securitylinkindia

Dahua AI Technology Ranked #1 In The Onera Satellite Change Detection (OSCD) Evaluation

Recently, Dahua Technology’s AI-based Remote Sensing Image Analysis Technology has obtained first place in the comprehensive precision ranking of the Onera Satellite Change Detection (OSCD) Evaluation released by Geoscience and Remote Sensing Society (GRSS). This achievement fully demonstrates Dahua Technology’s continuous development and innovation capabilities in the field of remote sensing image change detection. OSCD (Onera Satellite Change Detection) is jointly issued and maintained by the International Institute of Electronics and Electrical Engineers (IEEE), and the Image Analysis and Data Fusion Technical Committee (IADF TC). It is an international authoritative evaluation platform for remote sensing image change detection algorithm. This evaluation involves complex and variable global surface coverage data, which is extremely challenging and attracts scholars and well-known academic institutions across the globe to participate.   In view of the large size of remote sensing images and the imbalance in the types of changing areas, Dahua Technology has proposed a method of image stretching and normalization preprocessing based on multi-channel fusion in data processing, which significantly solves issues including obvious surface differences. In terms of model structure, the innovative use of the Tversky loss function optimizes the problem of category imbalance. At the same time, Dahua Technology innovatively builds multi-modality and greatly improves the precision and recall of its algorithm. The Dahua Remote Sensing Image Analysis Technology has set another evaluation record in the remote sensing image change detection data set, achieving first place in the overall ranking. Remote sensing image change detection Based on the change detection algorithm of remote sensing images, the Remote Sensing Image Change Detection Technology uses remote sensing images of different phases to obtain the dynamic change information of the land cover type in the specified area, and assigns semantic category labels to image pixels that change with time, which is widely used in ecological resources monitoring, urban construction management and other fields. In the field of ecological resources monitoring, the remote sensing image change detection algorithm can eliminate interference factors such as season and weather by comparing the remote sensing images of the same area before and after (two time phases) to obtain the spatio-temporal changes in the ecological geology of a wide area. It can be applied to acquire coverage information including periodic monitoring of water bodies, vegetation, minerals etc., providing a scientific basis for scenarios such as resource development, environmental pollution, and natural disaster assessment. In the field of urban construction management, the Remote Sensing Image Semantic Segmentation Technology can be used to automatically obtain the location, range, type and other information of the area where the nature of the land changes, achieving a city-level intelligent inspection of illegal buildings. At the same time, the Remote Sensing Image Object Detection Technology can be used to effectively extract distribution information of urban infrastructures such as sports venues, dynamically monitor the construction process of infrastructure facilities within the city, and provide effective data support for urban infrastructure auditing. In addition, the combination of high-altitude and ground monitoring data can achieve the integration of ground, air and sky monitoring coverage without dead angle, providing a comprehensive and high-precision spatial visualization for urban construction management.    

