SlideShare a Scribd company logo
1 of 4
Download to read offline
PHYSICALL
ACCESS
CONTROL
SYSTEMS
BONEY MAUNDU
Slim Bz Techsystems
Physical Access Control Systems
Physical Access Control Systems (PACS) are electronic systems that control entry and exit into physical
spaces like buildings, rooms, or grounds by utilizing authentication and authorization features to grant or
deny access.
Access control systems are a form of security system whose main purpose is to protect assets and
personnel from theft, vandalism, or intrusion, as well as facilitate seamless user access and movement
around a building.
Additionally, they can also be used to limit access to overcrowded areas, trigger lockdowns in the event of
an emergency, or track and determine the location of individuals in the event of an evacuation.
How physical access control systems work
When an individual seeks entry into a secured physical space, they require authorization. They can seek
authorization by inputting their credentials into a portal like a fingerprint scanner or keypad, which then
sends the data to a control panel that authenticates the data, which then sends the data to the access
point to disengage a locking mechanism if the credentials are deemed valid.
The process can be broken down into several steps:
 Enrolment: the system administrator enrolls a new user into the system by capturing personal
information like names, fingerprints, or facial features, or assigning a password, etc.
 Authorization: Once enrolled, new users can be granted or denied access to particular physical
areas depending on their roles or level of clearance. Permissions can be adjusted on a need-by-need
basis by the system administrator.
 Authentication: An enrolled and authorized user presents or inputs their credentials at an access
point, and their credentials are checked against their access permissions, and permission is either
granted or denied.
 Access: if credentials pass the authentication test, a user is granted access to a secured area, and
vice versa.
 Management, monitoring, and auditing: system administrators can monitor and manage access for
authorized personnel as well as generate logs for auditing or filing.
Components of a physical access control system
1. Access Points: these are electronically controlled physical barriers or entry points that restrict
access to a space, like gates, doors, and turnstiles.
2. Access Control Software: It’s the software that powers the system. It allows system managers and
administrators to determine levels of access for individuals and monitor security events.
3. Credentials: these are the digital or physical items used to verify the identity of individuals seeking
access to physical spaces. They include;
o RFID cards, tags, and key fobs
o biometric credentials like face, iris, and fingerprint scans
o PIN codes and passwords
o Encrypted badges and tokens
o Mobile credentials, like apps
4. Readers and keypads: these are hardware devices that are used to scan or accept an individual’s
credentials and send the data to control panels to verify their status. They include fingerprint
scanners, face recognition terminals, and numeric keypads.
5. Control panels and controllers accept and process credential data input from readers, verify
identity, and transmit authorization data to the access point to grant or deny access, as well as
provide real-time reporting.
6. Locking mechanisms: These can include electromechanical or magnetic bolts, locks, and strikes that
engage and disengage the access points.
7. Request to exit devices: they automate disengagement of access control systems for individuals
seeking egress, e.g., exit buttons.
8. Access Control Servers: they can either be physical or virtual (cloud-based) systems and devices
that store user information like logs, access privileges, and user profiles.
Common types of physical access control systems
Depending on the unique needs of the business or building and other factors like complexity and
budgetary concerns, a few common types of access control systems are worth understanding in
order to determine which would best suit a particular application.
o Electronic keypads and locks: they include electric or magnetic locks that can require a
password, pin, fingerprint, or physical key for authentication and are usually used for
smaller, less complicated applications like single doors or small buildings.
o Key fob and card systems: they use digital credentials like cards and key fobs that can be
easily produced, distributed, and tracked and are commonly used for larger applications
where passwords, PINs, and physical keys may be impractical, like office blocks or hotels.
o Biometric access control systems use an individual’s unique biometric features like iris,
fingerprints, and facial features to authenticate identity. They’re generally more secure, as
biometric features are the hardest to manipulate or duplicate, particularly if multi-factor
authentication methods such as card and fingerprint scanning are employed.
o Mobile access control systems use mobile apps to grant or deny access. They can be
convenient as they eliminate the need for physical key cards or fobs and can even be used to
grant remote access.
o Touch-less access control systems: touch-less systems such as face recognition and mobile
apps are becoming popular as they can be convenient as well as hygienic while still providing
the same level of security as other physical systems.
Benefits of access control systems
A physical access control system, particularly for business applications, can offer several benefits,
including:
o Convenience: keycards and fobs make it easy for busy personnel to move around
unencumbered and without the inconvenience of manually operating entry and exit points,
e.g., in yards, factories, and busy offices.
o Greater user experience: apart from convenience, physical access control systems can help
provide a greater user experience by providing seamless, hassle-free movement of
personnel and customers, e.g., in hotels or large offices.
o Reduced costs: fewer security personnel, like security guards, would be needed to manually
control access to secure areas, thus reducing labour costs as only a fraction of security
personnel might be needed and they would only be stationed at the most critical access
points.
o Integration: Physical access control systems can also be integrated with other existing
security systems, such as security cameras and alarm systems, to provide a robust and
comprehensive security system.
o Improved compliance: critical installations like healthcare facilities, factories, financial
institutions, etc. often require standard security protocols and regulations adhered to as
industry standards. Physical access control systems are one of them.
o Improved security: they can help keep sensitive spaces and assets safe and secure by
preventing access by unauthorized personnel.
o Centralized management: system administrators can easily manage all the access points
from a central place, regardless of number, size, or even location.
o Enhanced data and privacy protection: securing areas with sensitive data like offices, server
rooms, and storage ensures unauthorized disclosure and dissemination of data are
prevented or at least mitigated.
o Flexibility and adaptability: they can be customized to suit a small, medium, or large and
complicated application, depending on the prevailing requirements. Other features, such as
remote access, can also be added or removed as the need arises.

