SlideShare uma empresa Scribd logo
1 de 34
CCTV Requirements Gathering
• The business requirements will form the basis of future projects and will determine the
eventual scope.
• If a ‘need’ is not raised as a requirement, the project will not know that the system must
perform an action- therefore it will not be included within the scope of the project or
included within the end solution.
• The requirements will be base-lined at the end of the Initiate Phase. Any requirements
submitted after this date will not be accepted without a change request and associated
funding (where applicable).
• The identified business stakeholders are responsible for ensuring that all requirements are
raised during the Initiate Requirements gathering process.
The Importance of Requirement Gathering
• Review each area of CCTV functionality.
• Prepare a set of draft CCTV BUSINESS requirements for each of the functional areas.
• Agree a priority for each draft requirement.
• Agree next steps, actions and areas for further investigation.
Workshop Objectives
Defining the Problem
• What types of threats are experienced?
• What is the level of threat experienced?
• Where are the threats experienced?
• What are the current security issues?
• What other tactics are used other than CCTV to tackle the threat?
• How often do threats occur?
• What is the impact of the threats?
• What is the impact of not tackling the threat?
• How is success measured by the security teams?
Defining the Nature of the Threat- Discussion
Recognise
•Figure occupies at least 50% of the screen
height.
•Observers should be able to say with
certainty whether or not an individual
shown is the same as someone they have
seen before.
Identify
•Figure occupies at least 100% of the
screen height.
•Picture quality and detail should be
sufficient to enable the identity of an
individual to be established beyond
reasonable doubt.
Observe
•Figure occupies at least 25-30% of the
screen height.
•The characteristic details of the individual
can be seen whilst the view remains wide
enough to allow some activity surrounding
the incident to be monitored.
• Which of the categories best reflects the type of activity being observed?
Observation Categories
Monitor & Control
•Figure occupies at least 5% of the screen
height.
•The observer should be able to monitor
the number, direction and speed of people
movement across wide area.
Detect
•Figure occupies at least 10% of the
available screen height.
•The observer should be able to search the
display screens and ascertain with a high
degree of certainty whether or not a
person is present.
• Which of the categories best reflects the type of activity being observed?
Observation Categories
Operational Practice
• Who will be responsible for monitoring the CCTV?
• Who needs access to view the CCTV?
• When will the footage be monitored live?
• How long should footage be accessible?
• What happens when an event occurs? When is a response required and what should the
response be?
Operational Practice- Discussion
Cameras
• What locations should be monitored?
• For each location- what is the threat being monitored?
• For each location- what is the purpose of the observation?
• For each location- how fast will the subject be moving (frame rates)
Locations for Monitoring- Discussion
• What types of camera should be used?- e.g.
bullet, PTZ, dome, indoor, outdoor, vandal resistant etc
• Are infra-red cameras required? If so, what locations?
• What image resolution is required? Pixels & TVL?
• What Lens/ Aperture Types should be used?
• What Shutter Types and Speeds should be used?
• What types of sensors should be used?
• What field of view is acceptable?
Types of Camera- Discussion
• Should cameras be Digital or Analogue?
• Should IP cameras be used?
• What frame rates should be achieved?
Types of Camera- Discussion Cont…
• What standards should be in place for camera locations?
• Considering:
• Field of View
• Variations in light
• Foliage
• Blockages
• Maintenance- i.e. cleaning
• Power
• Fixings
• Concealment
• Security
• Height
Camera Placement- Discussion
• What is the minimum light level required? Day and night?
• What is the advised scene contrast levels?
Lighting- Discussion
• How should footage be transmitted? What video signal type?
• What level of link security is required?
• Should the system be wired or wireless?
Transmission- Discussion
Event Alerting
• Should the system provide automatic alerting functionality?
• If so, What activity should trigger an alert?
• If so, What form should the alert take?- audible/ visual alert, text
message, emergency relay, record event, display event, register in audit log etc
Alerting- Discussion
Recording, Exporting & Archiving
• How long should the footage be retained before being overwritten?
• Should certain pieces of footage be protected from being overwritten?
• What image quality is required for recorded image?
• What frame rate is required for recorded image?
• What additional information should be recorded with the footage (meta data)?
Recording- Discussion
• Should it be possible to export the footage?
• Who should be able to export the footage?
• How should data be exported? What security should be available? What reporting?
• Who should be able to access to export?
• How should the exported footage be replayed?
• What size clips should be exportable?
Exporting & Archiving- Discussion
• What types of compression methods should be used?
• Is interframe compression acceptable?
• What level of data compression is acceptable? What is the minimum image quality?
• What compression CODEC should be used?
Compression- Discussion
• What storage capacity is required?
Storage- Discussion
Legal/ Regulatory Requirements
• What licensing regulations apply to the CCTV system?
• What legal requirements exist?- Data Protection Act, Freedom of Information Act etc
Legal/ Regulatory- Discussion
Security Control Room
• Where should the control room be located?
• What size and shape of room is acceptable?
• What lighting and ventilation requirements exist?
• What security should be in place in the control room?
• Proximity of the control room to the locations being monitored?
Security Control Room- Discussion
• How will the images be viewed?
• How many screens are required? What is the maximum number of screens to be
monitored by one operator?
• How many cameras per display screen?
• What type of screen display should be used? (CRT, LCD, Plasma etc)
• What size screens should be used?
• What heat generation is acceptable?
Display- Discussion
• How should the screens be positioned?
• How many cameras should be shown at one time?
• Should multi screen, multi view be available?
• How many screens are required?
Erognomics- Discussion
• What maintenance is required?
• What support should be provided?
• What maintenance requirements exist?
• What support requirements exist?
Maintenance- Discussion
• Should footage/ data be shared with third parties?
• What reference databases should the system be linked to?
• Should the information exchange be multi directional?
Links to Reference Databases
Video Surveillance Management Systems
• Where should operatives be able to access footage?- in the CR? Remotely? On the Go?
• What should operatives be able to do remotely?
• What reporting should be available?
• What analytics should be captured?
• What information should be stored on individuals/ suspects?
• What trends should be monitored?
VMS- Discussion
Any Questions?

