SlideShare a Scribd company logo
Access Control System
2018
Techera Endeavour Pvt Ltd
www.techerasolutions.com Contact No. +91 7021303434
Access control systems are the electronic systems that are designed to control access authorization through a network. Access
Control System recognizes authenticates and authorizes entry of a person to enter into the premise thereby giving complete
protection ensuring security of the premises.
Many ACS use network for communication purpose and information is communicated through these networks .ACS helps to
connect multiple facility across globe for giving ease of access and security control from single location.
Organizations which require high security use different credential systems and one or more credential combinations like bio
metric, RFID, door controllers and card readers etc. Each access point may be controlled individually as per the requirement of an
organizations.
Mainly access control system is divided in two categories
1. External ACS and 2. Internal ACS
Both categories of ACS are specific to nature of premises,
deployment of internal and external ACS mostly depends
upon nature of building and geographic region threat level
rating and also upon type of usage.
What Is Access Control System ?
Some of the reason for access control system deployment in your premises
Security : Provide 24 x 7 electronic security irrespective of your premises is open or closed
Environment : Many advantage of well deployed and managed ACS
• Occupancy and load pattern to increase efficiency
• Control of lighting and cooling based on occupancy
• Reduce wastage by control of printers
Health & Safety : Controlled access to area based on work profile can assist in compliance with health & safety
• Limit access to area having hazardous substances
• Restrict access to under construction and contaminated area as per safety point.
IT : Integrate with access for single point of control
• Command and control center for multiple office location
• Control single sign on access based upon user location
HR & Time and Attendance :
• Improve punctuality and reduce unscheduled breaks
• Increase efficiency by removing manual time sheets
Reason For Access Control System Deployment
Access control systems are graded according to the type of business and risk associated, grades applied to protected
area and not to the overall system therefore mixed grades may be utilised within premises.
Access point grading are mainly classified into four grades
Grade1 : Low Risk
• Standalone lock or offline system ,internal area where you want to restrict public movement
Grade 2 : Low to Medium Risk
• On-line system, commercial building and small business offices
Grade 3 : Medium to High Risk
• On line system using two factor authentication or single factor biometric to prevent access
Grade 4 : High Risk
• On line system using two factor authentication, one of which should be biometric
Security Grading System Risk Classifications
• Anti Passback : A feature that traces individual credential access requests to a given area. It checks for granting of
access not preceded by granting of egress (or vice versa) to check that the credential has not been “passed back”
to another user. Also refer to hard anti - passback, soft anti - passback, logical anti - passback and timed anti-
passback.
• Soft Anti - Passback : Grants access but generates alert for violation of anti-passback rule
• Authentication : A system compare credentials of user with recorded credential for access.
• Anti Loiter : A feature that monitors path of the user through a security controlled area and produce path graphical
representation
• Card Blocked : Removal of access permission for a particular credential
• Degrade Mode : In case of an failure of main controller field controller will work independently.
• Door Opened Too Long : Alarm for door opened for more than defined time after access to user
• Door Forced : Unauthorized opening of an door
• Dual Access : For highly secured and unmanned area 2 sequential authorize request is required for access
• Fail locked : Securing of an locking mechanism in case of power failure
• Fail Open : Release of locking mechanism in case of access system failure / power failure
• Free Access : A condition in which door is allowed to be open without any credential (ex. Emergency Evacuation)
• Tailgating : A person passes with a person carrying credential
• Tamper Detection : Detecting unauthorized interference
• Tamper Protection : Protection against deliberate interference
Access Control System Features To Look For
Number of components used from identification of an person to authorise access.
Credentials :
• PIN/Code Based access :
PIN/Codes are nothing but an numeric digits having 4,5 or 6 characters for access.
• Swipe/Token :
Cards are used with magnetic strip on reader for access, not fully secured and cards to be changed regularly.
• Proximity Cards :
Cards having small chip inside for storing details, used for short distance authentication for access, more secured than swipe
cards and less wear and tear de to contactless.
• RFID Cards :
Contact less technology having space which is used for multiple application from 1 card
• Mobile Device :
NFC and Bluetooth enabled mobile and reader can exchange data for communication which results into authentication for
providing access.
Types Of Credentials Used In ACS
Number of components used from identification of an person to authorise access.
Credentials : Biometrics