Read More

Duratex Deploys Dahua Video Monitoring Solution to Detect Fires at Early Stage

Contrary to a widely shared popular belief, forest fires are not always caused by criminal actions. Depending on the location, fires may arise from natural causes such as frequency of lightning during a storm, or even due to lack of knowledge of local farmers in carrying out routine activities like clearing pasture areas that involves fire. These combustion related activities require thorough planning and correct timing. In line with this, Working On Fire (WOF) has extensive expertise in integrated fire management that combines prevention, readiness, response and recovery in possible environmental fires. It is responsible for the worldwide presence of Firehawk, a pioneer in the development of solutions to detect forest fires through cameras. It boasts 26 years of operation and 223 video surveillance cameras spread throughout South Africa, Brazil, Chile, Ghana and Malawi. For four years, Firehawk has been cooperating with Dahua Technology Brazil, a branch of world-leading video-centric smart IoT solution and service provider. Few years ago, Firehawk installed DH-PTZ19245U-IRB-N (-B) model after series of tests. It provides excellent performance, offers useful web API documentation, and can withstand severe local weather conditions. For this reason, Firehawk has named Dahua Technology Brazil as its main partner for forest fire detection. Challenges Massive wildfires like the recent cases in Australia have increased throughout the years, especially in countries such as USA, Portugal and Russia. According to a study by UN in cooperation with other major environmental agencies worldwide, governments should invest approximately 80% of their resources in the prevention of such disasters, and only 20% in the actual firefighting. In order to monitor and provide warning of possible occurrence of such event, WOF was contracted by Duratex, the largest producer of manufactured wood panels and sanitary wares and metals in the southern hemisphere, to deploy the Dahua video monitoring solution in its Minas Gerais forest areas. It covers about 75 thousand hectares between the municipalities of Uberlândia and Uberaba. This mining region has several preservation areas and is recognized for its sugar cane, eucalyptus and coffee plantations. An effective fire monitoring solution that can cover such a vast area would be very challenging to deploy. Thus, expertise of WOF and Firehawk are very valuable to ensure excellent performance and satisfying results throughout the project. Solution At Duratex, a camera was installed in each of the five stationary 75-meter tall towers, which was carried out by WOF in just 20 days. This solution covers 60 thousand hectares of forest, monitoring the region and providing alerts for possible occurrence of fire. The company’s successful experience in working with Eldorado Celulose S/A was essential in minimizing the challenges of installing and applying this particular technological solution. “We have highly qualified partners for the execution of the project, which greatly simplifies its performance. The experience of working with the Dahua solution – applied by Firehawk worldwide – is very positive,” said Daniel Santos, General Director of WOF in Brazil. “The Dahua video monitoring solution implemented at Duratex offers the reach of 60 thousand hectares of forest for monitoring the region and alerting to possible occurrences, carried out in an assertive and agile manner. Our company’s main mission is to promote the safety of our customers in their businesses and core activities through a wide portfolio of solutions such as thermal, biometric, embedded software etc.,” explained Fábio Lopes, Channel Director of Dahua Technology Brazil. In order to minimize the connectivity issue that is common in remote regions, WOF installed directional radio links to enable the adoption of this technology. In some towers, they also installed electric power generating units with photovoltaic solar panels. Moreover, the five cameras capture and send images to the monitoring center, utilizing AI to verify the lowest sending traffic. “The addition of this system substantially improved the speed of detection of fires and the management of firefighting resources,” said Daniela Rezende, Protection Specialist of Duratex.   The technology embedded in the solution promotes a rapid evaluation of the images, with a 360-degree perimeter coverage, and algorithm for searching smoke signals. It operates both day and night, and in situations of imminent risk, it triggers a visual and audible alarm. In favorable weather conditions, it can also cover a distance that exceeds 20km. Results The Dahua solution greatly helped reduce fire cases in the Minas Gerais forest areas. Faced with good results, the company plans to set up a dozen new cameras by the end of 2020 in the forest units of Duratex and its affiliates. “Duratex is very satisfied with this solution, so much that in 2020 we are already working on expanding its coverage area in Minas Gerais. We also have plans to start a project in our São Paulo unit,” said Rezende.    

Read More

Addictive Technology Solutions Enhances the Drive-through Experience with Milestone Systems

Robert Marsden, Managing Director of Addictive Technology said, “While we have a lot of experience in making and providing for better drive through experiences, there is always room to innovate and grow. We looked at the technologies now available and came up with a system that provides a faster, more frictionless ordering system, based on the latest licence plate recognition (LPR) technology.” Customers expect a fast, seamless drive-through experience, and are often under time pressure, especially if they are ordering food and coffee on their morning commute. Long queues and wait time can detract from the drive-through experience, and have a significant effect on customer satisfaction and loyalty. The success of the drive-through café or restaurant itself depends on getting as many customers serviced as possible in any given hour, especially at peak times. The fast food and beverage market is very competitive during commute times, and an efficient drive through service can be the difference between success or failure. Solution White Label Software built an in-house software solution that sits between a restaurant or cafe’s PoS system and networked video cameras, based on Milestone Systems’ open XProtect video management software (VMS) platform. The software uses LPR technology to identify regular customers as they drive up to place their order, accesses the restaurant’s database of VIP customers in real time to see if they have a favourite coffee or snack, and sends a message to the kitchen to start preparing those items before the customer has arrived at the sales window. The customer’s coffee will be ready before they arrive at the order point, and the system will also allow cross-checking to ensure that the predicted order matches the customer’s actual order. “Our PoS system has an API, and that application sits in the middle of Milestone and our PoS system. A Windows application reads the licence plates then talks to the PoS system. It is an SQL based system with a database stored in the cloud on Amazon Web servers, so it does all this in a few seconds,” said Marsden. The solution is also flexible. Outlets can decide whether they want customers to register in advance and confirm what they want ahead of time, so that the same order is placed every time or they have the option of using the predictive analysis built into White Label’s proprietary PoS software. This analysis proves accurate for 90 percent of orders,with just 10 percent of customers deciding they want something different on a specific day. The PoS software will analyse the customer’s last ten or more orders and pick the one that comes up the most. The cost of any wastage using this system is considerably less than the cost of a slower drive-through experience. The innovation stems from Addictive Technology’s extensive experience working with Drive Thru food outlets. When provisioning a drive-through space, the SI deploys all technologies themselves from PoS through to networking and wireless, LPR software and all associated integrations. Addictive’s Milestone Systems LPR solution provides a minimum of four or five seconds head-start for each predicted order, and as much as two minutes head-start for high volume outlets during busy times. This head-start can be critical to avoiding congestion at busy times, and make the difference between an efficient and streamlined ordering process, and one which backs up and causes customers to be delayed. The solution means that when cars are queued at the order point, the outlet can already be making coffee for the car behind it. In the quick service restaurant industry, outlets survive or perish based on their customer satisfaction, and the number of cars that are able to physically pass through their drive-through on an hourly basis. The Milestone solution Milestone Systems is an open platform, meaning that developers are able – and openly encouraged – to build upon the code. This has enabled Addictive Technology to adapt the existing LPR software to their own needs, and integrate it with their proprietary PoS software solution. Software is seldom used in a stand-alone capacity these days, so the power of an open platform means that integrators such as Addictive Technology are able to harness the power of a major platform, and combine with several other solutions to provide customers with a fully integrated system that fits their specific needs.   “The power of an open platform such as Milestone allows us to tailor solutions directly to our customers’ requirements, and then extend our ongoing services to those customers after the build. Everybody wins – customers get the system that works best for their financial outlay; as a systems integrator we get to provide the sort of solutions and services that we want, rather than being forced to follow someone else’s guidelines, and we get to administer that solution after it is deployed in order to maintain satisfied customers,” explained Marsden. Due to the flexibility of Milestone Systems’ platform, Addictive Technology is also able to keep customer costs down. Rather than rely on specific cameras with extended functionality for LPR use, the solution is able to use relatively cost-effective cameras, so long as the resolution is of high enough quality. Further to this, Addictive Technology is able to deploy the Milestone LPR software on a physical CCTV server along with cameras and storage, rather than provision a dedicated server, which further reduces costs or run it on dedicated Milestone hardware. In other instances the SI has built a virtualised LPR server based on a VMware running Windows 10, in order to re-use existing hardware. “This again demonstrates the flexibility and power of the software-driven solution,” explained Marsden. The bespoke PoS and LPR solutions designed and implemented by Addictive Technology are also made available to other companies wishing to licence them, which opens up another window of opportunity for Addictive Technology. Marsden explained that on the next version of the software, currently being built by White Label, orders will be sent straight to the kitchen video system as well as different locations throughout the…

Read More

Security in the Cloud: How Stratocast Keeps Your Video Safe

Genetec Stratocast™ is a cloud-based video monitoring system that makes the adoption of network video security solutions easy and allows you to connect to your business wherever you go. Using the Microsoft Windows Azure cloud-computing platform, Stratocast eliminates the need for on-site servers. As a result, installation time is reduced and you can begin monitoring your premises quickly. Using video surveillance equipment such as IP (Internet Protocol) cameras or analog cameras, you can record video on your edge recording video unit or in the Stratocast cloud. If recording on your video unit, the video is recorded continuously, whereas if recording in the Stratocast cloud, you can choose to record either continuously or only when motion is detected. From your laptop, tablet, or smartphone, you can then watch live and recorded video that is safely stored in the cloud. In addition, through Genetec Federation™, Security Center users can view and control all Stratocast cameras from their local installation of security desk. The starting diagram illustrates how Stratocast works to keep you connected to your business, wherever you go. Security is crucial for us at every level of development and operations. Based on industry best practices, our engineers embed security standards into the development lifecycle and operations. This white paper focuses on the cloud architecture and the operational security of the platform as well as the security capabilities of the customer portal. The video and camera security of Stratocast are also discussed. Cloud architecture Stratocast is deployed on the Microsoft Azure cloud platform. This platform, with its industry-recognized security, securely stores data that our customers entrust us with. Microsoft Azure has been audited against SOC 1, SOC 2, and SOC 3 standards. Audits are conducted in accordance with SSAE 16 and ISAE 3402 standards. Certifications are regularly updated and can be provided. Stratocast and Azure are also compliant with ISO 27001:2013. The service architecture is built for high availability and scalability, allowing customers to enroll and record as many cameras as needed without impacting the service. There are no constraints limiting the maximum amount of data that can be stored in Azure, as data centers are provisioned with enough capacity to ensure that they meet growing demand. This architecture, coupled with the robustness of the underlying Microsoft Azure Cloud, allows Genetec to provide a 99.5% SLA. Security controls Stratocast and Azure adhere to a rigorous set of security controls that govern operations and support. Genetec and Microsoft deploy a combination of preventive, defensive, and reactive controls including the following mechanisms to help protect against an unauthorized developer and/or administrative activity: Tight access controls, including a mandatory two-factor authentication. Combinations of controls that enhance independent detection of malicious activity. Multiple levels of monitoring, logging, and reporting. Security reports are used to monitor access patterns and to proactively identify and mitigate potential threats. Microsoft administrative operations, including system access, are logged to provide an audit trail if unauthorized or accidental changes are made. Automatic patching of the operating systems and applications running in the cloud. Additionally, the Genetec and Microsoft teams conduct background verification checks of certain operations personnel and limit access to applications, systems, and network infrastructure based on the level of background verification. High availability Azure facilities are designed to run 24x7x365 and employ various measures to help protect operations from power failure, physical intrusion, and network outages. These datacenters comply with industry standards for physical security and availability. They are managed, monitored, and administered by Microsoft operations personnel. Redundancy Stratocast video is stored in triplicate, within the same datacenter, ensuring the redundancy of critical data and mitigating the impact of hardware failure. Control of data location Knowing and controlling the location of an organization’s data can be an important element of data privacy, compliance and governance. Customers can specify the geographic area where their recordings are stored. Through this approach, recordings are replicated within a defined region for redundancy but are not transmitted outside the customer’s desired geographic boundaries. Operational security As a trusted provider of security solutions for a considerable number of government agencies and high-profile public and private organizations worldwide, we take compliance with local regulations very seriously. This, of course, includes the laws pertaining to data security and protection of privacy in the regions where we sell our products and services. Additionally, to ensure that all customer data is stored and used in an appropriate and secure manner, Stratocast is certified with the ISO 27001:2013 information security standard. The ISO 27001 standard is a framework of policies and procedures including legal, physical, and technical controls that address cyber security risks. These policies and procedures are part of the Information Security Management System (ISMS) at Genetec, that has been audited and certified by the ISO organization. Below is an excerpt of some of the relevant portions of it. Secure development policy Genetec is conscious that security is something that has to be embedded in the development practices and not something that can be added after the fact. Consequently, the Stratocast software development lifecycle (SDL) includes specific activities, pertaining to cyber security, that have to be completed in order to release each new version of Stratocast. These activities are defined in the secure development policy and include – secure design review performed on a periodic basis, manual or automated security testing, and penetration testing performed by a 3rd party auditor. Incident management & disaster recovery I t can be challenging to react appropriately to a cyber security incident when it happens, if nothing has been prepared for it beforehand. To avoid this, we have instilled a well-established incident management plan describing appropriate responses. This includes among others – the criteria defining the severity of an incident, the roles and responsibilities of each stakeholder involved in the management of that incident, the incident lifecycle, and the service level objectives. In a similar fashion, it’s best practice to establish a disaster recovery plan in the event of external service outages. Stratocast has a well thought out plan that reduces any negative…

Read More

Fortinet Advises Cyber Distancing and Network Isolation to Protect Organizations from Cyberattacks

Over the past several weeks, FortiGuard Labs has been monitoring a significant spike in COVID-19 related threats. Cybercriminals are unleashing a surprisingly high volume of new threats in this short period of time to take advantage of inadvertent security gaps as organizations are in a rush to ensure business continuity. Cybercriminals are exploiting the rapid change to our digital world An unprecedented number of unprotected users and devices are now online with one or two people in every home connecting remotely to work through the internet. Simultaneously there are children at home engaged in remote learning and the entire family is engaged in multi-player games, chatting with friends as well as streaming music and video. FortiGuard Labs is observing this perfect storm of opportunity being exploited by cybercriminals as the Threat Report on the Pandemic highlights:  A surge in phishing attacks: FortiGuard Labs research shows an average of about 600 new phishing campaigns every day. The content is designed to either prey on the fears and concerns of individuals or pretend to provide essential information on the current pandemic. The phishing attacks range from scams related to helping individuals deposit their stimulus for Covid-19 tests, to providing access to Chloroquine and other medicines or medical device, to providing helpdesk support for new teleworkers. In addition to scams targeting adults, some phishing attacks target children with offers of online games and free movies, or even access to credit cards to buy online games or shop online. Phishing scams are just the start: While the attacks start with a phishing attack, their end goal is to steal personal information or even target businesses through teleworkers. Majority of the phishing attacks contain malicious payloads – including ransomware, viruses, remote access trojans (RATs) designed to provide criminals with remote access to endpoint systems, and even RDP (remote desktop protocol) exploits. A Sudden spike in viruses: The first quarter of 2020 has documented a 17% increase in viruses for January, a 52% increase for February, and an alarming 131% increase for March compared to the same period in 2019. The significant rise in viruses is mainly attributed to malicious phishing attachments. Multiple sites that are illegally streaming movies that were still in theatres secretly infect malware to anyone who logs on. Free game, free movie, and the attacker is on your network. Risks for IoT devices magnify: As users are all connected to the home network, attackers have multiple avenues of attack that can be exploited targeting devices including computers, tablets, gaming and entertainment systems, and even online IoT devices such as digital cameras, smart appliances – with the ultimate goal of finding a way back into a corporate network and its valuable digital resources. Ransomware like attack to disrupt business: If the device of a remote worker can be compromised, it can become a conduit back into the organization’s core network, enabling the spread of malware to other remote workers. The resulting business disruption can be just as effective as ransomware targeting internal network systems for taking a business offline. Since helpdesks are now remote, devices infected with ransomware or a virus can incapacitate workers for days while devices are mailed in for reimaging. Solutions and countermeasures Organizations should take measures to protect their remote workers and help them secure their devices and home networks. Cyber social distancing is all about recognizing risks and keeping distance. Isolation is all about segmenting networks and quarantining the malware from spreading across the network. Here are a few critical steps to consider: Endpoint security: Endpoint security provides a VPN client to ensure that remote traffic remains secure. For organizations looking for an even more robust endpoint security solution a EDR solution provides advanced, real-time threat protection for endpoints both pre and post-infection, in addition to robust antivirus technologies installed at the kernel to detect and prevent malware infection, it can also respond to device breaches in real-time by detecting and defusing potential threats before they have the chance to compromise the system. Connectivity: VPN connections can be run and managed independently, organizations with large numbers of remote workers may need the addition of an enterprise management server solution. An EMS solution can securely and automatically share information between endpoint and the network, push out software updates, and assign security profiles to endpoints. Access to cloud applications: Driving all traffic through a VPN tunnel can actually have a doubling impact on network traffic. In addition to all of the remote workers connecting into the network, the network will also need to manage all of the outbound connections to cloud services. However, since this traffic will not be run through the organization’s edge security solutions, these direct connections will require a cloud-based security solution. Cloud access security broker (CASB) will provide visibility, compliance, data security, and threat protection for access to SaaS and other cloud-based services being used by an organization. Network access control: Cybercriminals intend to exploit this rapid transition to a teleworker strategy by hoping to get overlooked by masquerading as a legitimate corporate end-user or IoT device, or by hijacking a legitimate device. Network access control tools can see and identify everything connected to the network, as well as control those devices and users including dynamic automated responses. Network access control enables IT teams to see every device and user as they join the network, combined with the ability to limit devices access in the network, and automatically react to devices that fall out of policy within seconds. Network segmentation: Network segmentation ensures that devices, users, workflows, and applications can be isolated to prevent unauthorized access and data loss, as well as to limit exposure if there is a breach at the network perimeter. Next generation Firewall enables segmentation at the network perimeter further this can be enhanced using an internal segmentation Firewall. Zero-trust network access: The best security posture during this period is to consider that every user and device has already been compromised. Combining all of the solutions outlined above organizations can ensure…