Mais conteúdo relacionado

Mais procurados

An introduction to the OVHcloud Partner Program
 An introduction to the OVHcloud Partner Program An introduction to the OVHcloud Partner Program
An introduction to the OVHcloud Partner ProgramOVHcloud
 
Post merger integration
Post merger integrationPost merger integration
Post merger integrationPhilip Corsano
 
Promo_Epc project rule of credit and progress measurement
Promo_Epc project rule of credit and progress measurement Promo_Epc project rule of credit and progress measurement
Promo_Epc project rule of credit and progress measurement ignitetribes
 
Building Construction
Building ConstructionBuilding Construction
Building ConstructionWilden How
 
Guiding Agile Solution Delivery with the ArchiMate Language
Guiding Agile Solution Delivery with the ArchiMate LanguageGuiding Agile Solution Delivery with the ArchiMate Language
Guiding Agile Solution Delivery with the ArchiMate LanguageIver Band
 
RA TechED 2019 - CL01 - Integrated Architecture System Hardware - what's new
RA TechED 2019 -  CL01 - Integrated Architecture System Hardware - what's newRA TechED 2019 -  CL01 - Integrated Architecture System Hardware - what's new
RA TechED 2019 - CL01 - Integrated Architecture System Hardware - what's newRockwell Automation
 
Aligning The Business Model to Technology Landscapes Enterprise Systems Arch...
Aligning The Business Model to  Technology Landscapes Enterprise Systems Arch...Aligning The Business Model to  Technology Landscapes Enterprise Systems Arch...
Aligning The Business Model to Technology Landscapes Enterprise Systems Arch...Daljit Banger
 
Some Maintenance Issues in Civil Engineering Works
Some Maintenance Issues in Civil Engineering WorksSome Maintenance Issues in Civil Engineering Works
Some Maintenance Issues in Civil Engineering WorksDr K M SONI
 
Enterprise Architecture
Enterprise ArchitectureEnterprise Architecture
Enterprise ArchitectureVikas Grover
 
Enterprise Architecture Management (EAM) I Best Practices I NuggetHub
Enterprise Architecture Management (EAM) I Best Practices I NuggetHubEnterprise Architecture Management (EAM) I Best Practices I NuggetHub
Enterprise Architecture Management (EAM) I Best Practices I NuggetHubRichardNowack
 
Best Practices: Project Documentation and Construction Management
Best Practices: Project Documentation and Construction ManagementBest Practices: Project Documentation and Construction Management
Best Practices: Project Documentation and Construction ManagementSmith Cashion & Orr PLC
 
