3 minute read

3.7.2 Automatic Access Control Systems

Next Article
BIBLIOGRAPHY

BIBLIOGRAPHY

2. Crime Prevention Systems

1. Monitoring Systems These are a series of cameras and sensors of various types that constantly monitor and oversee the activities going on in and around the building. Various sensors used are motion sensors, fire detectors, carbon monoxide detectors etc. The information collected are simultaneously sent to the supervisors in the form of emergency alarms and images. This data is often stored and managed in a security data server.

Advertisement

2. Crime Prevention System These systems based on the information from the monitoring systems, performs ingress and egress management and controls. These systems also use certain detectors like door openclose detectors, glass break detectors to detect emergencies.

These systems together provide complete security solutions to buildings with reduced human participation.

3.7.2 Automatic Access Control Systems

In the earlier days the access control was carried out by a staff like a receptionist. They were required to maintain accurate logs of the movement of users in offices and institutions. This data was used to calculate the average work hours of an employee or to determine the pay scale of workers. Such data were often prone to manipulation either by individuals or intruders.

Technological advancements have changed the way we think about security and have rescued humans from the burden of providing security to buildings and human resources. Development of advanced software and programmable machines promises better results in access controls. The benefits of Advanced Access Control Systems or AACS are pretty obvious when we think about it. They provide completely efficient protection to the employees, patrons, information, equipment and other resources without question.

Types of Advanced Access Control Systems Mainly there are three types of access control systems: 1. Discretionary Access Control (DAC) 2. Mandatory Access Control (MAC) 3. Role- Based Access Control (RBAC)

1. Discretionary Access Control (DAC) This is the least restrictive in all the access control systems in which the owner can decide who all can have access to a specific location. It essentially allows the user complete access towards all the spaces and object in the building. 2. Mandatory Access Control

Such control systems are employed in buildings that requires more sophisticated control systems. In this system only the owner has access to all units or facilities and provides the user with partial or limited access based on the owners’ decisions. MAC classify all the users and provides them with labels that permit them to gain access through security with established security guidelines. 3 Role- Based Access Control In RBAC the access is provided only based on the roles of the user or title of the jobs. It provides specific access to specific purposes rather than provided particular access to multiple individuals.

Benefits of Advanced Access Control Systems 1. Knowing the persons coming in and going out at all the times The systems keep track of everybody who moves around in the building and ensure there are no intruders in the building. In a building with many, it will be rather difficult to know who belongs to the building and who doesn’t. It helps prevent strangers from entering the building undetected 2. Keep track of employees An access control system can reduce the chaos when a building has workers coming in for multiple shifts in a day. It provides the users with information regarding the correct timing for their shifts. It also keeps track of who has shown up for work and who hasn’t. 3. Secure sensitive documents and data The system allows the owner to limit access to highly sensitive areas in a building that houses important hardware software and other confidential information. 4. Reduce theft and accidents Since the access systems does not allow entry to strangers and movements of people inside the building are restricted to confidential areas, the possible chances of thefts and accidents will be less in an access-controlled building. 5. No more dependence on locks and keys With the use of engineered software and machines that run on such software dependence of locks and keys are reduced. The owner and employees don’t have to worry about lost keys anymore, because the keys that they will be carrying around will be their own iris or fingerprints.

Working of Advanced Access Control Systems Biometrics Identifying individuals through distinctive characteristics, biometrics uses the fingerprint, face, iris or palm for authentication. Biometric authentication cannot be transferred between individuals and working with an access control card for authorization can significantly increase the security of the building.

This article is from: