Podcast
Questions and Answers
What are the two kinds of access management?
What are the two kinds of access management?
The term access control refers to a single function of a system, such as an automated access control system
The term access control refers to a single function of a system, such as an automated access control system
False
What is the most important security component for the provision of effective physical security?
What is the most important security component for the provision of effective physical security?
Access management
What is the purpose of the physical protection of the perimeter and buildings?
What is the purpose of the physical protection of the perimeter and buildings?
Signup and view all the answers
Where should an intruder and hold up alarm be managed?
Where should an intruder and hold up alarm be managed?
Signup and view all the answers
Historically, access control measures relied solely on officers to manually check badges and a series of locks and keys.
Historically, access control measures relied solely on officers to manually check badges and a series of locks and keys.
Signup and view all the answers
The advantage of a fully integrated system is that the software can be programmed to produce automatic responses when certain events are triggered.
The advantage of a fully integrated system is that the software can be programmed to produce automatic responses when certain events are triggered.
Signup and view all the answers
The key advantages of using AACS (automatic access control system) include (select all that apply):
The key advantages of using AACS (automatic access control system) include (select all that apply):
Signup and view all the answers
What is the primary function of material pass system?
What is the primary function of material pass system?
Signup and view all the answers
RFID tagging is an effective tool in inventory management and detecting potential thefts.
RFID tagging is an effective tool in inventory management and detecting potential thefts.
Signup and view all the answers
Close attention should be paid to waste removal and the activities of cleaners because concealing stolen items in waste is a common thief tactic.
Close attention should be paid to waste removal and the activities of cleaners because concealing stolen items in waste is a common thief tactic.
Signup and view all the answers
Why should the number of entrances/exits be kept to the minimum when consistent with operational requirements?
Why should the number of entrances/exits be kept to the minimum when consistent with operational requirements?
Signup and view all the answers
Why is it recommended that general parking areas should be established between the outer and inner perimeters of a site?
Why is it recommended that general parking areas should be established between the outer and inner perimeters of a site?
Signup and view all the answers
What does the text recommend about parking of vehicles outside the inner perimeter of a site?
What does the text recommend about parking of vehicles outside the inner perimeter of a site?
Signup and view all the answers
What is the purpose of a manned control point for vehicles that are permitted access to a site core?
What is the purpose of a manned control point for vehicles that are permitted access to a site core?
Signup and view all the answers
Any level of access control can provide a return on investment when implemented correctly
Any level of access control can provide a return on investment when implemented correctly
Signup and view all the answers
The main advantage of turnstiles over doors is they allow access to only one person at a time and prevent tailgating.
The main advantage of turnstiles over doors is they allow access to only one person at a time and prevent tailgating.
Signup and view all the answers
What is the purpose of an airlock?
What is the purpose of an airlock?
Signup and view all the answers
What is the purpose of a door contact?
What is the purpose of a door contact?
Signup and view all the answers
What is the purpose of an emergency egress device in an access control system?
What is the purpose of an emergency egress device in an access control system?
Signup and view all the answers
Push-button locks are a good alternative to a lock and key system.
Push-button locks are a good alternative to a lock and key system.
Signup and view all the answers
A double entry gate is a valuable asset in providing an increased level of security.
A double entry gate is a valuable asset in providing an increased level of security.
Signup and view all the answers
What are the advantages of using turnstiles?
What are the advantages of using turnstiles?
Signup and view all the answers
What is the purpose of an airlock and how should it be monitored?
What is the purpose of an airlock and how should it be monitored?
Signup and view all the answers
A door contact is a magnetic switch used for sensing opening and closing of a door.
A door contact is a magnetic switch used for sensing opening and closing of a door.
Signup and view all the answers
Electric locks can be configured to be either fail secure or fail safe.
Electric locks can be configured to be either fail secure or fail safe.
Signup and view all the answers
Study Notes
Access Management
- Access management is a core security process, managing who (or what) can go where and when.
- Two types of access management exist: physical and logical (IT systems) access management.
- This module focuses on physical access management (people, property, and vehicles).
- Convergence of physical and logical access management is increasing.
- Access management is a broader term than access control, which relates to specific functions of access control systems.
- Effective access management requires cooperation from all personnel.
Aims of Access Management
- Prevent unauthorized entry.
- Facilitate authorized entry.
- Prevent introduction of prohibited items.
- Prevent unauthorized removal of property.
- Monitor and control egress.
- Account for who is on site at any given time.
- Provide information to security personnel.
- Prevent observation of sensitive processes/operations and compromise of sensitive information.
- Protect organization's employees and their property.
- Prevent any facility attack or misuse (occupation, sabotage, terrorism.)
- Provide an audit trail of access/egress transactions.
Components of Access Management
- Physical barriers (fences, site layout, doors, signage) to create access control points.
- Portal hardware for locking/unlocking doors, door sensors (open/closed, bolt).
- Access management (hardware and software for managing access).
- Readers for card or credential data transmission.
- Mantraps and turnstiles to control single entry.
- People and credentials are essential.
- Biometric authentication may be used (card with PIN, or biometric scanners).
Standard Good Practice
- Signage to warn about restricted areas.
- Secure perimeter barriers.
- Secured entry/exit points.
- Identification and surveillance of entry points.
- Zoning to restrict access to sensitive areas (internal and external).
- Employee awareness of access policies.
- Card management system - accountable issuance.
- Use single-entry devices (revolving doors, turnstiles) to prevent tailgating.
- Use automated access control systems with counterfeit-resistant card keys.
- Restrict access to appropriate working hours.
- Periodic assessment of access levels/staff.
- Collection of badges/keys when employees/contractors leave.
Design Models
- Public allowed in; exclusion is by exception. Open facilities allow entry to anyone except those with specific exclusions.
- Public not allowed in; admittance by exception. Closed facilities only allow access to authorised personnel.
Critical Areas and Zoning
- A typical site includes public areas, controlled areas, and restricted areas (critical areas with limited access).
- Different levels of access for different areas are possible. Examples include public areas, collaboration areas, confidential areas, restricted areas/
- Site perimeters should be defined, well-lit, signed, and guarded to deter unauthorized entry.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.