Biometric Verification : This is called as 1:1 comparison by providing PIN, it takes less time since comparison path is defined.
Biometric Identification : This technology works on comparing 1:N template and takes time depending upon number of stored
templates
Available Biometric Technology
• Finger Print
• Facial Recognition
• IRIS
• Retina
• Hand Geometry
• Vein Recognition
• Voice
Types Of Credentials Used In ACS
Access Control Reader & Controller
Readers are classified according to functions they perform.
Standalone Reader + Keypads : Used for small application involving 1 to 5 doors and decision taken independently.
Standalone Reader + Controller : Standalone reader with controller functionality for single independent door, suitable for
application ranging from 1 to 10 doors.
Online Reader : For online reader access decision is taken by an computer connected to an specific reader for granting
access.
Offline Reader : In this scenario cards hold the database for access and there is no controller or computer is involved for
decision making.
Reader & Controller : This kind of system used for reader more than 10 Nos and number of controllers connected to a
common software for analysis and reporting this is commonly used for medium to large office scenario.
IP Controller : Connected to ACS software via network switch, combination can be ranged from 2/4/8 doors controller
Non IP Controller : Also know as Master-Slave controller configuration, master controller is connected to an ACS software
Controller is nothing but a gateway between reader and software for decision making. Controller is connected to PC having
ACS software, alarm events and other information is exchanged between controller connected to an common network through
a common software. Controller can worked in offline mode as of when system is down and transaction can be recorder and
synced back when system is up.
Access cards are access key to your premises, by using access control cards you can access granted access as per
your nature of work within premises. Access cards are very useful to an security officer where he can defined user
specific door access to keep security check all time and also trace path of usage by an user.
Two types of card technology is available.
1. Prox Cards : Proximity cards comes in wide range of styles
A. Standard Prox Card
B. Composite Prox Card
C. Clamshell Prox Card
D. Magnetic Strip Card
E. Prox Cards Adhesive Tags
F. Corporate 1000
G. Prox Card Key Fobs
H. Prox Cards for Printing
2. Smart Cards : One difference between smart card and prox card,smart can read and write data which allows them
to use for wider range of applications.
A. iCLASS Cards
B. MIFARE Cards
About ACS Cards Technology
Web based access control system is an enterprise grade software which controls and manages entire system from any where in
the world and at any time earlier ACS software were mainly used for reporting and time and attendance but now many
functionality can be taken on ACS software for ease of employee and service management.
Key Features Of Access Control Software
• Real Time Monitoring and control of doors from single window
• Web based software for live connectivity and door status
• User profile creation from any location on connected platform
• Ease of enrolment from USB based enrolment station
• Device configuration for any addition of hardware in network
• Export and import data from 3rd part software
• Seamless integration using API platform
• Auto device authentication
• Scalability of users and addition of application modules.
• Easy backup and restore functionality.
ACS Software – Web Based
Multilocation access control system where below 4 location across the globe is connected on a common WAN and
server placed at any location can manage complete ACS operation.
Multi-Location ACS
Lan Point Controller
Reader
Mumbai Office
Delhi Office
US Office
UK Office
ACS Server Any Location
Elevator access control is mainly used for premises where controlled access is to be provided. Deployed access
control should be user friendly and flexible and also easily integrated with conventional elevators and destination
control systems.
Features offered from Elevator Access control system.
Scalability : System should be scalable to any number of floors and multiple buildings with highspeed.
Integration Capability : System should support any credentials and also available lift brands
Reports & Dashboards : Should provide real time reports and dashboards for lift usage optimisation.
Visitor Management : Capability for integration with visitor management software to provide defined access.
Floor Access : Based on user nature of work in premises floor access will be provided and also some floors like
ground floor will be defined as a free access floor
Time Access : Specific time interval access can be provided to technician for work and even for courier person
Elevator Access Control System
Long range reader is used for parking management and asset tracking system where high range is required to
establish communication between reader and tags.
Features available with long range reader.
• Read range upto 12 meters
• IP 65 for indoor and outdoor use
• Wiegand 26bit for reader compatibility
• Cable length upto 150 meters
• Reader LED used for operational indication
Long range reader is also useful in transport management, car parking and production process.
Long Range Reader For Vehicle Access
Thanks
www.techerasolutions.com Contact No. +91 7021303434

