SlideShare a Scribd company logo
1 of 37
1
2
Access Control
2
Facility Access Control Systems
RECAP-ULANGKAJI
1. Principles in Physical Security
The principles underlying Physical Security Management are
designed to create a comprehensive and layered approach to
protect against unauthorized access, theft, damage, and other
potential harms. Here are the key principles:
 Deterrence
 Detection
 Delay
 Response & Intervention
3
Defence-in-Depth
Defence in depth is about building multiple layers
of security that will protect the organization better
than one single layer.
https://www.youtube.com/watch?v=j9MQMVn3FV4&t=86s&ab_channel=TomOlzak
4
Pertahanan secara mendalam adalah tentang membina
berbilang lapisan keselamatan yang akan melindungi
organisasi lebih baik daripada satu lapisan tunggal.
Defence-in-Depth
5
Pertahanan
Berlapis
6
Video clip: Layered Security
7
8
Contrary to PSTN, an IP PBX (Internet Protocol
Private Branch Exchange) system is a
telecommunication system that uses IP data
networks (like the internet) to manage and route
voice and video calls, in addition to other forms
of communication such as instant messaging and
A smart building, also
known as an intelligent
building or a smart
facility, is a structure that
uses advanced
technology and
integrated systems to
enhance the building's
overall functionality,
efficiency, security, and
sustainability.
The purpose of a CCTV
(Closed-Circuit Television)
system is to capture, record,
and monitor video footage in a
designated area for various
purposes such as security and
crime deterrence, surveillance,
visitor control etc ….
A Visitor
Management
System (VMS)
serves as a
comprehensive
solution to manage
and track visitors,
guests, and
personnel entering
a facility or
premises.
A security control room, often referred to
as a security operations center (SOC) or
command center, is a centralized facility
equipped with technology and staffed by
security personnel responsible for
monitoring, managing, and responding to
security-related events and incidents
within an organization or a specific area.
Access control refers to
the practice of regulating
and managing who has
permission to access
specific resources,
assets, areas, or
information within an
organization or physical
space.
Motion sensors,
also known as
motion detectors,
serve the primary
purpose of
detecting physical
movement or
motion within a
defined area.
A fire alarm system is a network of interconnected
devices and components designed to detect, notify,
and respond to the presence of a fire or smoke in a
building or area. The primary purpose of a fire alarm
system is to protect life and property by providing
early warning of a fire, allowing occupants to
evacuate safely and alerting emergency responders to
Parking zones inside facilities are
often equipped with security
features such as surveillance
cameras, adequate lighting, and
controlled access points. This
enhances the safety and security
of vehicles and their occupants,
reducing the risk of theft,
vandalism, and other security
concerns.
9
Access Control Systems
 Mechanical Locks and Keys
 Electronic Card Access Control
 Keypad Access Control
 Biometric Access Control
 Access Control Tokens
 Mobile Access Control
 Intercom Systems
 Turnstiles and Speed Gates
 Vehicle Access Control
 Wireless Access Control
 Cloud-Based Access Control
 Integrated Access Control
 Visitor Management System
10
Access control is the art and science
of regulating who can enter a specific
area, building, or facility and under
what conditions. It's the guardian at
the gate, ensuring that only
authorized individuals gain entry,
while keeping potential threats at bay.
In an era where security concerns are
ever-evolving, understanding the core
concepts of access control is not only
essential but also a cornerstone in
building a secure environment.
11
Kawalan akses ialah seni dan sains
mengawal selia orang yang boleh
memasuki kawasan, bangunan atau
kemudahan tertentu dan dalam keadaan
apa. Ia adalah penjaga di pintu pagar,
memastikan bahawa hanya individu yang
diberi kuasa boleh masuk, sambil
mengekalkan potensi ancaman.
Dalam era di mana kebimbangan
keselamatan sentiasa berkembang,
memahami konsep teras kawalan akses
bukan sahaja penting tetapi juga asas
dalam membina persekitaran yang
selamat.
12
Access control systems in physical security
encompass various methods and technologies to
regulate entry to a physical space. These systems can
be categorized into several types, including:
1.Mechanical Locks and Keys: Traditional locks and
keys are still widely used for securing doors and cabinets.
They provide a basic level of access control but lack the
advanced features and auditing capabilities of electronic
systems.
