed in straight forward, clear and organized way.

You could use we based systems of SCADA for controlling and monitoring complex or simple systems. Following factors must be considered before choosing as to which SCADA software is best: There should be monitoring of data of what kind. There should be utilization of what kind of equipment for capturing data. There should be usage of what kind of Human Machine Interface (HMI) for viewing data. From which place there has to be accessibility of data- over internet or on localized machines.  Knowing as to what is cost factor. Knowing as to how much manpower and time is invested in deploying and setting up solution of SCADA. There should be knowing of importance of supports and services. These are totally important aspects of choosing SCADA software. There is no 1 solution which is better clearly than others. To choose solutions of SCADA is that decision which shall affect entire organization. Therefore much heed must be paid to it. Important things being considered is that when question of SCADA arise you do not need always for what payment you have done. It is very amazing that Supervisory Control and Data Acquisition landscapes have changes in recent times. There were times in not too distant past when entrepreneurial bright software developers put SCADA products on markets and found themselves on equal footing basically with same product’s developers.

Security Features of ATM

ATM is device that is electronic that allows customer of bank to conduct withdrawals of cash and check account balance at whatever time be it, with no need of human teller. Numerous ATMs allow deposition of cheques or cash and transfer of money between banks. World’s 1st ATM had been installed in ENFIELD town on 1967, June 27th in London by Barclays bank.

ATM’s Security features are as follows:

Numerous protocols have been used for transfer of information over networks in ATM. Few are as follows:

TCP (Transmission Control Protocol): It is protocol that is connection oriented. TCP has been used for dynamic adaption of internetwork properties and to be of robustness for facing any failures.

SMTP (Simple Mail Transfer Protocol): It is simple protocol of ASCII. It accepts messages incoming and sends them to location that is appropriate.

X.25: It is standard new protocol. It gives provision to flow control.

SNMP (Simple Network Management Protocol): It is used when data and information has been entered by means of keypad.

ATM is open for 24 hours. They are all not guarded. Security technology is as follows:

ESL (Electronic Signage Lock) is technology patented which is implemented in software, hardware, and firmware and used for protecting transfer of funds, accessibility physically and resources digitally. It identifies users of computer terminal remotely with no modification to terminal. It is transparent completely to users and is used surreptitiously with no knowledge and identifying them still uniquely.

ESL is integrated to resource protected like computer or ATM. it identifies remote users of terminal as imposters though they might be knowing all access codes, passwords, and protocols for access of resource protected. Finger-print recognition or face recognition are techniques used for ATM security. Here data related is stored in database.

Present day ATM’s physical security concentrates on denial of usage of money in machine to fraud or thief by usage of techniques of fault detection. Customer requests machine withdrawal that dispenses not at all money but prints receipt merely. Customer takes receipt to sales clerk and exchanges it for cash.

An Introduction to Intrusion Tolerance

Intrusion Detection and Intrusion Prevention are the security work that is classical. Intrusion Tolerance is a new approach that has its emersion in the past decade. Intrusion Tolerance means fault that is operational intentional which leads to failure of component.

Vulnerability to a certain extent of system should be accepted and assumed. Attacking on subsystems can have a successful happening sometimes. This should be accepted and assumed. The whole system should remain operational and secure. This should be assured by tolerance paradigm in security.

Integrity, Authenticity and Confidentiality are the various security properties. Maintaining security properties despite allowing compromise of certain components must be done by intrusion-tolerant system. Intruder should be able to modify or read data. Assumptions that there can be happening of intrusions are possible. It is impossible to state that here are no vulnerabilities in a system.

Security and Reliability: Application of “tolerance” paradigm was first done in Reliability.

Computing that is fault tolerant and reliability: Continuing delivering of the right service even in fault presence is the work of a fault-tolerant system. Input-output relation gives system, service and what is intended by system.

Fault types:

  • Electrical damage is suffered by chip (motor)
  • Wrong button is pushed by operator
  • Software defect
  • Burning out of fans
  • Fault that is transient, physical and design

System and components: Components make system. Each component makes each system.

Defense-in-depth approach:

  • Redundancy: Different components and systems are included such that anyone can do wanted function in case others fail.
  • Diversity: Usage of different components which is based on different principles and designs from various vendors.
  • Independence: This factor is got by physical separation, communication independence and electrical isolation between systems.


  • System’s Availability: Measurement of difference between incorrect and correct delivery service.
  • System’s Safety: Measurement of catastrophic failure time.
  • System’s Security: Prevent unauthorized information handling.
  • Maintainability: Measurement of restoration time.

Failure, Fault and Error:

  • If system does not deliver required service, we name it a failure.
  • Fault is cause of failure.
  • Error causes failure of system.
  • Error processing:
  • Error recovery and detection: Backward recovery, Forward recovery

Need for Home Security Systems

Home is considered as a safest abode of a person to live. In the ancient period the safest places man found to live was caves. The caves provided him shelter from wild animals and unexpected climatic changes. He began to store his food in the caves and later found it provided him every comfort from all odds. The security and comfort he got from the caves made him think about constructing new forms of abode. Gradually he began to build huts with the help of mud and wood from the nature. With the advent of civilization he learned to construct house with bricks and other materials. Soon the concept of own house and communities began to develop. The concept of home also had undergone various changes through the centuries. In the earlier times homes were constructed for safety and for basic security. The facilities were minimal in early centuries for serving the purpose of safety for prevention of intervention from strangers. In the modern era the concept of home form minimal necessities has spread to wider aspects that give prominence for luxuries and added comforts.

A good home form its physical structure itself became an exclusive identity of a person who lives in that house. The appearance of the home became the prime concern of a person. A home form its appearance reflects the status and identity of the inmates in the house. While constructing a house people give importance to several factors that ensures security and safety to the members of the family. Home security is primarily concerned with the prevention of unauthorized or unexpected intervention of strangers to a home. According to the historical evidence during the reign of kings the palaces had several guards who prevented the entry of outsiders or strangers. The affluent families of early period also had home guards that restricted unauthorized entry of strangers. In those times the challenges before the implementation of the proper security was the attacks from strangers and wild animals. In the modern era the concept and home security has total new concept for the new challenges to be sorted out. The most popular or widely accepted home security method practiced form olden time is to lock up the entrance or door of the house. This was sufficient during past days that could be practiced by any of the family members in the family. With the growth of modern lifestyle atrocities against people had also increased to great rate. House breaking, theft and burglary became a common thing particularly in the urban and most densely populated area. The safety measures to be taken against these intruders became a necessity. Several technological measures ensuring the home security had been introduced within a short span of time. The methods adopted by the attackers or intruders are with high technological advance. The preventive or security methods to curb such hi-tech methods need to be competent enough ensuring absolute security.

Several technological devices that ensure home safety had been introduced by various technological institutions. The security engineering field has developed several technological devices to resist the new threats and challenges against home security. House breaking and theft is commonly done when the family moves away to other places for short time. The new home security measures of detection systems are most widely used home security systems. The surveillance system including burglar alarm, closed circuit television cameras, security guard and security lighting are the most popularly used home security systems.

All these security systems commonly have personnel identification system, intrusion detection system recognizing the intruders, mechanical and electrical procedure access control and the design of the system that suits the surroundings where they are fixed or attached to.

In the modern era where no body cares for any human values and only focus on the material possessions these security systems serve better than a human being in ensuring the safety of a family.

2013 Copyright techgo.org, All right reserved || Privacy Policies, Terms and Disclaimer

Website Administered by MISH IT SOLUTIONS