Introduction to contract management
Introduction to contract managementIntroduction to contract management
Introduction to contract managementBerkman Solutions
 
Enterprise Architecture for Dummies
Enterprise Architecture for DummiesEnterprise Architecture for Dummies
Enterprise Architecture for DummiesSebastien Juras
 
IT Portfolio Management using Enterprise Architecture and ITIL Service Strategy
IT Portfolio Management using Enterprise Architecture and ITIL Service StrategyIT Portfolio Management using Enterprise Architecture and ITIL Service Strategy
IT Portfolio Management using Enterprise Architecture and ITIL Service StrategyBoonNam Goh
 
How to manage technology obsolescence with LeanIX Enterprise Architecture Man...
How to manage technology obsolescence with LeanIX Enterprise Architecture Man...How to manage technology obsolescence with LeanIX Enterprise Architecture Man...
How to manage technology obsolescence with LeanIX Enterprise Architecture Man...LeanIX GmbH
 
Practical Enterprise Architecture in Medium-size Corporation using TOGAF
Practical Enterprise Architecture in Medium-size Corporation using TOGAFPractical Enterprise Architecture in Medium-size Corporation using TOGAF
Practical Enterprise Architecture in Medium-size Corporation using TOGAFMichael Sukachev
 
Applying Disciplined Agile: Become a Learning Organization
Applying Disciplined Agile: Become a Learning OrganizationApplying Disciplined Agile: Become a Learning Organization
Applying Disciplined Agile: Become a Learning OrganizationScott W. Ambler
 
We Need To Talk About IT Architecture
We Need To Talk About IT ArchitectureWe Need To Talk About IT Architecture
We Need To Talk About IT ArchitectureAlan McSweeney
 

Mais procurados (20)

An introduction to the OVHcloud Partner Program
 An introduction to the OVHcloud Partner Program An introduction to the OVHcloud Partner Program
An introduction to the OVHcloud Partner Program
 
Post merger integration
Post merger integrationPost merger integration
Post merger integration
 
Promo_Epc project rule of credit and progress measurement
Promo_Epc project rule of credit and progress measurement Promo_Epc project rule of credit and progress measurement
Promo_Epc project rule of credit and progress measurement
 
Building Construction
Building ConstructionBuilding Construction
Building Construction
 
Guiding Agile Solution Delivery with the ArchiMate Language
Guiding Agile Solution Delivery with the ArchiMate LanguageGuiding Agile Solution Delivery with the ArchiMate Language
Guiding Agile Solution Delivery with the ArchiMate Language
 
RA TechED 2019 - CL01 - Integrated Architecture System Hardware - what's new
RA TechED 2019 -  CL01 - Integrated Architecture System Hardware - what's newRA TechED 2019 -  CL01 - Integrated Architecture System Hardware - what's new
RA TechED 2019 - CL01 - Integrated Architecture System Hardware - what's new
 
Aligning The Business Model to Technology Landscapes Enterprise Systems Arch...
Aligning The Business Model to  Technology Landscapes Enterprise Systems Arch...Aligning The Business Model to  Technology Landscapes Enterprise Systems Arch...
Aligning The Business Model to Technology Landscapes Enterprise Systems Arch...
 
Some Maintenance Issues in Civil Engineering Works
Some Maintenance Issues in Civil Engineering WorksSome Maintenance Issues in Civil Engineering Works
Some Maintenance Issues in Civil Engineering Works
 
Enterprise Architecture
Enterprise ArchitectureEnterprise Architecture
Enterprise Architecture
 
Enterprise Architecture Management (EAM) I Best Practices I NuggetHub
Enterprise Architecture Management (EAM) I Best Practices I NuggetHubEnterprise Architecture Management (EAM) I Best Practices I NuggetHub
Enterprise Architecture Management (EAM) I Best Practices I NuggetHub
 
Best Practices: Project Documentation and Construction Management
Best Practices: Project Documentation and Construction ManagementBest Practices: Project Documentation and Construction Management
Best Practices: Project Documentation and Construction Management
 
Introduction to contract management
Introduction to contract managementIntroduction to contract management
Introduction to contract management
 
Enterprise Architecture for Dummies
Enterprise Architecture for DummiesEnterprise Architecture for Dummies
Enterprise Architecture for Dummies
 
IT Portfolio Management using Enterprise Architecture and ITIL Service Strategy
IT Portfolio Management using Enterprise Architecture and ITIL Service StrategyIT Portfolio Management using Enterprise Architecture and ITIL Service Strategy
IT Portfolio Management using Enterprise Architecture and ITIL Service Strategy
 
How to manage technology obsolescence with LeanIX Enterprise Architecture Man...
How to manage technology obsolescence with LeanIX Enterprise Architecture Man...How to manage technology obsolescence with LeanIX Enterprise Architecture Man...
How to manage technology obsolescence with LeanIX Enterprise Architecture Man...
 