More Related Content

What's hot

An overview of access control
An overview of access controlAn overview of access control
An overview of access control
Elimity
 
Building management-system power point
Building management-system power pointBuilding management-system power point
Building management-system power point
azharbang
 
Ch07 Access Control Fundamentals
Ch07 Access Control FundamentalsCh07 Access Control Fundamentals
Ch07 Access Control Fundamentals
Information Technology
 
Fire Protection Systems Unit-I
Fire Protection Systems Unit-IFire Protection Systems Unit-I
Fire Protection Systems Unit-I
GAURAV. H .TANDON
 
fire detection and alarm system
fire detection and alarm systemfire detection and alarm system
fire detection and alarm system
singh1515
 
Access control basics-2
Access control basics-2Access control basics-2
Access control basics-2
grantlerc
 
Physical security
Physical securityPhysical security
Physical security
Dhani Ahmad
 
8 Access Control
8 Access Control8 Access Control
8 Access Control
Alfred Ouyang
 
Intro to basic fire alarm technology
Intro to basic fire alarm technologyIntro to basic fire alarm technology
Intro to basic fire alarm technology
Arman Nasar
 
7. physical sec
7. physical sec7. physical sec
7. physical sec
7wounders
 
Fire Alarm System, BMS
Fire Alarm System, BMSFire Alarm System, BMS
Fire Alarm System, BMS
Mohammad Azam Khan
 
The Use Of ELV Systems In Building Security
The Use Of ELV Systems In Building SecurityThe Use Of ELV Systems In Building Security
The Use Of ELV Systems In Building Security
Patten John
 
Building Management System BMS Introduction
Building Management System BMS  IntroductionBuilding Management System BMS  Introduction
Building Management System BMS Introduction
GAUTAM KOPPALA (JORGE)
 
Fundamental training on Fire Detection & Alarm System
Fundamental training on Fire Detection & Alarm SystemFundamental training on Fire Detection & Alarm System
Fundamental training on Fire Detection & Alarm System
Sabrul Jamil
 
Information Security Principles - Access Control
Information Security  Principles -  Access ControlInformation Security  Principles -  Access Control
Information Security Principles - Access Control
idingolay
 
Perimeter security systems
Perimeter security systemsPerimeter security systems
Perimeter security systems
Roundabout Technologies
 
Fire alarm systems
Fire alarm systemsFire alarm systems
Fire alarm systems
Mahmoud Abd Elrahman
 
Fire alarm system and common types of detectors
Fire alarm system and common types of detectorsFire alarm system and common types of detectors
Fire alarm system and common types of detectors
Muhammad Farid
 
Perimeter security solutions
Perimeter security solutionsPerimeter security solutions
Perimeter security solutions
bappyni
 
Home security
Home securityHome security
Home security
newaz30
 

What's hot (20)

An overview of access control
An overview of access controlAn overview of access control
An overview of access control
 
Building management-system power point
Building management-system power pointBuilding management-system power point
Building management-system power point
 
Ch07 Access Control Fundamentals
Ch07 Access Control FundamentalsCh07 Access Control Fundamentals
Ch07 Access Control Fundamentals
 
