Banks belong to the country's key security and prevention units, and are characterized by various scales, numerous important facilities, complicated access personnel, and wide management areas. As the main circulation place of the current social currency, it plays an important role in the economic operation of the country. It serves a wide range of domestic industries with its unique features and advanced technologies. As banking business involves a large amount of cash, securities, and valuables, it has been the focus of various criminals; since the birth of modern banks, theft and anti-theft, robbery and anti-robbery, fraud and anti-fraud, etc. The development of the development is also synchronized. At present, criminal activities against banks are increasing. The criminal means and methods of crime have also gradually diversified, and the security and prevention systems of modern banks have been comprehensively strengthened and renewed; in order to adapt to the operation of the banking system and business development, it has become imminent.
I. The composition of bank security networking system
The construction of banking security networking system should be based on the bank's business characteristics and security requirements, with the bank security integrated management platform as the core, digital, high-definition, and networked product technologies to achieve multi-level network monitoring of outlets, branches, and head offices. Integrate high-definition video surveillance systems, GIS systems, alarm systems, access control systems, and intercom systems into one, and through the combination of security systems and banking systems, build a regulatory information platform that meets the needs of modern bank security management.
The overall structure of the bank security networking system shall adopt the special network structure of the provincial branch's primary monitoring center, the municipal branch's secondary monitoring center, and the district-county branch three-level monitoring center. The first-level monitoring center requires the establishment of branches at each provincial level. The monitoring center requires the establishment of branches in various cities. The three-level monitoring center requires the establishment of branches and sub-county branches; in order to ensure the security and reliability of the networked system, the above three-level networking architecture must be established in the bank's special network system, such as the lease of China Netcom and telecommunications. , mobile and other circuits establish a financial information security special network.
Currently, the bank security networking system is based on the bank's inline private network VPN. It is required to comply with the Intranet technical system and the status quo. It cannot generate excessive information traffic to the Intranet, and it cannot form the factors that cause the network to crash. It also needs to implement security supervision. The accuracy, timeliness and reliability of information. The bank's in-line special network is divided into three layers, including monitoring of business outlets, monitoring centers of various cities, and monitoring centers of provincial branches. The office network of the regional monitoring center to the business outlets of the jurisdiction is generally 2 Mbits bandwidth. To achieve high-definition monitoring, it is necessary to transition to 4M bandwidth. Considering the other costs of network protocols and service data, the bandwidth that can be allocated to the actual monitoring network is about 50-75%. (ie, 2 to 3 Mbits). Therefore, each business network point can transmit one HD 1080p video or two video video streams to the upper level monitoring center. When the bandwidth is too low, the low bitstream network transmission can be selected to ensure smooth video surveillance and reduce the actual bandwidth. .
1. Bank network special network platform composition and function
The bank network system uses a private network as the basic network platform to realize the interconnection, intercommunication, and control of various security subsystems based on different network platforms within the banking system. It mainly has the following basic functions:
(1) Fully realize high-definition monitoring from front-end high-definition capture to storage, management, digital on-wall, high-definition display, and access to mainstream branded 130/200/500 million high-pixel network cameras.
(2) The platform system equipment supports cash register characters, ATM machine card number information, and the like.
(3) Supports fast electronic map navigation, allowing direct viewing of live image information.
(4) Provides support for uploading and playing back video files, and allows remote monitoring of video surveillance.
(5) Supports digital matrix and PTZ control functions.
(6) Identity authentication and rights management can be performed, and multiple password protection mechanisms are supported to ensure the security of data information.
2. The composition and function of the primary monitoring center system
The first-level monitoring center system is usually composed of a central management server, an alarm server, an HD decoder, a monitoring video wall, and a centralized storage server, and has the following basic functions:
(1) It can manage video surveillance sites and secondary monitoring centers in this jurisdiction.
(2) It can receive and process the alarm information actively uploaded by the secondary monitoring center.
(3) Centralized storage of important surveillance videos in the areas under its jurisdiction.
(4) The front-end equipment can be controlled.
(5) Support rapid electronic map navigation and realize the management of all subordinate monitoring points through electronic maps.
3. Secondary monitoring center system composition and function
The secondary monitoring center system is usually composed of management servers, high-definition decoders, monitoring video walls and other equipment, and has the following basic functions:
(1) The front-end device can be controlled.
