Successfully reported this slideshow.
Your SlideShare is downloading. ×

Access Control ppt.pptx

Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Loading in …3
×

Check these out next

1 of 36 Ad
Advertisement

More Related Content

Recently uploaded (20)

Advertisement

Access Control ppt.pptx

  1. 1. ACCESS CONTROL TECHNICAL TRAINING PRESENTATION AUGUST,2022
  2. 2. AGENDA • Introduction • Working principle of Access Control • Trends of Access Control System • Types Of Access Control System • Applications of Access Control System • Summary
  3. 3. o Access control systems are designed to protect systems from unauthorized access in order to preserve data integrity. o Access control system, also known as entrance exit control system. o Is the selective restriction of access to a place or other resource, while access management describes the process. o Permission to access a resource is called authorization. Introduction
  4. 4.  Access Control (AC) Who( Card,Face,Fingerprint,Password,QR code ) When( weekend ,workday …) Where( Maingate,Floor,Gym,Hotel…) Access control basics Access control protects against a wide variety of threats  Unauthorized access  Unapproved modification of data  Lack of data confidentiality Cont…
  5. 5. There are three types (factors) of authenticating information: •Something the user knows, e.g. a password, pass-phrase or PIN •Something the user has, such as smart card or a key fob. •Something the user is, such as fingerprint, verified by biometric measurement Cont…. Smart card Key fob Fingerprint
  6. 6.  The control panel receives the encrypted tag number from the reader, decodes the number, then compares the ID number to ID numbers already loaded onto the system. If the numbers match, and the user is authorized to access the door at that time, the door will unlock. This all happens in the matter of seconds. The Working Principle of Access Control System
  7. 7. ACS Architecture
  8. 8. Cont…
  9. 9. Cont….
  10. 10. Adopt@tech  combines power supply and door access control features in a compact casing for an encrypted and secure i/o function,enhancing door access control function and easing installation process. Built In Alarm  Allows installation of external alarm to your access system to alert you during emergencies and break-ins. Secure your premise with Group Time Zone and Group Verify functions. Emergency Break Glass  A quick means for a person who does not have access privileges to certain information to gain access when necessary. Descriptions of the above figure
  11. 11. Components of an access control system include:  Controller An access-controlled entry, such as a  Door Turnstile  Parking gate  Elevator, or other physical barrier A reader Locking hardware, such as Electric door strikes and Electromagnetic Locks A magnetic door switch for monitoring door position Components of an access control system
  12. 12. Controller Reader Electromagnetic locks Cont...
  13. 13. Basic (non-intelligent) readers •Simply read card number or PIN, and forward it to a control panel. •In case of biometric identification, such readers output the ID number of a user. •Wiegand Protocol is used for transmitting data to the control panel •Other options such as RS-232, RS-485 and Clock/Data are not uncommon. •This is the most popular type of access control readers. Types of readers RF Tiny ProxPoint by HID P300 by Farpointe Data.
  14. 14. • Have control door hardware (lock, door contact, exit button), • Do not make any access decisions. • When a user presents a card or enters a PIN, the reader sends information to the main controller, and waits for its response. • If the connection to the main controller is interrupted, such readers stop working, or function in a degraded mode. • Usually semi-intelligent readers are connected to a control panel via an RS-485 bus. Examples •InfoProx Lite IPL200 by CEM Systems •AP-510 by Apollo. Semi-intelligent readers
  15. 15. InfoProx Lite IPL200 AP-510 by Apollo Cont...
  16. 16. •They also have memory and processing power necessary to make access decisions independently. •Have all inputs and outputs necessary to control door hardware; •connected to a control panel via an RS-485 bus. •The control panel sends configuration updates, and retrieves events from the readers. Examples •InfoProx IPO200 by CEM Systems, and AP-500 by Apollo. •There is also a new generation of intelligent readers referred to as "IP readers". •Do not have traditional control panels, and readers communicate directly to a PC that acts as a host. Intelligent readers
  17. 17. Trends of Access Control System Mechanical lock and key,unsafe and not easy to manage IP based access control system,software management,more functions and easy to manage. New Technology:- Fingerprint,Face recognition,Iris recognition… Iris recognition