More Related Content

What's hot

IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019
Tonex
 

What's hot (20)

Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Public key infrastructure
Public key infrastructurePublic key infrastructure
Public key infrastructure
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
Encryption and Decryption
Encryption and DecryptionEncryption and Decryption
Encryption and Decryption
 
Cybersecurity in an IoT and Mobile World
Cybersecurity in an IoT and Mobile WorldCybersecurity in an IoT and Mobile World
Cybersecurity in an IoT and Mobile World
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
CNIT 121: Computer Forensics Ch 1
CNIT 121: Computer Forensics Ch 1CNIT 121: Computer Forensics Ch 1
CNIT 121: Computer Forensics Ch 1
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
 
Reconnaissance & Scanning
Reconnaissance & ScanningReconnaissance & Scanning
Reconnaissance & Scanning
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019
 

Similar to PHYSICAL ACCESS CONTROL - AN UNDERSTANDING.pdf

Powerpoint Marketing Template
Powerpoint Marketing TemplatePowerpoint Marketing Template
Powerpoint Marketing Template
Mike Lee
 
Decision-Making Support in Biometric-Based Physical Access Control Systems
Decision-Making Support in Biometric-Based Physical Access Control SystemsDecision-Making Support in Biometric-Based Physical Access Control Systems
Decision-Making Support in Biometric-Based Physical Access Control Systems
SahithiKotha2
 
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingRemote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal Thing
Karen Oliver
 

Similar to PHYSICAL ACCESS CONTROL - AN UNDERSTANDING.pdf (20)

Phases of Building Access Control Systems Houston, TX
Phases of Building Access Control Systems Houston, TXPhases of Building Access Control Systems Houston, TX
Phases of Building Access Control Systems Houston, TX
 
Access Control System_ An Overview - Bahaa Abdul Hadi.pdf
Access Control System_ An Overview - Bahaa Abdul Hadi.pdfAccess Control System_ An Overview - Bahaa Abdul Hadi.pdf
Access Control System_ An Overview - Bahaa Abdul Hadi.pdf
 
What is door access control system.pdf
What is door access control system.pdfWhat is door access control system.pdf
What is door access control system.pdf
 
How Does Door Access Control System Work
How Does Door Access Control System WorkHow Does Door Access Control System Work
How Does Door Access Control System Work
 
BLE 1213 MUST (SESSION 2).pptx-Student learning Guide
BLE 1213 MUST (SESSION 2).pptx-Student learning GuideBLE 1213 MUST (SESSION 2).pptx-Student learning Guide
BLE 1213 MUST (SESSION 2).pptx-Student learning Guide
 
GSM SECURITY
GSM SECURITYGSM SECURITY
GSM SECURITY
 
Access control
Access controlAccess control
Access control
 
Building Access Control Systems And Its Phases.pdf
Building Access Control Systems And Its Phases.pdfBuilding Access Control Systems And Its Phases.pdf
Building Access Control Systems And Its Phases.pdf
 
Building Access Control Systems And Its Phases
Building Access Control Systems And Its PhasesBuilding Access Control Systems And Its Phases
Building Access Control Systems And Its Phases
 
Secure Your Business with Best Jersey Village Access Control System
Secure Your Business with Best Jersey Village Access Control SystemSecure Your Business with Best Jersey Village Access Control System
Secure Your Business with Best Jersey Village Access Control System
 
Beyond the Cards The Future of Security Systems and Access Control Systems in...
Beyond the Cards The Future of Security Systems and Access Control Systems in...Beyond the Cards The Future of Security Systems and Access Control Systems in...
Beyond the Cards The Future of Security Systems and Access Control Systems in...
 