(2) It can realize the recording, playback and upload of remote images.
(3) Support for alarm linkage access and processing, can receive monitoring equipment alarm events within its jurisdiction; and record and process video.
(4) The forwarding and distribution of various video image requirements at business outlets can be realized.
(5) For the monitoring equipment at the front-end business outlets, not only can the basic data information be obtained, but also the equipment operating status can be detected through the inspection function.
4. Composition and function of business network monitoring system
The monitoring system of business outlets in various places is usually composed of high-definition cameras, alarm probes, hard disk recorders, or NVRs, ATMs, access control bays, etc. The main functions are as follows:
(1) The business network monitoring system shall have the capability of supporting various image formats such as CIF, D1 (4CIF), VGA, 720P, and 1080P. The collected data can be uploaded and saved in real time, and video data can also be synchronously forwarded.
(2) The monitoring center has control commands for controlling the pan-tilt, lens, etc. It can collect alarm information and upload related information to the superior monitoring center through the network.
(3) General video recordings should be kept for more than 30 days in monitoring storage devices, and monitoring videos for important parts should be kept for more than 60 days. Video for emergencies or major cases is transmitted to the upper monitoring center server for backup and preservation.
Second, the key technologies of bank security networking system
The bank security networking system requires an open architecture, standardized interfaces and protocols, good compatibility and scalability, compliance with national and industry standards and regulations, and full use of existing alarm systems, video surveillance systems, and transmission resources. Realize system integration, resource integration and information sharing.
(1) The equipment involved in the bank security networking system must meet the requirements of reliability and safety. The selection of equipment cannot be selected as a test product. It is necessary to select advanced mainstream products on the market and ensure that the system equipment operates without interruption.
(2) Critical data devices and interfaces should be designed with redundancy. They must have the functions of fault detection, system recovery, etc. The information transmission and data storage under the network environment should be more secure to avoid being attacked by malicious attacks and illegal data extraction. appear.
(3) The banking security networking system requires a network system with resource sharing and rapid response. Therefore, it is necessary to strengthen the real-time supervision and management of the operating conditions of the network system, ensure the stable operation and rapid response of the system, and consider and operate based on the following points:
1 The system should adopt a unified user authority authentication management mode.
2 The system should adopt a multi-level user rights management mechanism to prevent users from exceeding their authority.
3 The server device should be able to limit or control the access of certain IP clients.
4 The system log operation function can record important events in the log list, and store the classified and scheduled backups to prevent data loss due to hardware failure.
(4) The bank security networking system should adopt multiple methods to ensure network security. First of all, external network isolation must ensure the absolute security of the networked system. The system networking should be strictly established on the bank intranet platform and be completely isolated from the external network to ensure that it cannot pass through any external network and public network system. The system performs connection access (VPN network can also be used). Secondly, intranet isolation requires that the provincial branch network subsystems and the local city branch network subsystems must be separated by a firewall. At the same time, the firewall needs to support non-pure software for address, protocol filtering, packet filtering, secure identity authentication, and remote management.
(5) The information security of the banking security network system mainly includes the authorization mechanism and the identity authentication mechanism. The authorization mechanism should adopt the role-based access control model in the networked system, support the authorization of users at different levels, and can realize the monitoring of the decentralization such as login, browse, read, modify, and delete. In addition, the identity authentication mechanism can implement the identity authentication of the user of the computer system, the identity authentication of the user to the computer system, and the identity authentication of the computer system to other computer systems.
Third, the application of bank security networking system
The banking security system network management is the focus of bank security construction in recent years. With the development of technology and demand, bank security has evolved from local management to networked management, and network management applications have evolved from the first off-site storage facilities to self-service banks, business establishments, etc. Fully networked applications. At present, banking security networking applications have fully covered all subsystems of banking security and have been extended to business outlets. Self-service banking, treasury and other departments provided strong technical support for bank operations management.
A solution for bank security networking systems. Among them, the business hall adopts high-definition video with ultra-wide dynamic image processing technology, which effectively avoids the problems of backlight imaging; at the same time, it also implements the supervision of teller business personnel, such as the movement of the cash box, cash registers, and other operations. In the self-service banking area, a wide dynamic function pinhole camera is used to identify and monitor the face of the payer, and the collected information is transmitted to the superior monitoring center in real time. In case of abnormal idle conditions, the alarm can be promptly reported. In addition, the Treasury uses a variety of equipment technologies such as access control, alarms, and monitoring. It can carry out multiple identification and certification of entry and exit personnel and has a strict authority management mechanism. Different levels of personnel can be authorized differently to prevent illegal intrusion.