2.Electronic Card Access Control: This type of system
uses access cards (e.g., proximity cards, smart cards) to
grant or deny access. Users present their card to a reader,
which then verifies their credentials and then unlocks the
door when authorized.
13
Mechanical Locks and Keys
The primary purpose of
mechanical lock and key systems
is to provide a basic level of
security and access control by
allowing authorized individuals to
lock and unlock specific areas
while preventing unauthorized
access. Mechanical locks and
keys have been used for centuries
as a fundamental means of
securing doors, cabinets, safes,
and other physical enclosures.
Electronic Card Access Control
14
The primary purpose of electronic card
access control is to enhance security,
provide convenience, and monitor
access to controlled areas. This
technology uses electronic cards or
key fobs as access credentials to
regulate and manage entry into
secured areas, buildings, or digital
systems. These electronic cards
typically contain embedded data that is
read by card readers, allowing
authorized individuals to gain access
while denying entry to unauthorized
users.
• Keypad Access Control: Access is granted based on a
numeric code entered into a keypad. This method is often used in
conjunction with electronic locks and is suitable for low-security
areas.
• Biometric Access Control: Biometric systems use unique
physical or behavioral traits, such as fingerprints, iris scans, facial
recognition, or hand geometry, to verify a person's identity and
grant access.
• Access Control Tokens: These are physical devices, like key
fobs or tokens, that users carry with them to gain access. They
are often used in conjunction with card readers or biometric
systems for additional security.
15
16
Keypad Access Control
The primary purpose of keypad access
control is to enhance security by
requiring individuals to enter a correct
PIN (Personal Identification Number) or
code before gaining entry. Keypad
access control is a security technology
that uses a numerical keypad as a
means of granting or restricting access
to a physical location, building, room, or
digital system.
17
Biometric Access Control
The primary purpose of
biometric access control is to
enhance security, accuracy,
and convenience in various
environments. Biometric
access control is a security
technology that uses unique
physiological or behavioral
characteristics of individuals to
verify their identity and
regulate access to physical
locations, digital systems, data,
or resources.
Access Control Tokens
18
The primary purpose of access control
tokens is to enhance security and manage
access permissions effectively. Access
control tokens, play a critical role in
computer security and authentication
systems. These tokens are used to
confirm the identity and authorization of
users, devices, or applications attempting
to access resources, services, or data in a
digital environment.
• Mobile Access Control: With the increasing prevalence of
smartphones, mobile access control allows users to gain entry
using their mobile devices, often through Bluetooth or NFC
technology.
• Intercom Systems: Commonly used in residential or small
commercial settings, intercom systems require visitors to identify
themselves before granting access.
• Turnstiles and Speed Gates: These physical barriers control
access to a specific area by allowing only one person to pass at a
time. They are often used in high-security environments like
transportation hubs
19
20
Mobile Access Control
The primary purpose of mobile access
control is to enhance convenience,
security, and flexibility in various
environments. Mobile access control
devices, such as smartphones and tablets
are used as means of gaining access to
secured areas, systems, or resources. This
technology allows individuals to use their
mobile devices as digital keys or access
credentials, replacing traditional physical
keys, access cards, or PIN codes.
21
Intercom Systems
The primary purpose of intercom
systems is to facilitate efficient and
secure communication for a variety of
applications. In residential buildings
and gated communities, intercoms are
often used at entry points (gates or
building entrances) to verify the identity
of visitors before granting them access.
Residents can communicate with
visitors and remotely unlock doors or
gates if necessary.
Turnstiles and Speed Gates
22
Speed gates are designed to provide
rapid and efficient pedestrian access
control. They are often used in settings
where high throughput of authorized
individuals is required, such as office
buildings, airports, corporate
headquarters, and government facilities
The primary purpose of turnstiles is to
control the entry and exit of pedestrians
into or out of a secured area. They are
often used in settings where access
needs to be regulated, such as public
transportation hubs, stadiums,
amusement parks, office buildings, and
more.
• Vehicle Access Control: Systems like automatic gates,
barriers, and license plate recognition are used to control
vehicular access to parking lots, garages, and restricted areas.
• Wireless Access Control: Utilizing wireless communication,
this type of access control system offers flexibility and scalability,
making it suitable for both small and large installations.
