Untitled Quiz
26 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What are the two kinds of access management?

  • Physical access management and logical access management (correct)
  • Physical access management and security access management
  • Logical access management and digital access management
  • Security access management and digital access management
  • The term access control refers to a single function of a system, such as an automated access control system

    False

    What is the most important security component for the provision of effective physical security?

    Access management

    What is the purpose of the physical protection of the perimeter and buildings?

    <p>To prevent unauthorised people, objects, and vehicles from entering the facility.</p> Signup and view all the answers

    Where should an intruder and hold up alarm be managed?

    <p>By the access control system.</p> Signup and view all the answers

    Historically, access control measures relied solely on officers to manually check badges and a series of locks and keys.

    <p>True</p> Signup and view all the answers

    The advantage of a fully integrated system is that the software can be programmed to produce automatic responses when certain events are triggered.

    <p>True</p> Signup and view all the answers

    The key advantages of using AACS (automatic access control system) include (select all that apply):

    <p>Improved Accountability</p> Signup and view all the answers

    What is the primary function of material pass system?

    <p>To ensure that property is being removed from a site legitimately and is accompanied by the appropriate authorizations and documentation that specify its destination.</p> Signup and view all the answers

    RFID tagging is an effective tool in inventory management and detecting potential thefts.

    <p>True</p> Signup and view all the answers

    Close attention should be paid to waste removal and the activities of cleaners because concealing stolen items in waste is a common thief tactic.

    <p>True</p> Signup and view all the answers

    Why should the number of entrances/exits be kept to the minimum when consistent with operational requirements?

    <p>Entrances and exits are vulnerabilities that can be exploited by criminals.</p> Signup and view all the answers

    Why is it recommended that general parking areas should be established between the outer and inner perimeters of a site?

    <p>To control access so that all individuals entering and exiting the inner perimeter facility pass thru a pedestrian control point where inspection can be carried out.</p> Signup and view all the answers

    What does the text recommend about parking of vehicles outside the inner perimeter of a site?

    <p>All vehicles should be parked in secure well-illuminated areas.</p> Signup and view all the answers

    What is the purpose of a manned control point for vehicles that are permitted access to a site core?

    <p>To search vehicles to ensure contraband is not brought into the facility's core.</p> Signup and view all the answers

    Any level of access control can provide a return on investment when implemented correctly

    <p>True</p> Signup and view all the answers

    The main advantage of turnstiles over doors is they allow access to only one person at a time and prevent tailgating.

    <p>True</p> Signup and view all the answers

    What is the purpose of an airlock?

    <p>An airlock is a secure space designed to prevent tailgating.</p> Signup and view all the answers

    What is the purpose of a door contact?

    <p>To detect whether a door is open or closed, or to monitor the use of the reader or normal egress device.</p> Signup and view all the answers

    What is the purpose of an emergency egress device in an access control system?

    <p>To ensure that a door can be opened in emergency situations, regardless of the access control system.</p> Signup and view all the answers

    Push-button locks are a good alternative to a lock and key system.

    <p>False</p> Signup and view all the answers

    A double entry gate is a valuable asset in providing an increased level of security.

    <p>True</p> Signup and view all the answers

    What are the advantages of using turnstiles?

    <p>They can be used for both internal and external access points.</p> Signup and view all the answers

    What is the purpose of an airlock and how should it be monitored?

    <p>An airlock is a secure space between two portals, designed to prevent tailgating. It should be monitored by officers or CCTV.</p> Signup and view all the answers

    A door contact is a magnetic switch used for sensing opening and closing of a door.

    <p>True</p> Signup and view all the answers

    Electric locks can be configured to be either fail secure or fail safe.

    <p>True</p> Signup and view all the answers

    Study Notes

    Access Management

    • Access management is a core security process, managing who (or what) can go where and when.
    • Two types of access management exist: physical and logical (IT systems) access management.
    • This module focuses on physical access management (people, property, and vehicles).
    • Convergence of physical and logical access management is increasing.
    • Access management is a broader term than access control, which relates to specific functions of access control systems.
    • Effective access management requires cooperation from all personnel.

    Aims of Access Management

    • Prevent unauthorized entry.
    • Facilitate authorized entry.
    • Prevent introduction of prohibited items.
    • Prevent unauthorized removal of property.
    • Monitor and control egress.
    • Account for who is on site at any given time.
    • Provide information to security personnel.
    • Prevent observation of sensitive processes/operations and compromise of sensitive information.
    • Protect organization's employees and their property.
    • Prevent any facility attack or misuse (occupation, sabotage, terrorism.)
    • Provide an audit trail of access/egress transactions.

    Components of Access Management

    • Physical barriers (fences, site layout, doors, signage) to create access control points.
    • Portal hardware for locking/unlocking doors, door sensors (open/closed, bolt).
    • Access management (hardware and software for managing access).
    • Readers for card or credential data transmission.
    • Mantraps and turnstiles to control single entry.
    • People and credentials are essential.
    • Biometric authentication may be used (card with PIN, or biometric scanners).

    Standard Good Practice

    • Signage to warn about restricted areas.
    • Secure perimeter barriers.
    • Secured entry/exit points.
    • Identification and surveillance of entry points.
    • Zoning to restrict access to sensitive areas (internal and external).
    • Employee awareness of access policies.
    • Card management system - accountable issuance.
    • Use single-entry devices (revolving doors, turnstiles) to prevent tailgating.
    • Use automated access control systems with counterfeit-resistant card keys.
    • Restrict access to appropriate working hours.
    • Periodic assessment of access levels/staff.
    • Collection of badges/keys when employees/contractors leave.

    Design Models

    • Public allowed in; exclusion is by exception. Open facilities allow entry to anyone except those with specific exclusions.
    • Public not allowed in; admittance by exception. Closed facilities only allow access to authorised personnel.

    Critical Areas and Zoning

    • A typical site includes public areas, controlled areas, and restricted areas (critical areas with limited access).
    • Different levels of access for different areas are possible. Examples include public areas, collaboration areas, confidential areas, restricted areas/
    • Site perimeters should be defined, well-lit, signed, and guarded to deter unauthorized entry.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    More Like This

    Untitled Quiz
    37 questions

    Untitled Quiz

    WellReceivedSquirrel7948 avatar
    WellReceivedSquirrel7948
    Untitled Quiz
    55 questions

    Untitled Quiz

    StatuesquePrimrose avatar
    StatuesquePrimrose
    Untitled Quiz
    18 questions

    Untitled Quiz

    RighteousIguana avatar
    RighteousIguana
    Untitled Quiz
    50 questions

    Untitled Quiz

    JoyousSulfur avatar
    JoyousSulfur
    Use Quizgecko on...
    Browser
    Browser