Read More

SATATYA SIGHT Mobile Application for Network Video Recorder

Matrix SATATYA SIGHT is a comprehensive video surveillance application for mobile devices. It is designed for smartphones and tablets running on popular operating systems such as Android and iOS. It connects to multiple SATATYA recording devices such as NVR and HVR and offers the view of all locations and cameras on a single window. Features Add up to 50 recording devices. No public IP needed.  Call from mobile app. Complete access to all recorded videos. PTZ control. Take snapshot while watching live video. Access high importance cameras with single touch.  

Read More

The Road to Recovery for Private security Industry

The state of wellness of private security industry (PSI) is directly related to the health of Indian economy. Finance is the lifeline of any business, and if the revenue generation pipeline gets dry, the businesses cannot survive. The COVID shock has been so sudden that the road to recovery has become very rocky and bumpy, marred with multiple intangibles, and full of hurdles. The statistical data unleashed by the RBI Governor only spells gloomy economic scene slipping into recession with negative growth of GDP as all indicators appear to be nosediving, and thereby fragility of Indian economy has come to the surface. The short term quick-fixes can only ease the situation temporarily as full-fledged recovery in long term requires a sound road map built on many unorthodox and out of the box measures resulting from the equations needed to be made between GOI and states, PE and security provider, micro enterprises and the migrant labor, MSME and Banks and so on. We have tried to put the rail back on track but now we may have to lay the new tracks to restore its stability, speed, and over all comfort to all stakeholders in the journey.   THE HURDLES The hurdles in the journey to the recovery are visible on the wall in ‘big and bold’ letters and can best be summarized as under: Lack of coordination between the Central Government and certain State Governments – their muscle flexing and incoherent and shifting strategies. The murky handling of issues of migrant labor such as false promises of salary and food, and no demand of rent during the lockdown period and directives to this effect. Their subsequent reversal led to the despair and exodus of migrant labor leaving the factories and production lines without workforce. Abrupt disruption of demand and supply chain due to the direct impact of lockdown that was clearly punctuated with near term uncertainty. The ‘poor to no’ visibility in reversal of cycle of manufacturing and service sector post lockdown due to domestic and global fragmentation of demand and supply chain and also for the possibility of migrant labor returning to work in delayed time-frame. Failure of financial stimulus and its sluggish implementation to trigger economic stability. The extension of moratorium on payment of loans to the banks also added to woes of the banks and liquidity in the financial sector. Lack of any definite time-line in the discovery of vaccine against CORONA infection despite the global efforts by the pharmaceutical companies is another dampener. Non-flattening of the COVID curve and unprecedented spike in daily cases of CORONA infection despite over 70 days of lockdown is a cause of constant worry. The casual and irresponsible behavior of certain cross section of citizens towards police, doctors and other health workers in fight against CORONA added retrograde steps and undesired controversies. Fishing in dirty waters by the political parties during such turbulent times has led to misinformation campaigns which added pain to the poor, confusion in the social media, and exposed them of their falsehood of little care for the cause of poor. The devastation and misery inflicted by Amphan cyclone in states of West Bengal and Odisha, and Nisarg in Maharashtra and Gujarat have also added to the barriers on the road to recovery. Delayed or lack of pro-activeness in luring the Japanese and American companies from China to India.   THE HORIZON The horizon for the PSI looks hazy as the impact of pandemic is unprecedented and un-paralleled. It has inflicted deep rooted fear psychosis and behavioral changes in the mass and entrepreneurs. The wheels of economy like travel and tourism, transportation, education, hospitality and entertainment, shopping, manufacturing and servicing will be subjected to the new normal and will have to tread with caution to come to the original scale and volume. These are the sectors of hope and revival for PSI as banking and financial sectors are the only source of oxygen for survival and lease of life during the crisis. The conflict of interest between Mall owners and retailers over rentals for lock down period remains unresolved. PSAs are still contesting with PE for fulfilling their obligations. The travel and tourism is likely to ignite the demand for railways and domestic air travel which in turn will generate demand for hospitality and entertainment. Consumption will fuel the manufacturing and servicing. The PSI will have to traverse the parallel path with unlocking of economy as it unfolds.   THE SILVER LININGS  To my mind, despite the above, there are some silver linings which can still be counted:  High degree of rate of recovery of COVID patients.  The relative low fatality rate of COVID patients in India – exception being the high risk groups with pre-existing co-morbidities.  Likelihood of good and timely monsoon as predicted by IMD.  Bumper crop output from agriculture sector and adequate buffer stock of food grain.  Proactive role of RBI and presence of adequate Forex reserves.  Likelihood of consumption demand surging from rural areas.  Lack of jobs in rural areas will force migrant labor to rethink and result into their return to work.   CONCLUSION To keep afloat the PSA and PSI have limited options to keep searching for avenues of expansion of revenue growth, keep engaged with the existing clients, resort to cost cutting, pruning of work force in offices, aggressive collections strategy, remote delivery of training, adoption of new technologies and processes, and wait & watch for wheel of economy to rumble on new track with new normal. However, the entrepreneurial and fighting spirit of the PSI will ensure that they not only weather the challenges of COVID times but will emerge stronger than ever before.  