Practical Enterprise Architecture in Medium-size Corporation using TOGAF
Practical Enterprise Architecture in Medium-size Corporation using TOGAFPractical Enterprise Architecture in Medium-size Corporation using TOGAF
Practical Enterprise Architecture in Medium-size Corporation using TOGAF
 
Applying Disciplined Agile: Become a Learning Organization
Applying Disciplined Agile: Become a Learning OrganizationApplying Disciplined Agile: Become a Learning Organization
Applying Disciplined Agile: Become a Learning Organization
 
AAC Block work ppt.pdf
AAC Block work ppt.pdfAAC Block work ppt.pdf
AAC Block work ppt.pdf
 
We Need To Talk About IT Architecture
We Need To Talk About IT ArchitectureWe Need To Talk About IT Architecture
We Need To Talk About IT Architecture
 
Supplier Charge back and Reducing CoPQ
Supplier Charge back and Reducing CoPQSupplier Charge back and Reducing CoPQ
Supplier Charge back and Reducing CoPQ
 

Destaque

CCTV Systems from CCTVfirst
CCTV Systems from CCTVfirstCCTV Systems from CCTVfirst
CCTV Systems from CCTVfirstAneetahari
 
Proposal to supply, installation and testing of CCTV Camera
Proposal to supply, installation and testing of CCTV Camera Proposal to supply, installation and testing of CCTV Camera
Proposal to supply, installation and testing of CCTV Camera Denis kisina
 
Cctv,fds,ids,acs
Cctv,fds,ids,acsCctv,fds,ids,acs
Cctv,fds,ids,acsrajparkash
 
Gsm robot with cctv camera
Gsm robot with cctv cameraGsm robot with cctv camera
Gsm robot with cctv cameraashutoshsahu2908
 
Matrix Video Surveillance Solution: SATATYA - The Persistent Vision
 Matrix Video Surveillance Solution: SATATYA - The Persistent Vision Matrix Video Surveillance Solution: SATATYA - The Persistent Vision
Matrix Video Surveillance Solution: SATATYA - The Persistent VisionMatrix Comsec
 
Surveillance Systems: Their Role in Identifying Risk and Resilience Factors
Surveillance Systems: Their Role in Identifying Risk and Resilience FactorsSurveillance Systems: Their Role in Identifying Risk and Resilience Factors
Surveillance Systems: Their Role in Identifying Risk and Resilience Factorsippnw
 
Surveillance and E-Government: Real and Potential Threats to Privacy in Europ...
Surveillance and E-Government: Real and Potential Threats to Privacy in Europ...Surveillance and E-Government: Real and Potential Threats to Privacy in Europ...
Surveillance and E-Government: Real and Potential Threats to Privacy in Europ...Fatemeh Ahmadi
 
Security Access Control Requirements Gathering Pack
Security Access Control Requirements Gathering PackSecurity Access Control Requirements Gathering Pack
Security Access Control Requirements Gathering PackAmy Slater
 
Itech cdc malaria surveillance project sow 10.10.11
Itech cdc malaria surveillance project sow 10.10.11Itech cdc malaria surveillance project sow 10.10.11
Itech cdc malaria surveillance project sow 10.10.11Nancy Coq
 
Stingray Partners-Draft Infrastructure One Presentation-April 2015 - A4
Stingray Partners-Draft Infrastructure One Presentation-April 2015 - A4Stingray Partners-Draft Infrastructure One Presentation-April 2015 - A4
Stingray Partners-Draft Infrastructure One Presentation-April 2015 - A4David Dunlap
 
Integrated Physical Security
Integrated Physical SecurityIntegrated Physical Security
Integrated Physical SecurityJohn N. Motlagh
 
What components make up a cctv system
What components make up a cctv systemWhat components make up a cctv system
What components make up a cctv systemAaronTAYLOR05
 