Fire Protection Systems Unit-I
Fire Protection Systems Unit-IFire Protection Systems Unit-I
Fire Protection Systems Unit-I
 
fire detection and alarm system
fire detection and alarm systemfire detection and alarm system
fire detection and alarm system
 
Access control basics-2
Access control basics-2Access control basics-2
Access control basics-2
 
Physical security
Physical securityPhysical security
Physical security
 
8 Access Control
8 Access Control8 Access Control
8 Access Control
 
Intro to basic fire alarm technology
Intro to basic fire alarm technologyIntro to basic fire alarm technology
Intro to basic fire alarm technology
 
7. physical sec
7. physical sec7. physical sec
7. physical sec
 
Fire Alarm System, BMS
Fire Alarm System, BMSFire Alarm System, BMS
Fire Alarm System, BMS
 
The Use Of ELV Systems In Building Security
The Use Of ELV Systems In Building SecurityThe Use Of ELV Systems In Building Security
The Use Of ELV Systems In Building Security
 
Building Management System BMS Introduction
Building Management System BMS  IntroductionBuilding Management System BMS  Introduction
Building Management System BMS Introduction
 
Fundamental training on Fire Detection & Alarm System
Fundamental training on Fire Detection & Alarm SystemFundamental training on Fire Detection & Alarm System
Fundamental training on Fire Detection & Alarm System
 
Information Security Principles - Access Control
Information Security  Principles -  Access ControlInformation Security  Principles -  Access Control
Information Security Principles - Access Control
 
Perimeter security systems
Perimeter security systemsPerimeter security systems
Perimeter security systems
 
Fire alarm systems
Fire alarm systemsFire alarm systems
Fire alarm systems
 
Fire alarm system and common types of detectors
Fire alarm system and common types of detectorsFire alarm system and common types of detectors
Fire alarm system and common types of detectors
 
Perimeter security solutions
Perimeter security solutionsPerimeter security solutions
Perimeter security solutions
 
Home security
Home securityHome security
Home security
 

Similar to Access-control-system

EMKA-Biometric Presentation
EMKA-Biometric PresentationEMKA-Biometric Presentation
EMKA-Biometric Presentation
Darrell Smith
 
Powerpoint Marketing Template
Powerpoint Marketing TemplatePowerpoint Marketing Template
Powerpoint Marketing Template
Mike Lee
 
Access control system
Access control systemAccess control system
Access control system
Matrix COSEC
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
Micro Focus
 
Alliance Compant Presentation
Alliance Compant PresentationAlliance Compant Presentation
Alliance Compant Presentation
Alliance Tech Solution Pvt Ltd
 
Matrix Security Solutions: COSEC - Access Control and Time-Attendance
Matrix Security Solutions: COSEC - Access Control and Time-AttendanceMatrix Security Solutions: COSEC - Access Control and Time-Attendance
Matrix Security Solutions: COSEC - Access Control and Time-Attendance
Matrix Comsec
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
Micro Focus
 
Significance of Quality Access Control System for Your Organization Safety
Significance of Quality Access Control System for Your Organization SafetySignificance of Quality Access Control System for Your Organization Safety
Significance of Quality Access Control System for Your Organization Safety
Nexlar Security
 
Beyond the Cards The Future of Security Systems and Access Control Systems in...
Beyond the Cards The Future of Security Systems and Access Control Systems in...Beyond the Cards The Future of Security Systems and Access Control Systems in...
Beyond the Cards The Future of Security Systems and Access Control Systems in...
Brihaspathi Technologies Pvt. Ltd.
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
Precisely
 
OT Solution Overview.pptx
OT Solution Overview.pptxOT Solution Overview.pptx
OT Solution Overview.pptx
Alejandro Daricz
 
Datasheet over privileged_users
Datasheet over privileged_usersDatasheet over privileged_users
Datasheet over privileged_users
Cristian Garcia G.
 