Read More

Networks Thermal Cameras for Elevated Body Temperature Screening

Given the current Covid-19 pandemic, thermal cameras are receiving increasingly more interest. It is a natural idea to utilize a thermal camera to detect elevated body temperatures. Right now, the Internet is full of information on the subject (including brand new companies), but it’s difficult to understand what is real, what is wishful thinking and what is exaggeration. At Eagle Eye Networks we have purchased a number of thermal cameras and have run a series of tests to determine what is practical with today’s technology. This document details some of the testing we have done and some of our conclusions. We do not claim that our testing is comprehensive or perfect, but we hope, that in sharing it, we can help. This document focuses on the application of thermal cameras to read human body temperature. However, it is important to note, that before the Covid-19 pandemic, thermal cameras, at least as it relates to video surveillance, were primarily used for detecting perimeter breaches. This use case does not require the same level of precision that a thermal camera detecting an elevated body temperature requires. Therefore, typical general-purpose thermal cameras in the market have an accuracy of +/- 5 degrees Fahrenheit, which is not accurate enough to detect elevated body temperatures. It’s also important to note that elevated temperature screening is not screening for coronavirus or for any other illness. In fact, some people who have a virus or illness may not have an elevated body temperature. Additionally, the majority of thermal cameras are not approved for medical use or approved by the FDA, but they may be well suited to provide an initial reading to allow appropriate personnel to perform follow up evaluation and potential diagnosis. Executive summary Thermal cameras can be used to detect elevated temperatures in humans under the right conditions. Creating those conditions can be challenging, but it’s not impossible or impractical. Our experience in testing has shown that the preferred solution includes cooperative subjects and limits measurement to a small number of people simultaneously. Given appropriate conditions we have tested cameras and found they consistently report temperatures within +/- 0.7 degrees Fahrenheit of measurements taken with a traditional thermometer. System components There are various systems in the market place; however, most cameras that are connected to a traditional surveillance system include these: Camera – Thermal and Visible Spectrum. Thermal Calibration Unit (blackbody). Recording System/ Video Management System. Local Display Device (optional). Cameras Some of the more advanced thermal cameras are effectively two cameras in a single housing, these are known by several different names – dual spectrum and bi-spectrum are the most common names. The image below (Figure 1) is a dual spectrum camera from Sunell that was designed to resemble a panda bear. This was originally deployed in Chinese schools where children would look at it as they entered. Each camera produces a video stream, the visible spectrum camera works like most typical surveillance cameras. The thermal camera produces an image that is a visual representation of the different temperatures it has detected. These images can be either in grayscale or in color. Most cameras have several visual choices for how to represent the thermal data. The images above (Figure 2) are from a dual spectrum thermal camera connected to the Eagle Eye Cloud VMS. This is a traditional video surveillance dual spectrum thermal camera, not a camera used to detect elevated body temperatures. There are a few things to note about the images. One is that the field of view is different. The visible camera can capture a wider field of view than the thermal camera. The visible camera has two vehicles in the field of view while the thermal camera only has one. The visible camera captures the street at the top of the image, while the thermal camera does not. The difference in camera field of view is quite common. Also, the thermal camera has a much lower resolution. The figures appear more ‘blocky.’ Thermal cameras today are generally much lower resolution than visible spectrum cameras.   Thermal calibration unit A thermal calibration unit, sometimes referred to as a blackbody, is a device that maintains a specific temperature and does not reflect any energy from the surroundings. It is used as a constant point of reference for the thermal camera. Not all thermal cameras require a calibration unit, but many can make use of them if they are present. A calibration unit requires electrical power, but is not wired to the camera or the VMS/ recorder. It is manually set at a prescribed temperature, and the thermal cameras are configured based on that temperature. Thermal calibration units are typically used when more precise temperature readings are required such as in elevated temperature screening. Some suppliers include a thermal calibration unit with the sale of the camera, but most do not. Calibration units are generally not present for most cameras connected to a video surveillance system. Many security industry personnel are not familiar with thermal calibration units or their use. Recording system/ video management system The cameras are generally connected to a recorder. For this discussion we utilized the Eagle Eye Cloud VMS with its enhancements for support of elevated temperature screening. The cameras are connected to an Eagle Eye Bridge. As shown above (figure 2), The Eagle Eye VMS records both the visible spectrum camera as well as the thermal camera. Additionally, Eagle Eye VMS captures the temperature measurement data that the camera generates. This means that the temperature is associated with specific to me, so searches can be performed based on the temperature, time or person. Notifications can be generated if the temperature is outside of a specified range. In other words, if the temperature is too high, a notification can be made. The notifications can be delivered via various methods, but the most common is via email. Typical notifications will have an image of the person, the temperature detected, as well as name and location of the camera that…