  18. 18. How to read card ? How to transmit card information ? How to identify permissions ? How to open the door ? Four Scenarios of Access Control System
  19. 19. RFID:Radio Frequency Identification Passive tags collect energy from a nearby RFID’s readers interrogating radio waves; Active tags have local power source such as battery. Battery-assisted passive How to read card ?
  20. 20. RS 485 interface How to transmit card information ?
  21. 21. Wiegand Interface
  22. 22. Types of Access Controls • Generally, there are three types of Access Controls: – Administrative controls • Define roles, responsibilities, policies, and administrative functions to manage the control environment. – Technical controls • Use hardware and software technology to implement access control. – Physical controls • Ensure safety and security of the physical environment.
  23. 23. Examples of Administrative Controls are: •Policies. •Procedures. •Hiring practices. •Background checks. •Data classification. •Security training. •Reviews Administrative Controls
  24. 24. Technical Controls Examples of Technical Controls are: – Encryption – Biometrics – Smart cards – Tokens – Access control lists – Violation reports – Audit trails – Network monitoring intrusion detection
  25. 25. Physical Controls Examples of Physical Controls are: – HVAC – Fences, locked doors, and restricted areas – Guards and dogs – Motion detectors – Video cameras – Fire detectors – Smoke detectors
  26. 26. Categories of Access Controls • Preventive :- Avoid incident • Deterrent :- Discourage incident • Detective :- Identify incident • Corrective:- Remedy circumstance/mitigate damage and restore controls • Recovery :- Restore conditions to normal • Compensating :-Alternative control Cont…
  27. 27. Types of Access Controls There are three types of Access Controls interms of their management:  Discretionary Access Control (DAC)  Managed/Mandatory Access Control (MAC)  Role-Based Access Control (RBAC)
  28. 28. Discretionary Access Control (DAC)  Extremely flexible and nonrestrictive. This is because access rights are specified by users. The owner of a company can decide who has access to the office space.  A manager can decide who has access to specific meeting rooms. Individual end-users have complete control over the buildings they own.
  29. 29. Managed/Mandatory Access Control (MAC) Managed access control is the complete opposite of DAC. It allows the end-user zero control over their access to a facility.  Only the system administrators have the power to permit or deny access. They also cannot determine specific areas to allow certain people access to it. This is a very strict system that is generally used for governmental facilities and military bases.
  30. 30. Role-Based Access Control (RBAC)  Role-based access control is the most sought-after solution on the market today.  RBAC combines the best traits that DAC and MAC have to offer.  The owner or system administrator assigns access based on the key holder’s role in the organizations.  Access privileges are therefore based on job titles and employment status.  Managers will have full building access.
  31. 31. How to compare access control systems 1. Local vs. Cloud 2. Network Requirements 3. Security 4. Easy to Manage and Use 5. Scalable 6. Future-Proof 7. Cost
  32. 32. The Common important errors in the installation of access control systems 1.Use the network cable to connect the electric lock and access controller. 2.The power load is too large to load.The main performance is that there are too many electric locks were connected 3.RS 485 lines do not use twisted pair, or use low-end passive converter.
  33. 33. Hotels Office building Shopping mall Factory Other industry building Bank Hospital Train station Access Control Applications
  34. 34. Access Control Advantages The most significant benefits of access control systems are: •Increase ease of access for employees. •Get rid of traditional keys. •Save money and energy. •Keep track of who comes and goes. •Protect against unwanted visitors. •Give employees the freedom to work when they need to. •Prevent against data breaches. Cont...
  35. 35. Access control is a fundamental component of data security that dictates who’s allowed to access and use company information and resources. Through authentication and authorization, access control policies make sure users are who they say they are and that they have appropriate access to company data. Access control can also be applied to limit physical access to campuses, buildings, rooms, and datacenters. Summary
  36. 36. “ For your ICT solution “

×