Electronic Security refers to any electronic equipment that could perform security operations like surveillance, access control, alarming or an intrusion control to a facility or an area which uses a power from mains and also a power backup like battery etc. it has many types will be discussed as follow.
Types of Electronic Security Systems
Closed-circuit television (CCTV) is the use of video cameras to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast television in that the signal is not openly transmitted, though it may employ point to point (P2P), point to multipoint (P2MP), or mesh wired or wireless links. Though almost all video cameras fit this definition, the term is most often applied to those used for surveillance in areas that may need monitoring such as banks, stores, and other areas where security is needed. Though Videotelephony is seldom called ‘CCTV’ one exception is the use of video in distance education, where it is an important tool. This would be like the surveillance cameras you see in stores or, depending on which country you live in, traffic cameras you find on stoplights. The system consists of 3 main components: cameras, which are used to view the area; recorders, which are used to record the video the cameras capture; and a workstation, located in a remote access area, where security personnel is able to monitor the state of the area they are trying to secure.
Automated Access Control Systems (AACS) regulate access to areas by interfacing with locking mechanisms. The system will only allow entry after the credentials of the prospective visitor are verified; examples of such a system would be doors that require pins or biometric information to allow entry. These systems are not only capable of allowing or denying access but can also keep a log of all attempts to enter the secure area they may even alert authorities of unauthorized attempts to gain entry. it provides detection and audit to limit who can go where. They can be combined with assured physical barriers to provide delay into a secure site or can be used with demarcation barriers i.e. half height gates, to provide the only detection.
Intrusion Detection Systems (ID) is a device or software application that monitors a network or systems for malicious activity or policy violations. These are systems that, use sensors to detect any breaches to the secured area, if any breaches are detected then they trigger an alarm of some sort. This system consists of two components, the sensor and Premise Control Unit (PCU) which monitors the status of the alarm system and transmits the information to a remote monitoring station. The PCU also allows authorized personnel to activate or deactivate the system. Sounds familiar? It might as this is the type of system used in Home security systems, with the keypad being the PCU.