Muxlab Product Training
Muxlab Product TrainingMuxlab Product Training
Muxlab Product Trainingbvermeir
 
Thesis
ThesisThesis
Thesiscas123
 
Proposal for cctv cameras
Proposal for cctv camerasProposal for cctv cameras
Proposal for cctv camerasMritunjay Kumar
 
Top 10 surveillance interview questions with answers
Top 10 surveillance interview questions with answersTop 10 surveillance interview questions with answers
Top 10 surveillance interview questions with answerscookreece55
 
CCTV-Powerpoint-Presentation
CCTV-Powerpoint-PresentationCCTV-Powerpoint-Presentation
CCTV-Powerpoint-Presentationguestaec424
 

Destaque (20)

CCTV Systems from CCTVfirst
CCTV Systems from CCTVfirstCCTV Systems from CCTVfirst
CCTV Systems from CCTVfirst
 
Proposal to supply, installation and testing of CCTV Camera
Proposal to supply, installation and testing of CCTV Camera Proposal to supply, installation and testing of CCTV Camera
Proposal to supply, installation and testing of CCTV Camera
 
Cctv,fds,ids,acs
Cctv,fds,ids,acsCctv,fds,ids,acs
Cctv,fds,ids,acs
 
Gsm robot with cctv camera
Gsm robot with cctv cameraGsm robot with cctv camera
Gsm robot with cctv camera
 
Matrix Video Surveillance Solution: SATATYA - The Persistent Vision
 Matrix Video Surveillance Solution: SATATYA - The Persistent Vision Matrix Video Surveillance Solution: SATATYA - The Persistent Vision
Matrix Video Surveillance Solution: SATATYA - The Persistent Vision
 
Surveillance Systems: Their Role in Identifying Risk and Resilience Factors
Surveillance Systems: Their Role in Identifying Risk and Resilience FactorsSurveillance Systems: Their Role in Identifying Risk and Resilience Factors
Surveillance Systems: Their Role in Identifying Risk and Resilience Factors
 
Surveillance and E-Government: Real and Potential Threats to Privacy in Europ...
Surveillance and E-Government: Real and Potential Threats to Privacy in Europ...Surveillance and E-Government: Real and Potential Threats to Privacy in Europ...
Surveillance and E-Government: Real and Potential Threats to Privacy in Europ...
 
CRISP WP3 stakeholder workshop
CRISP WP3 stakeholder workshopCRISP WP3 stakeholder workshop
CRISP WP3 stakeholder workshop
 
Security Access Control Requirements Gathering Pack
Security Access Control Requirements Gathering PackSecurity Access Control Requirements Gathering Pack
Security Access Control Requirements Gathering Pack
 
Satori WP1 slides
Satori WP1 slidesSatori WP1 slides
Satori WP1 slides
 
Itech cdc malaria surveillance project sow 10.10.11
Itech cdc malaria surveillance project sow 10.10.11Itech cdc malaria surveillance project sow 10.10.11
Itech cdc malaria surveillance project sow 10.10.11
 
Stingray Partners-Draft Infrastructure One Presentation-April 2015 - A4
Stingray Partners-Draft Infrastructure One Presentation-April 2015 - A4Stingray Partners-Draft Infrastructure One Presentation-April 2015 - A4
Stingray Partners-Draft Infrastructure One Presentation-April 2015 - A4
 
Integrated Physical Security
Integrated Physical SecurityIntegrated Physical Security
Integrated Physical Security
 
What components make up a cctv system
What components make up a cctv systemWhat components make up a cctv system
What components make up a cctv system
 
Muxlab Product Training
Muxlab Product TrainingMuxlab Product Training
Muxlab Product Training
 
Thesis
ThesisThesis
Thesis
 
Safe City 1.0
Safe City 1.0Safe City 1.0
Safe City 1.0
 
Proposal for cctv cameras
Proposal for cctv camerasProposal for cctv cameras
Proposal for cctv cameras
 
Top 10 surveillance interview questions with answers
Top 10 surveillance interview questions with answersTop 10 surveillance interview questions with answers
Top 10 surveillance interview questions with answers
 
CCTV-Powerpoint-Presentation
CCTV-Powerpoint-PresentationCCTV-Powerpoint-Presentation
CCTV-Powerpoint-Presentation
 