Importance of Access Control Systems for Business Security.pdf
Importance of Access Control Systems for Business Security.pdfImportance of Access Control Systems for Business Security.pdf
Importance of Access Control Systems for Business Security.pdf
 
Building Access Control System And Its Phases (1).pptx
Building Access Control System And Its Phases (1).pptxBuilding Access Control System And Its Phases (1).pptx
Building Access Control System And Its Phases (1).pptx
 
Comprehensive Analysis of Contemporary Information Security Challenges
Comprehensive Analysis of Contemporary Information Security ChallengesComprehensive Analysis of Contemporary Information Security Challenges
Comprehensive Analysis of Contemporary Information Security Challenges
 
Significance of Quality Access Control System for Your Organization Safety
Significance of Quality Access Control System for Your Organization SafetySignificance of Quality Access Control System for Your Organization Safety
Significance of Quality Access Control System for Your Organization Safety
 
Powerpoint Marketing Template
Powerpoint Marketing TemplatePowerpoint Marketing Template
Powerpoint Marketing Template
 
Access-control-system
Access-control-systemAccess-control-system
Access-control-system
 
unit4.pptx
unit4.pptxunit4.pptx
unit4.pptx
 
Decision-Making Support in Biometric-Based Physical Access Control Systems
Decision-Making Support in Biometric-Based Physical Access Control SystemsDecision-Making Support in Biometric-Based Physical Access Control Systems
Decision-Making Support in Biometric-Based Physical Access Control Systems
 
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingRemote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal Thing
 

More from Boney Maundu Slim

More from Boney Maundu Slim (20)

DO SECURITY SIGNS DETER CRIMINALS AND CRIMINAL BEAHVIOUR.pdf
DO SECURITY SIGNS DETER CRIMINALS AND CRIMINAL BEAHVIOUR.pdfDO SECURITY SIGNS DETER CRIMINALS AND CRIMINAL BEAHVIOUR.pdf
DO SECURITY SIGNS DETER CRIMINALS AND CRIMINAL BEAHVIOUR.pdf
 
MESH WIFI NETWORK : An understanding of Mesh Networking
MESH WIFI NETWORK : An understanding of Mesh NetworkingMESH WIFI NETWORK : An understanding of Mesh Networking
MESH WIFI NETWORK : An understanding of Mesh Networking
 
MESH WIFI.pdf
MESH WIFI.pdfMESH WIFI.pdf
MESH WIFI.pdf
 
INCOGNITO MODE - IT'S NOT AS PRIVATE AS YOU THINK.pdf
INCOGNITO MODE - IT'S NOT AS PRIVATE AS YOU THINK.pdfINCOGNITO MODE - IT'S NOT AS PRIVATE AS YOU THINK.pdf
INCOGNITO MODE - IT'S NOT AS PRIVATE AS YOU THINK.pdf
 
WIFI CAMERA JAMMER.pdf
WIFI CAMERA JAMMER.pdfWIFI CAMERA JAMMER.pdf
WIFI CAMERA JAMMER.pdf
 
WI-FI EXTENDER VS WIRELESS ACCESS POINT.pdf
WI-FI EXTENDER VS WIRELESS ACCESS POINT.pdfWI-FI EXTENDER VS WIRELESS ACCESS POINT.pdf
WI-FI EXTENDER VS WIRELESS ACCESS POINT.pdf
 
SURVEILLANCE HARD DRIVE vs DESKTOP HARD DRIVE.pdf
SURVEILLANCE HARD DRIVE vs DESKTOP HARD DRIVE.pdfSURVEILLANCE HARD DRIVE vs DESKTOP HARD DRIVE.pdf
SURVEILLANCE HARD DRIVE vs DESKTOP HARD DRIVE.pdf
 
REGULAR CAR BATTERY VS DEEP CYCCLE BATTERY.pdf
REGULAR CAR BATTERY VS DEEP CYCCLE BATTERY.pdfREGULAR CAR BATTERY VS DEEP CYCCLE BATTERY.pdf
REGULAR CAR BATTERY VS DEEP CYCCLE BATTERY.pdf
 
CCTV SECURITY CAMERA SYSTEMS - Buyers guide & Best practices for business own...
CCTV SECURITY CAMERA SYSTEMS - Buyers guide & Best practices for business own...CCTV SECURITY CAMERA SYSTEMS - Buyers guide & Best practices for business own...
CCTV SECURITY CAMERA SYSTEMS - Buyers guide & Best practices for business own...
 
CELL SIGNAL - What Causes Poor Cellphone SIgnal.pdf
CELL SIGNAL - What Causes Poor Cellphone SIgnal.pdfCELL SIGNAL - What Causes Poor Cellphone SIgnal.pdf
CELL SIGNAL - What Causes Poor Cellphone SIgnal.pdf
 
PARALLEL VS SERIES BATTERY CONNECTION.pdf
PARALLEL VS SERIES BATTERY CONNECTION.pdfPARALLEL VS SERIES BATTERY CONNECTION.pdf
PARALLEL VS SERIES BATTERY CONNECTION.pdf
 
LAN CABLES - A comparative understanding of types of Cable for Local Area Ne...
LAN CABLES -  A comparative understanding of types of Cable for Local Area Ne...LAN CABLES -  A comparative understanding of types of Cable for Local Area Ne...
LAN CABLES - A comparative understanding of types of Cable for Local Area Ne...
 
The Evolution of Wi-Fi Standards - Boney Maundu.pdf
The Evolution of Wi-Fi Standards - Boney Maundu.pdfThe Evolution of Wi-Fi Standards - Boney Maundu.pdf
The Evolution of Wi-Fi Standards - Boney Maundu.pdf
 
Stand Alone Security Cameras - A Guide.pdf
Stand Alone Security Cameras - A Guide.pdfStand Alone Security Cameras - A Guide.pdf
Stand Alone Security Cameras - A Guide.pdf
 
2.4 GHz vs 5 GHz Wi-Fi.pdf
2.4 GHz vs 5 GHz Wi-Fi.pdf2.4 GHz vs 5 GHz Wi-Fi.pdf
2.4 GHz vs 5 GHz Wi-Fi.pdf
 
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfComputer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
 
Analog vs IP CCTV Security Systems: A Buyer's Guide
Analog vs IP CCTV Security Systems: A Buyer's GuideAnalog vs IP CCTV Security Systems: A Buyer's Guide
Analog vs IP CCTV Security Systems: A Buyer's Guide
 
Security Camera Systems - Buyers' guide and Best Practices for home owners.pdf
Security Camera Systems - Buyers' guide and Best Practices for home owners.pdfSecurity Camera Systems - Buyers' guide and Best Practices for home owners.pdf
Security Camera Systems - Buyers' guide and Best Practices for home owners.pdf
 
CCTV SECURITY CAMERA SYSTEMS - Buyers guide & Best practices for Business Own...
CCTV SECURITY CAMERA SYSTEMS - Buyers guide & Best practices for Business Own...CCTV SECURITY CAMERA SYSTEMS - Buyers guide & Best practices for Business Own...
CCTV SECURITY CAMERA SYSTEMS - Buyers guide & Best practices for Business Own...
 
Slim bz smart wifi camera
Slim bz   smart wifi cameraSlim bz   smart wifi camera
Slim bz smart wifi camera
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