I. The composition of bank security networking system
The construction of banking security networking system should be based on the bank's business characteristics and security requirements, with the bank security integrated management platform as the core, digital, high-definition, and networked product technologies to achieve multi-level network monitoring of outlets, branches, and head offices. Integrate high-definition video surveillance systems, GIS systems, alarm systems, access control systems, and intercom systems into one, and through the combination of security systems and banking systems, build a regulatory information platform that meets the needs of modern bank security management.
The overall structure of the bank security networking system shall adopt the special network structure of the provincial branch's primary monitoring center, the municipal branch's secondary monitoring center, and the district-county branch three-level monitoring center. The first-level monitoring center requires the establishment of branches at each provincial level. The monitoring center requires the establishment of branches in various cities. The three-level monitoring center requires the establishment of branches and sub-county branches; in order to ensure the security and reliability of the networked system, the above three-level networking architecture must be established in the bank's special network system, such as the lease of China Netcom and telecommunications. , mobile and other circuits establish a financial information security special network.
Currently, the bank security networking system is based on the bank's inline private network VPN. It is required to comply with the Intranet technical system and the status quo. It cannot generate excessive information traffic to the Intranet, and it cannot form the factors that cause the network to crash. It also needs to implement security supervision. The accuracy, timeliness and reliability of information. The bank's in-line special network is divided into three layers, including monitoring of business outlets, monitoring centers of various cities, and monitoring centers of provincial branches. The office network of the regional monitoring center to the business outlets of the jurisdiction is generally 2 Mbits bandwidth. To achieve high-definition monitoring, it is necessary to transition to 4M bandwidth. Considering the other costs of network protocols and service data, the bandwidth that can be allocated to the actual monitoring network is about 50-75%. (ie, 2 to 3 Mbits). Therefore, each business network point can transmit one HD 1080p video or two video video streams to the upper level monitoring center. When the bandwidth is too low, the low bitstream network transmission can be selected to ensure smooth video surveillance and reduce the actual bandwidth. .
1. Bank network special network platform composition and function
The bank network system uses a private network as the basic network platform to realize the interconnection, intercommunication, and control of various security subsystems based on different network platforms within the banking system. It mainly has the following basic functions:
(1) Fully realize high-definition monitoring from front-end high-definition capture to storage, management, digital on-wall, high-definition display, and access to mainstream branded 130/200/500 million high-pixel network cameras.
(2) The platform system equipment supports cash register characters, ATM machine card number information, and the like.
(3) Supports fast electronic map navigation, allowing direct viewing of live image information.
(4) Provides support for uploading and playing back video files, and allows remote monitoring of video surveillance.
(5) Supports digital matrix and PTZ control functions.
(6) Identity authentication and rights management can be performed, and multiple password protection mechanisms are supported to ensure the security of data information.
2. The composition and function of the primary monitoring center system
The first-level monitoring center system is usually composed of a central management server, an alarm server, an HD decoder, a monitoring video wall, and a centralized storage server, and has the following basic functions:
(1) It can manage video surveillance sites and secondary monitoring centers in this jurisdiction.
(2) It can receive and process the alarm information actively uploaded by the secondary monitoring center.
(3) Centralized storage of important surveillance videos in the areas under its jurisdiction.
(4) The front-end equipment can be controlled.
(5) Support rapid electronic map navigation and realize the management of all subordinate monitoring points through electronic maps.
3. Secondary monitoring center system composition and function
The secondary monitoring center system is usually composed of management servers, high-definition decoders, monitoring video walls and other equipment, and has the following basic functions:
(1) The front-end device can be controlled.
(2) It can realize the recording, playback and upload of remote images.
(3) Support for alarm linkage access and processing, can receive monitoring equipment alarm events within its jurisdiction; and record and process video.
(4) The forwarding and distribution of various video image requirements at business outlets can be realized.
(5) For the monitoring equipment at the front-end business outlets, not only can the basic data information be obtained, but also the equipment operating status can be detected through the inspection function.