Read More

A Deeper Dive into Security of Embedded System

  INTRODUCTION Scope and purpose of this white paper The scope of this white paper is the security for embedded electronic systems and IoT systems, which are generally based on programmable microcontrollers. Examples are electronic consumer and industrial devices, IoT sensors, medical devices. The purpose is to stress the fact that although security countermeasures are necessary to protect embedded systems and IoT systems, they are unfortunately not sufficient to avoid surface attacks. Embedded systems and IoT systems are more and more exposed to a wider range of new security threats, and this trend will very probably accelerate. To prevent damages from security attacks, companies are taking measures to protect their assets, including more specifically their software IP. Unfortunately, in ecosystems where the supply chain is getting more complex, it is frequent that the ones deciding the security levels are not the ones that will be accountable for their choices. Even when security measures have been duly selected and implemented, facts are showing that there are still some underlying vulnerabilities. On average, security experts will break security of more than 80% of implementations during their evaluation phase, for multiple reasons: Security attacks are getting easier to set-up, even by players who have limited technical skills and could use tools available on the web. It costs just a few dollars to launch massive DDoS attacks capable of generating up to 300Gb/s. Security countermeasures have their own limitations, and having an overreliance on those countermeasures could lead to potential hidden security risks. Security implementation matters. Technical challenges in implementing security could potentially lead to vulnerabilities exploited by hackers. A good approach is to do a formal security evaluation with security experts. However, before taking this path, it will be efficient and cost effective to have a second view with a deeper dive into security. In most cases, it will highlight some vulnerabilities and will provide useful guidelines to improve the resistance of embedded systems against security attacks. In this whitepaper, we will: Describe the most frequently used security countermeasures. Review the limitations of these countermeasures and explain why a deeper dive is recommended. Share the views from our security experts. The benefit of this deeper dive is to reduce exposure to security attacks without having to reconsider the whole security approach. Security principles Basic principles It is widely accepted that security must rely on 3 basic principles: Security by design (and not after the facts). End to end security (at OT and IT levels). Security all along the product life. The last one is equally important compared to the first two. We observe that several electronic industries are getting conscious about the security by design and end to end security, and are not considering the importance of security all along the product life. For instance, having a secure mechanism for firmware update over the air (OTA) will prevent a lot of security breaches. Deeper dive I t would be great if a simple application of those basic principles will be enough to counter any potential security attack. Facts are showing that even by applying those principles, there are still remaining vulnerabilities exploited by hackers. Embedded systems are all different and have their own specificities; on the other side, security requirements vary considerably depending on market, applications or risk management policies. Considering that security must be scalable, and that no security scheme fits all, we recommend a deeper dive into security to ensure that the security schemes have been implemented in adequation with the system architecture. A strong security scheme which has not been properly implemented is simply useless. We will explain in this white paper the reasons why these basic security principles are necessary and not sufficient. Disclaimer The information in this white paper provides general information and guidance about cybersecurity; it is not intended as legal advice nor should you consider it as such. WHY DOES A DEEPER DIVE INTO SECURITY MAKE SENSE? Security attacks on embedded systems are getting more frequent There are several reasons that could explain why embedded and IoT systems are getting more vulnerable to security attacks: Systems complexity Embedded and IoT systems are becoming more and more complex due to rich, broad and diverse ecosystems which could be interconnected with each other’s. IoT ecosystems are an illustration of this trend; they include a wider range of technologies like sensors, gateways, networks, clouds with many different standards and limited regulations on security. Limited capacities in devices Many embedded and IoT systems are based on programmable microcontrollers with limitations in processing power and memory storage. Several security countermeasures have not been designed based on those limitations. As a result, they require compromising between security and performance, and most of the time the decision is in favor of the last one. Human errors are always possible The development of new technologies is accelerating, and we do not have enough background of previous threats to know enough about failures in protection. This is leading to an increase of human errors in life of a product – at the design stage, at manufacturing stage and during the implementation of security. Time to market and costs Generally, manufacturers shorten the launch time of products, putting higher priorities on volume of sales, and not always considering fundamental security best practices such as security by design. Security is often seen as an additional cost; this is why, in order to reduce costs, manufacturing companies are also limiting or ignoring security features in their devices. The result would be equipment that can never provide adequate protection. Any countermeasure has its own limitations Deciding a security strategy often means making compromises between risk, cost and time – the easier approach is to rely on legacy security mechanisms proposed by silicon and IP vendors, network providers or other third parties in the value chain. The issue with this approach is that there is no ‘one size fits all’ security solution that can protect any embedded system. The characteristics of each system is different and should be considered…