Computer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOVComputer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOV
Eric Vanderburg
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
Anne Starr
 
Network and web security
Network and web securityNetwork and web security
Network and web security
Nitesh Saitwal
 
finger print based door lock.pptx
finger print based door lock.pptxfinger print based door lock.pptx
finger print based door lock.pptx
Pooja541216
 
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & ComplianceCortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
MSAdvAnalytics
 
Datasheet app vulnerability_assess
Datasheet app vulnerability_assessDatasheet app vulnerability_assess
Datasheet app vulnerability_assess
Birodh Rijal
 
protegegx-brochure-ict-access-control- system
protegegx-brochure-ict-access-control- systemprotegegx-brochure-ict-access-control- system
protegegx-brochure-ict-access-control- system
NikolaSecuriton
 
Seucrity in a nutshell
Seucrity in a nutshellSeucrity in a nutshell
Seucrity in a nutshell
Yahia Kandeel
 

Similar to Access-control-system (20)

EMKA-Biometric Presentation
EMKA-Biometric PresentationEMKA-Biometric Presentation
EMKA-Biometric Presentation
 
Powerpoint Marketing Template
Powerpoint Marketing TemplatePowerpoint Marketing Template
Powerpoint Marketing Template
 
Access control system
Access control systemAccess control system
Access control system
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
 
Alliance Compant Presentation
Alliance Compant PresentationAlliance Compant Presentation
Alliance Compant Presentation
 
Matrix Security Solutions: COSEC - Access Control and Time-Attendance
Matrix Security Solutions: COSEC - Access Control and Time-AttendanceMatrix Security Solutions: COSEC - Access Control and Time-Attendance
Matrix Security Solutions: COSEC - Access Control and Time-Attendance
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
 
Significance of Quality Access Control System for Your Organization Safety
Significance of Quality Access Control System for Your Organization SafetySignificance of Quality Access Control System for Your Organization Safety
Significance of Quality Access Control System for Your Organization Safety
 
Beyond the Cards The Future of Security Systems and Access Control Systems in...
Beyond the Cards The Future of Security Systems and Access Control Systems in...Beyond the Cards The Future of Security Systems and Access Control Systems in...
Beyond the Cards The Future of Security Systems and Access Control Systems in...
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
OT Solution Overview.pptx
OT Solution Overview.pptxOT Solution Overview.pptx
OT Solution Overview.pptx
 
Datasheet over privileged_users
Datasheet over privileged_usersDatasheet over privileged_users
Datasheet over privileged_users
 
Computer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOVComputer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOV
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
 
Network and web security
Network and web securityNetwork and web security
Network and web security
 
finger print based door lock.pptx
finger print based door lock.pptxfinger print based door lock.pptx
finger print based door lock.pptx
 
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & ComplianceCortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
 
Datasheet app vulnerability_assess
Datasheet app vulnerability_assessDatasheet app vulnerability_assess
Datasheet app vulnerability_assess
 
protegegx-brochure-ict-access-control- system
protegegx-brochure-ict-access-control- systemprotegegx-brochure-ict-access-control- system
protegegx-brochure-ict-access-control- system
 
Seucrity in a nutshell
Seucrity in a nutshellSeucrity in a nutshell
Seucrity in a nutshell
 

Recently uploaded

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 

Recently uploaded (20)