PHYSICAL ACCESS CONTROL - AN UNDERSTANDING.pdf

  • 2. Physical Access Control Systems Physical Access Control Systems (PACS) are electronic systems that control entry and exit into physical spaces like buildings, rooms, or grounds by utilizing authentication and authorization features to grant or deny access. Access control systems are a form of security system whose main purpose is to protect assets and personnel from theft, vandalism, or intrusion, as well as facilitate seamless user access and movement around a building. Additionally, they can also be used to limit access to overcrowded areas, trigger lockdowns in the event of an emergency, or track and determine the location of individuals in the event of an evacuation. How physical access control systems work When an individual seeks entry into a secured physical space, they require authorization. They can seek authorization by inputting their credentials into a portal like a fingerprint scanner or keypad, which then sends the data to a control panel that authenticates the data, which then sends the data to the access point to disengage a locking mechanism if the credentials are deemed valid. The process can be broken down into several steps:  Enrolment: the system administrator enrolls a new user into the system by capturing personal information like names, fingerprints, or facial features, or assigning a password, etc.  Authorization: Once enrolled, new users can be granted or denied access to particular physical areas depending on their roles or level of clearance. Permissions can be adjusted on a need-by-need basis by the system administrator.  Authentication: An enrolled and authorized user presents or inputs their credentials at an access point, and their credentials are checked against their access permissions, and permission is either granted or denied.  Access: if credentials pass the authentication test, a user is granted access to a secured area, and vice versa.  Management, monitoring, and auditing: system administrators can monitor and manage access for authorized personnel as well as generate logs for auditing or filing.
  • 3. Components of a physical access control system 1. Access Points: these are electronically controlled physical barriers or entry points that restrict access to a space, like gates, doors, and turnstiles. 2. Access Control Software: It’s the software that powers the system. It allows system managers and administrators to determine levels of access for individuals and monitor security events. 3. Credentials: these are the digital or physical items used to verify the identity of individuals seeking access to physical spaces. They include; o RFID cards, tags, and key fobs o biometric credentials like face, iris, and fingerprint scans o PIN codes and passwords o Encrypted badges and tokens o Mobile credentials, like apps 4. Readers and keypads: these are hardware devices that are used to scan or accept an individual’s credentials and send the data to control panels to verify their status. They include fingerprint scanners, face recognition terminals, and numeric keypads. 5. Control panels and controllers accept and process credential data input from readers, verify identity, and transmit authorization data to the access point to grant or deny access, as well as provide real-time reporting. 6. Locking mechanisms: These can include electromechanical or magnetic bolts, locks, and strikes that engage and disengage the access points. 7. Request to exit devices: they automate disengagement of access control systems for individuals seeking egress, e.g., exit buttons. 8. Access Control Servers: they can either be physical or virtual (cloud-based) systems and devices that store user information like logs, access privileges, and user profiles. Common types of physical access control systems Depending on the unique needs of the business or building and other factors like complexity and budgetary concerns, a few common types of access control systems are worth understanding in order to determine which would best suit a particular application. o Electronic keypads and locks: they include electric or magnetic locks that can require a password, pin, fingerprint, or physical key for authentication and are usually used for smaller, less complicated applications like single doors or small buildings. o Key fob and card systems: they use digital credentials like cards and key fobs that can be easily produced, distributed, and tracked and are commonly used for larger applications where passwords, PINs, and physical keys may be impractical, like office blocks or hotels. o Biometric access control systems use an individual’s unique biometric features like iris, fingerprints, and facial features to authenticate identity. They’re generally more secure, as biometric features are the hardest to manipulate or duplicate, particularly if multi-factor authentication methods such as card and fingerprint scanning are employed. o Mobile access control systems use mobile apps to grant or deny access. They can be convenient as they eliminate the need for physical key cards or fobs and can even be used to grant remote access.
  • 4. o Touch-less access control systems: touch-less systems such as face recognition and mobile apps are becoming popular as they can be convenient as well as hygienic while still providing the same level of security as other physical systems. Benefits of access control systems A physical access control system, particularly for business applications, can offer several benefits, including: o Convenience: keycards and fobs make it easy for busy personnel to move around unencumbered and without the inconvenience of manually operating entry and exit points, e.g., in yards, factories, and busy offices. o Greater user experience: apart from convenience, physical access control systems can help provide a greater user experience by providing seamless, hassle-free movement of personnel and customers, e.g., in hotels or large offices. o Reduced costs: fewer security personnel, like security guards, would be needed to manually control access to secure areas, thus reducing labour costs as only a fraction of security personnel might be needed and they would only be stationed at the most critical access points. o Integration: Physical access control systems can also be integrated with other existing security systems, such as security cameras and alarm systems, to provide a robust and comprehensive security system. o Improved compliance: critical installations like healthcare facilities, factories, financial institutions, etc. often require standard security protocols and regulations adhered to as industry standards. Physical access control systems are one of them. o Improved security: they can help keep sensitive spaces and assets safe and secure by preventing access by unauthorized personnel. o Centralized management: system administrators can easily manage all the access points from a central place, regardless of number, size, or even location. o Enhanced data and privacy protection: securing areas with sensitive data like offices, server rooms, and storage ensures unauthorized disclosure and dissemination of data are prevented or at least mitigated. o Flexibility and adaptability: they can be customized to suit a small, medium, or large and complicated application, depending on the prevailing requirements. Other features, such as remote access, can also be added or removed as the need arises.