Read More

Remote Working Protect Your Active Directory Logins

The past couple of weeks have been intense for most companies since they had to shift to working remotely. This situation is unfortunately a huge opportunity for cyber-attackers. Remote connections mean more vulnerabilities to exploit. Active Directory (AD) is the main identity and access platform for companies around the world. If you want to secure your network you need to protect the remote use of AD credentials. Phishing aimed at the most vulnerable As if it was not enough on its own, the recent coronavirus outbreak brought with it a lot of new phishing email campaigns. The attackers are aiming at the most vulnerable users – just like the disease itself – your new remote employees. Using public fear to lure their victims is their main strategy. They send URLs or document to download of safety recommendations or infection maps. The probability of users clicking on a link or downloading an attachment is higher than ever. Basically, hackers are after a set of compromised credentials which they can use to access a network and move laterally within it to locate anything valuable that can be exploited. Even worse, similar to the coronavirus, you might not even know you’ve been touched. The Ponemon Institute says that 191 days is the average data breach discovery time. The threat surface is growing Now more than ever, your organization might be at high risk if you don’t have a sufficient protection of Active Directory connections. Most companies have been forced to work remotely which has expanded rapidly the threat surface. This risk is higher when we know that most companies weren’t ready for it, they had no time to prepare whatsoever. What they did is that they rushed to allow Microsoft remote desktop (RDP) access so that their employees would be able to access desktop resources remotely. Understandable enough, companies’ priority has been the continuation of operations. Cybersecurity didn’t get the attention it deserved. Remote Active Directory logins security RDP access is unfortunately not fully secure, it is only protected by a single password. Here are three recommendations to protect those sessions:  Strengthen passwords.  Use a Virtual Private Network (VPN) for all remote sessions. Enable two-factor authentication on these remote sessions. These 3 steps will allow you to significantly improve the security of your remote employees. For more security and to fully minimize the risk, find below a full list of recommendations written by experts: Remote working equipment policy: The best thing is to use the devices available, secured and controlled by your organization. If this is not an option, you should give clear usage and security rules to your employees working from home. Make sure to secure your external access: To do so, use a VPN (Virtual Private Network). Once this is done, and if you can, limit VPN access to only authorized equipment to strengthen security. If anyone tries to connect from a ‘non-authorized’ device, login must be denied. Strong password policy: To be strong and safe, all your passwords must be long, complex and unique. However, passwords will only be vulnerable. To address those vulnerabilities, activate two-factor authentication on all remote sessions, especially for connections to the corporate network. Deploy security updates: Whenever they’re available they need to be deployed on all pieces of equipment in your information system. If you don’t, attacker scan quickly exploit those vulnerabilities. Backup of data and activities: After an attack, backups might be the only way for your company to recover its data. Perform and test backups on a regular basis to make sure they are working. Use antiviral solutions: A professional antiviral solution helps protect your company from viral attacks, but also sometimes from phishing, or from some ransomware. Logging of the activity and access: Systematic logging of all access and activities of your workstations and equipment (servers, firewall, proxy…) will give you information on how a cyber-attack happened, its extent and how to remedy it. Supervise the activity of external access: It’s important to be able to detect suspicious access, it could represent a sign of an attack. To be able to detect those, you need to monitor all your remote sessions and access to your files and folders. For even more security, real-time alerts and immediate reactions are a great way to act before damage is done. User awareness: Your remote employees must be given clear instructions on what they can or can’t do. They are the first barrier to help you avoid/ detect attacks. Be ready for a cyber-attack: Perfect security doesn’t exist. No organization, whatever its size, is immune to cyber-attacks. If you anticipate by assessing the possible scenarios, you can take the necessary measures to protect your organization. Managers must be involved: They have to be implicated and responsible when it comes to security. It’s important in order to ensure employees’ adhesion.  

Read More