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 

Access-control-system

  • 1. Access Control System 2018 Techera Endeavour Pvt Ltd www.techerasolutions.com Contact No. +91 7021303434
  • 2. Access control systems are the electronic systems that are designed to control access authorization through a network. Access Control System recognizes authenticates and authorizes entry of a person to enter into the premise thereby giving complete protection ensuring security of the premises. Many ACS use network for communication purpose and information is communicated through these networks .ACS helps to connect multiple facility across globe for giving ease of access and security control from single location. Organizations which require high security use different credential systems and one or more credential combinations like bio metric, RFID, door controllers and card readers etc. Each access point may be controlled individually as per the requirement of an organizations. Mainly access control system is divided in two categories 1. External ACS and 2. Internal ACS Both categories of ACS are specific to nature of premises, deployment of internal and external ACS mostly depends upon nature of building and geographic region threat level rating and also upon type of usage. What Is Access Control System ?
  • 3. Some of the reason for access control system deployment in your premises Security : Provide 24 x 7 electronic security irrespective of your premises is open or closed Environment : Many advantage of well deployed and managed ACS • Occupancy and load pattern to increase efficiency • Control of lighting and cooling based on occupancy • Reduce wastage by control of printers Health & Safety : Controlled access to area based on work profile can assist in compliance with health & safety • Limit access to area having hazardous substances • Restrict access to under construction and contaminated area as per safety point. IT : Integrate with access for single point of control • Command and control center for multiple office location • Control single sign on access based upon user location HR & Time and Attendance : • Improve punctuality and reduce unscheduled breaks • Increase efficiency by removing manual time sheets Reason For Access Control System Deployment
  • 4. Access control systems are graded according to the type of business and risk associated, grades applied to protected area and not to the overall system therefore mixed grades may be utilised within premises. Access point grading are mainly classified into four grades Grade1 : Low Risk • Standalone lock or offline system ,internal area where you want to restrict public movement Grade 2 : Low to Medium Risk • On-line system, commercial building and small business offices Grade 3 : Medium to High Risk • On line system using two factor authentication or single factor biometric to prevent access Grade 4 : High Risk • On line system using two factor authentication, one of which should be biometric Security Grading System Risk Classifications
  • 5. • Anti Passback : A feature that traces individual credential access requests to a given area. It checks for granting of access not preceded by granting of egress (or vice versa) to check that the credential has not been “passed back” to another user. Also refer to hard anti - passback, soft anti - passback, logical anti - passback and timed anti- passback. • Soft Anti - Passback : Grants access but generates alert for violation of anti-passback rule • Authentication : A system compare credentials of user with recorded credential for access. • Anti Loiter : A feature that monitors path of the user through a security controlled area and produce path graphical representation • Card Blocked : Removal of access permission for a particular credential • Degrade Mode : In case of an failure of main controller field controller will work independently. • Door Opened Too Long : Alarm for door opened for more than defined time after access to user • Door Forced : Unauthorized opening of an door • Dual Access : For highly secured and unmanned area 2 sequential authorize request is required for access • Fail locked : Securing of an locking mechanism in case of power failure • Fail Open : Release of locking mechanism in case of access system failure / power failure • Free Access : A condition in which door is allowed to be open without any credential (ex. Emergency Evacuation) • Tailgating : A person passes with a person carrying credential • Tamper Detection : Detecting unauthorized interference • Tamper Protection : Protection against deliberate interference Access Control System Features To Look For
  • 6. Number of components used from identification of an person to authorise access. Credentials : • PIN/Code Based access : PIN/Codes are nothing but an numeric digits having 4,5 or 6 characters for access. • Swipe/Token : Cards are used with magnetic strip on reader for access, not fully secured and cards to be changed regularly. • Proximity Cards : Cards having small chip inside for storing details, used for short distance authentication for access, more secured than swipe cards and less wear and tear de to contactless. • RFID Cards : Contact less technology having space which is used for multiple application from 1 card • Mobile Device : NFC and Bluetooth enabled mobile and reader can exchange data for communication which results into authentication for providing access. Types Of Credentials Used In ACS