Semelhante a Security CCTV System Requirements Gathering Pack

Step Into Security Webinar - Improving Physical Security on Your Campus
Step Into Security Webinar - Improving Physical Security on Your Campus Step Into Security Webinar - Improving Physical Security on Your Campus
Step Into Security Webinar - Improving Physical Security on Your Campus Keith Harris
 
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"WrikeTechClub
 
Security Outsourcing - Couples Counseling - Atif Ghauri
Security Outsourcing - Couples Counseling - Atif GhauriSecurity Outsourcing - Couples Counseling - Atif Ghauri
Security Outsourcing - Couples Counseling - Atif GhauriAtif Ghauri
 
CISM_WK_3.pptx
CISM_WK_3.pptxCISM_WK_3.pptx
CISM_WK_3.pptxdotco
 
Skill Set Needed to work successfully in a SOC
Skill Set Needed to work successfully in a SOCSkill Set Needed to work successfully in a SOC
Skill Set Needed to work successfully in a SOCFuad Khan
 
Safety and security in mission critical IoT systems
Safety and security in mission critical IoT systemsSafety and security in mission critical IoT systems
Safety and security in mission critical IoT systemsEinar Landre
 
FS Presentation CCTV solution rev1.pptx
FS Presentation CCTV solution rev1.pptxFS Presentation CCTV solution rev1.pptx
FS Presentation CCTV solution rev1.pptxPawachMetharattanara
 
FS Presentation CCTV solution rev1 (1).pptx
FS Presentation CCTV solution rev1 (1).pptxFS Presentation CCTV solution rev1 (1).pptx
FS Presentation CCTV solution rev1 (1).pptxPawachMetharattanara
 
FS Presentation CCTV solution rev1 (2).pptx
FS Presentation CCTV solution rev1 (2).pptxFS Presentation CCTV solution rev1 (2).pptx
FS Presentation CCTV solution rev1 (2).pptxPawachMetharattanara
 
Using IP Cameras and Advanced Analytics to help Protect Critical Infrastructure
Using IP Cameras and Advanced Analytics to help Protect Critical InfrastructureUsing IP Cameras and Advanced Analytics to help Protect Critical Infrastructure
Using IP Cameras and Advanced Analytics to help Protect Critical InfrastructureEnergySec
 
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJPaheerathan Sabaratnam
 
DCD Converged Brazil 2016
DCD Converged Brazil 2016 DCD Converged Brazil 2016
DCD Converged Brazil 2016 Scott Carlson
 
FDA - ELECTRONIC SECURITY- AFWEST INT. SECURITY - EMMANUEL ANIM-
FDA - ELECTRONIC SECURITY- AFWEST INT. SECURITY - EMMANUEL ANIM-FDA - ELECTRONIC SECURITY- AFWEST INT. SECURITY - EMMANUEL ANIM-
FDA - ELECTRONIC SECURITY- AFWEST INT. SECURITY - EMMANUEL ANIM-Emmanuel Anim
 
Remote usability testing and remote user research for usability
Remote usability testing and remote user research for usabilityRemote usability testing and remote user research for usability
Remote usability testing and remote user research for usabilityUser Vision
 
Its Not You Its Me MSSP Couples Counseling
Its Not You Its Me   MSSP Couples CounselingIts Not You Its Me   MSSP Couples Counseling
Its Not You Its Me MSSP Couples CounselingAtif Ghauri
 
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJPaheerathan Sabaratnam
 
How to Leverage Log Data for Effective Threat Detection
How to Leverage Log Data for Effective Threat DetectionHow to Leverage Log Data for Effective Threat Detection
How to Leverage Log Data for Effective Threat DetectionAlienVault
 

Semelhante a Security CCTV System Requirements Gathering Pack (20)

Step Into Security Webinar - Improving Physical Security on Your Campus
Step Into Security Webinar - Improving Physical Security on Your Campus Step Into Security Webinar - Improving Physical Security on Your Campus
Step Into Security Webinar - Improving Physical Security on Your Campus
 
Viseum security-site-survey
Viseum security-site-surveyViseum security-site-survey
Viseum security-site-survey
 
Tech diligence
Tech diligenceTech diligence
Tech diligence
 
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
 
Security Outsourcing - Couples Counseling - Atif Ghauri
Security Outsourcing - Couples Counseling - Atif GhauriSecurity Outsourcing - Couples Counseling - Atif Ghauri
Security Outsourcing - Couples Counseling - Atif Ghauri
 