4. Composition and function of business network monitoring system
The monitoring system of business outlets in various places is usually composed of high-definition cameras, alarm probes, hard disk recorders, or NVRs, ATMs, access control bays, etc. The main functions are as follows:
(1) The business network monitoring system shall have the capability of supporting various image formats such as CIF, D1 (4CIF), VGA, 720P, and 1080P. The collected data can be uploaded and saved in real time, and video data can also be synchronously forwarded.
(2) The monitoring center has control commands for controlling the pan-tilt, lens, etc. It can collect alarm information and upload related information to the superior monitoring center through the network.
(3) General video recordings should be kept for more than 30 days in monitoring storage devices, and monitoring videos for important parts should be kept for more than 60 days. Video for emergencies or major cases is transmitted to the upper monitoring center server for backup and preservation.
Second, the key technologies of bank security networking system
The bank security networking system requires an open architecture, standardized interfaces and protocols, good compatibility and scalability, compliance with national and industry standards and regulations, and full use of existing alarm systems, video surveillance systems, and transmission resources. Realize system integration, resource integration and information sharing.
(1) The equipment involved in the bank security networking system must meet the requirements of reliability and safety. The selection of equipment cannot be selected as a test product. It is necessary to select advanced mainstream products on the market and ensure that the system equipment operates without interruption.
(2) Critical data devices and interfaces should be designed with redundancy. They must have the functions of fault detection, system recovery, etc. The information transmission and data storage under the network environment should be more secure to avoid being attacked by malicious attacks and illegal data extraction. appear.
(3) The banking security networking system requires a network system with resource sharing and rapid response. Therefore, it is necessary to strengthen the real-time supervision and management of the operating conditions of the network system, ensure the stable operation and rapid response of the system, and consider and operate based on the following points:
1 The system should adopt a unified user authority authentication management mode.
2 The system should adopt a multi-level user rights management mechanism to prevent users from exceeding their authority.
3 The server device should be able to limit or control the access of certain IP clients.
4 The system log operation function can record important events in the log list, and store the classified and scheduled backups to prevent data loss due to hardware failure.
(4) The bank security networking system should adopt multiple methods to ensure network security. First of all, external network isolation must ensure the absolute security of the networked system. The system networking should be strictly established on the bank intranet platform and be completely isolated from the external network to ensure that it cannot pass through any external network and public network system. The system performs connection access (VPN network can also be used). Secondly, intranet isolation requires that the provincial branch network subsystems and the local city branch network subsystems must be separated by a firewall. At the same time, the firewall needs to support non-pure software for address, protocol filtering, packet filtering, secure identity authentication, and remote management.
(5) The information security of the banking security network system mainly includes the authorization mechanism and the identity authentication mechanism. The authorization mechanism should adopt the role-based access control model in the networked system, support the authorization of users at different levels, and can realize the monitoring of the decentralization such as login, browse, read, modify, and delete. In addition, the identity authentication mechanism can implement the identity authentication of the user of the computer system, the identity authentication of the user to the computer system, and the identity authentication of the computer system to other computer systems.
Third, the application of bank security networking system
The banking security system network management is the focus of bank security construction in recent years. With the development of technology and demand, bank security has evolved from local management to networked management, and network management applications have evolved from the first off-site storage facilities to self-service banks, business establishments, etc. Fully networked applications. At present, banking security networking applications have fully covered all subsystems of banking security and have been extended to business outlets. Self-service banking, treasury and other departments provided strong technical support for bank operations management.
A solution for bank security networking systems. Among them, the business hall adopts high-definition video with ultra-wide dynamic image processing technology, which effectively avoids the problems of backlight imaging; at the same time, it also implements the supervision of teller business personnel, such as the movement of the cash box, cash registers, and other operations. In the self-service banking area, a wide dynamic function pinhole camera is used to identify and monitor the face of the payer, and the collected information is transmitted to the superior monitoring center in real time. In case of abnormal idle conditions, the alarm can be promptly reported. In addition, the Treasury uses a variety of equipment technologies such as access control, alarms, and monitoring. It can carry out multiple identification and certification of entry and exit personnel and has a strict authority management mechanism. Different levels of personnel can be authorized differently to prevent illegal intrusion.
Hex Flange Nuts,nut bolt,bolts nuts screws fasteners,bolt and nut
Ruian Chaoyang Standard Parts Co., Ltd. , https://www.cybzj.com