  • 7. Number of components used from identification of an person to authorise access. Credentials : Biometrics Biometric Verification : This is called as 1:1 comparison by providing PIN, it takes less time since comparison path is defined. Biometric Identification : This technology works on comparing 1:N template and takes time depending upon number of stored templates Available Biometric Technology • Finger Print • Facial Recognition • IRIS • Retina • Hand Geometry • Vein Recognition • Voice Types Of Credentials Used In ACS
  • 8. Access Control Reader & Controller Readers are classified according to functions they perform. Standalone Reader + Keypads : Used for small application involving 1 to 5 doors and decision taken independently. Standalone Reader + Controller : Standalone reader with controller functionality for single independent door, suitable for application ranging from 1 to 10 doors. Online Reader : For online reader access decision is taken by an computer connected to an specific reader for granting access. Offline Reader : In this scenario cards hold the database for access and there is no controller or computer is involved for decision making. Reader & Controller : This kind of system used for reader more than 10 Nos and number of controllers connected to a common software for analysis and reporting this is commonly used for medium to large office scenario. IP Controller : Connected to ACS software via network switch, combination can be ranged from 2/4/8 doors controller Non IP Controller : Also know as Master-Slave controller configuration, master controller is connected to an ACS software Controller is nothing but a gateway between reader and software for decision making. Controller is connected to PC having ACS software, alarm events and other information is exchanged between controller connected to an common network through a common software. Controller can worked in offline mode as of when system is down and transaction can be recorder and synced back when system is up.
  • 9. Access cards are access key to your premises, by using access control cards you can access granted access as per your nature of work within premises. Access cards are very useful to an security officer where he can defined user specific door access to keep security check all time and also trace path of usage by an user. Two types of card technology is available. 1. Prox Cards : Proximity cards comes in wide range of styles A. Standard Prox Card B. Composite Prox Card C. Clamshell Prox Card D. Magnetic Strip Card E. Prox Cards Adhesive Tags F. Corporate 1000 G. Prox Card Key Fobs H. Prox Cards for Printing 2. Smart Cards : One difference between smart card and prox card,smart can read and write data which allows them to use for wider range of applications. A. iCLASS Cards B. MIFARE Cards About ACS Cards Technology
  • 10. Web based access control system is an enterprise grade software which controls and manages entire system from any where in the world and at any time earlier ACS software were mainly used for reporting and time and attendance but now many functionality can be taken on ACS software for ease of employee and service management. Key Features Of Access Control Software • Real Time Monitoring and control of doors from single window • Web based software for live connectivity and door status • User profile creation from any location on connected platform • Ease of enrolment from USB based enrolment station • Device configuration for any addition of hardware in network • Export and import data from 3rd part software • Seamless integration using API platform • Auto device authentication • Scalability of users and addition of application modules. • Easy backup and restore functionality. ACS Software – Web Based
  • 11. Multilocation access control system where below 4 location across the globe is connected on a common WAN and server placed at any location can manage complete ACS operation. Multi-Location ACS Lan Point Controller Reader Mumbai Office Delhi Office US Office UK Office ACS Server Any Location
  • 12. Elevator access control is mainly used for premises where controlled access is to be provided. Deployed access control should be user friendly and flexible and also easily integrated with conventional elevators and destination control systems. Features offered from Elevator Access control system. Scalability : System should be scalable to any number of floors and multiple buildings with highspeed. Integration Capability : System should support any credentials and also available lift brands Reports & Dashboards : Should provide real time reports and dashboards for lift usage optimisation. Visitor Management : Capability for integration with visitor management software to provide defined access. Floor Access : Based on user nature of work in premises floor access will be provided and also some floors like ground floor will be defined as a free access floor Time Access : Specific time interval access can be provided to technician for work and even for courier person Elevator Access Control System
  • 13. Long range reader is used for parking management and asset tracking system where high range is required to establish communication between reader and tags. Features available with long range reader. • Read range upto 12 meters • IP 65 for indoor and outdoor use • Wiegand 26bit for reader compatibility • Cable length upto 150 meters • Reader LED used for operational indication Long range reader is also useful in transport management, car parking and production process. Long Range Reader For Vehicle Access