CISM_WK_3.pptx
CISM_WK_3.pptxCISM_WK_3.pptx
CISM_WK_3.pptx
 
Skill Set Needed to work successfully in a SOC
Skill Set Needed to work successfully in a SOCSkill Set Needed to work successfully in a SOC
Skill Set Needed to work successfully in a SOC
 
Safety and security in mission critical IoT systems
Safety and security in mission critical IoT systemsSafety and security in mission critical IoT systems
Safety and security in mission critical IoT systems
 
FS Presentation CCTV solution rev1.pptx
FS Presentation CCTV solution rev1.pptxFS Presentation CCTV solution rev1.pptx
FS Presentation CCTV solution rev1.pptx
 
FS Presentation CCTV solution rev1 (1).pptx
FS Presentation CCTV solution rev1 (1).pptxFS Presentation CCTV solution rev1 (1).pptx
FS Presentation CCTV solution rev1 (1).pptx
 
FS Presentation CCTV solution rev1 (2).pptx
FS Presentation CCTV solution rev1 (2).pptxFS Presentation CCTV solution rev1 (2).pptx
FS Presentation CCTV solution rev1 (2).pptx
 
Using IP Cameras and Advanced Analytics to help Protect Critical Infrastructure
Using IP Cameras and Advanced Analytics to help Protect Critical InfrastructureUsing IP Cameras and Advanced Analytics to help Protect Critical Infrastructure
Using IP Cameras and Advanced Analytics to help Protect Critical Infrastructure
 
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJ
 
DCD Converged Brazil 2016
DCD Converged Brazil 2016 DCD Converged Brazil 2016
DCD Converged Brazil 2016
 
Software Security and IDS.pptx
Software Security and IDS.pptxSoftware Security and IDS.pptx
Software Security and IDS.pptx
 
FDA - ELECTRONIC SECURITY- AFWEST INT. SECURITY - EMMANUEL ANIM-
FDA - ELECTRONIC SECURITY- AFWEST INT. SECURITY - EMMANUEL ANIM-FDA - ELECTRONIC SECURITY- AFWEST INT. SECURITY - EMMANUEL ANIM-
FDA - ELECTRONIC SECURITY- AFWEST INT. SECURITY - EMMANUEL ANIM-
 
Remote usability testing and remote user research for usability
Remote usability testing and remote user research for usabilityRemote usability testing and remote user research for usability
Remote usability testing and remote user research for usability
 
Its Not You Its Me MSSP Couples Counseling
Its Not You Its Me   MSSP Couples CounselingIts Not You Its Me   MSSP Couples Counseling
Its Not You Its Me MSSP Couples Counseling
 
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJ
 
How to Leverage Log Data for Effective Threat Detection
How to Leverage Log Data for Effective Threat DetectionHow to Leverage Log Data for Effective Threat Detection
How to Leverage Log Data for Effective Threat Detection
 

Último

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Último (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

