ABSTRACT

During this phase the examination of the requirements would include the type of security system that would be the most effective based on the threat and location being protected and the various components of the system. These system components would include the intrusion detection system central station server. They would also include the computer that would be utilized to operate the security system. The monitors that will be required to work the system must also be included in the system design. Depending on the size and number of monitors, the construction of a rack system to hold the monitors may be required.2