Security CCTV System Requirements Gathering Pack

  • 2. • The business requirements will form the basis of future projects and will determine the eventual scope. • If a ‘need’ is not raised as a requirement, the project will not know that the system must perform an action- therefore it will not be included within the scope of the project or included within the end solution. • The requirements will be base-lined at the end of the Initiate Phase. Any requirements submitted after this date will not be accepted without a change request and associated funding (where applicable). • The identified business stakeholders are responsible for ensuring that all requirements are raised during the Initiate Requirements gathering process. The Importance of Requirement Gathering
  • 3. • Review each area of CCTV functionality. • Prepare a set of draft CCTV BUSINESS requirements for each of the functional areas. • Agree a priority for each draft requirement. • Agree next steps, actions and areas for further investigation. Workshop Objectives
  • 5. • What types of threats are experienced? • What is the level of threat experienced? • Where are the threats experienced? • What are the current security issues? • What other tactics are used other than CCTV to tackle the threat? • How often do threats occur? • What is the impact of the threats? • What is the impact of not tackling the threat? • How is success measured by the security teams? Defining the Nature of the Threat- Discussion
  • 6. Recognise •Figure occupies at least 50% of the screen height. •Observers should be able to say with certainty whether or not an individual shown is the same as someone they have seen before. Identify •Figure occupies at least 100% of the screen height. •Picture quality and detail should be sufficient to enable the identity of an individual to be established beyond reasonable doubt. Observe •Figure occupies at least 25-30% of the screen height. •The characteristic details of the individual can be seen whilst the view remains wide enough to allow some activity surrounding the incident to be monitored. • Which of the categories best reflects the type of activity being observed? Observation Categories Monitor & Control •Figure occupies at least 5% of the screen height. •The observer should be able to monitor the number, direction and speed of people movement across wide area. Detect •Figure occupies at least 10% of the available screen height. •The observer should be able to search the display screens and ascertain with a high degree of certainty whether or not a person is present.
  • 7. • Which of the categories best reflects the type of activity being observed? Observation Categories
  • 9. • Who will be responsible for monitoring the CCTV? • Who needs access to view the CCTV? • When will the footage be monitored live? • How long should footage be accessible? • What happens when an event occurs? When is a response required and what should the response be? Operational Practice- Discussion
  • 11. • What locations should be monitored? • For each location- what is the threat being monitored? • For each location- what is the purpose of the observation? • For each location- how fast will the subject be moving (frame rates) Locations for Monitoring- Discussion
  • 12. • What types of camera should be used?- e.g. bullet, PTZ, dome, indoor, outdoor, vandal resistant etc • Are infra-red cameras required? If so, what locations? • What image resolution is required? Pixels & TVL? • What Lens/ Aperture Types should be used? • What Shutter Types and Speeds should be used? • What types of sensors should be used? • What field of view is acceptable? Types of Camera- Discussion
  • 13. • Should cameras be Digital or Analogue? • Should IP cameras be used? • What frame rates should be achieved? Types of Camera- Discussion Cont…
  • 14. • What standards should be in place for camera locations? • Considering: • Field of View • Variations in light • Foliage • Blockages • Maintenance- i.e. cleaning • Power • Fixings • Concealment • Security • Height Camera Placement- Discussion
  • 15. • What is the minimum light level required? Day and night? • What is the advised scene contrast levels? Lighting- Discussion
  • 16. • How should footage be transmitted? What video signal type? • What level of link security is required? • Should the system be wired or wireless? Transmission- Discussion
  • 18. • Should the system provide automatic alerting functionality? • If so, What activity should trigger an alert? • If so, What form should the alert take?- audible/ visual alert, text message, emergency relay, record event, display event, register in audit log etc Alerting- Discussion
  • 20. • How long should the footage be retained before being overwritten? • Should certain pieces of footage be protected from being overwritten? • What image quality is required for recorded image? • What frame rate is required for recorded image? • What additional information should be recorded with the footage (meta data)? Recording- Discussion
  • 21. • Should it be possible to export the footage? • Who should be able to export the footage? • How should data be exported? What security should be available? What reporting? • Who should be able to access to export? • How should the exported footage be replayed? • What size clips should be exportable? Exporting & Archiving- Discussion
  • 22. • What types of compression methods should be used? • Is interframe compression acceptable? • What level of data compression is acceptable? What is the minimum image quality? • What compression CODEC should be used? Compression- Discussion
  • 23. • What storage capacity is required? Storage- Discussion
  • 25. • What licensing regulations apply to the CCTV system? • What legal requirements exist?- Data Protection Act, Freedom of Information Act etc Legal/ Regulatory- Discussion
  • 27. • Where should the control room be located? • What size and shape of room is acceptable? • What lighting and ventilation requirements exist? • What security should be in place in the control room? • Proximity of the control room to the locations being monitored? Security Control Room- Discussion
  • 28. • How will the images be viewed? • How many screens are required? What is the maximum number of screens to be monitored by one operator? • How many cameras per display screen? • What type of screen display should be used? (CRT, LCD, Plasma etc) • What size screens should be used? • What heat generation is acceptable? Display- Discussion
  • 29. • How should the screens be positioned? • How many cameras should be shown at one time? • Should multi screen, multi view be available? • How many screens are required? Erognomics- Discussion
  • 30. • What maintenance is required? • What support should be provided? • What maintenance requirements exist? • What support requirements exist? Maintenance- Discussion
  • 31. • Should footage/ data be shared with third parties? • What reference databases should the system be linked to? • Should the information exchange be multi directional? Links to Reference Databases
  • 33. • Where should operatives be able to access footage?- in the CR? Remotely? On the Go? • What should operatives be able to do remotely? • What reporting should be available? • What analytics should be captured? • What information should be stored on individuals/ suspects? • What trends should be monitored? VMS- Discussion