• Cloud-Based Access Control: Access control data and
management are hosted in the cloud, allowing for remote
monitoring and management of access points.
23
24
Vehicle Access Control
Vehicle access control is a security
system that manages and regulates the
entry and exit of vehicles into a specific
area or facility. It is commonly used in
various environments, including
commercial properties, residential
complexes, parking lots, industrial
facilities, and gated communities. The
primary goal of vehicle access control is
to enhance security, improve traffic
management, and monitor vehicle
kawalan akses kenderaan
Wireless Access Control
25
Wireless access control refers to a security
system that uses wireless technology to
manage and regulate access to physical
spaces, such as buildings, rooms, or
restricted areas. This technology
eliminates the need for traditional wired
access control systems, which rely on
physical connections for communication.
Wireless access control offers greater
flexibility, scalability, and ease of
installation, making it a popular choice for
many organizations
Kawalan Akses Tanpa Wayar
26
Cloud-Based Access Control
1.Cloud Computing: Cloud computing involves
delivering computing services (such as
servers, storage, databases, networking,
software, analytics, and intelligence) over the
internet. Cloud service providers host and
manage these services, allowing organizations
to leverage them without the need to own or
maintain physical infrastructure.
2.Access Control: Access control is the
process of regulating who can access specific
resources, data, or services within a system. It
involves authentication (verifying the identity
of users or entities), authorization (determining
what actions or data they are allowed to
access), and auditing (tracking and logging
access activities).
Kawalan Akses Berasaskan Awan
• Integrated Access Control: This involves the integration
of access control systems with other security systems
like surveillance cameras, alarms, and intrusion detection
to create a comprehensive security solution.
• Visitor Management Systems: These systems are
designed to manage and track visitors, issuing temporary
access credentials and monitoring their movements
within a facility.
• Each of these access control systems has its own
advantages and limitations, and the choice of system
depends on factors such as the level of security required,
the size and complexity of the facility, and budget
considerations 27
The primary purpose of an
integrated access control
system is to enhance security,
streamline access
management, and provide a
holistic approach to
safeguarding assets, data,
and personnel. An integrated
access control system serves
as a comprehensive and
centralized security solution
designed to regulate, monitor,
and manage access to
physical areas, digital
resources, and facilities. 28
Integrated Access Control Kawalan Akses Bersepadu
29
Visitor Management Systems Sistem Pengurusan Pelawat
A visitor management
system (VMS) is a software-
based solution designed to
streamline and enhance the
process of managing visitors
to a facility or organization.
The primary purpose of a
visitor management system
is to improve security,
increase efficiency, and
create a positive and
controlled visitor experience.
30
Visitor
Management
System
31
Video Clip: VMS
32
1.Enhanced Security:
1.One of the primary purposes of a visitor management system
is to enhance security by accurately verifying the identity of
visitors before granting them access to a facility. It helps
ensure that only authorized individuals gain entry.
2.Visitor Registration:
1.VMS allows organizations to register and record visitor
information, including their name, contact details, purpose of
visit, and the person or department they are visiting. This data
is essential for security, safety, and compliance
The Purpose of VMS
33
3. Access Control:
1.VMS can be integrated with access control systems, allowing it
to issue temporary access credentials, such as visitor badges
or access cards. This ensures that visitors can only access
approved areas during their visit.
4. Improved Efficiency:
1.VMS streamlines the check-in process by automating visitor
registration. This reduces wait times and administrative
overhead, making the visitor experience more efficient and
pleasant.
5. Notification and Alerts:
1.VMS can automatically notify hosts or employees when their
expected visitors arrive. This ensures a warm welcome and
minimizes delays in meeting schedules.
34
6. Visitor Badges:
1.VMS can print visitor badges with important information, such
as the visitor's name, photo, date, and purpose of the visit.
These badges enhance security by clearly identifying visitors.
7. Emergency Response:
1.In case of emergencies or evacuations, VMS can provide an
accurate record of the individuals present in the facility,
including visitors, helping security personnel and emergency
responders account for everyone's safety.
8. Compliance and Reporting:
1.VMS generates detailed reports on visitor activity and
compliance with security policies. This documentation is
valuable for audits and regulatory compliance
35
9. Visitor Tracking:
1.VMS maintains a log of visitor arrivals, departures, and
movements within the facility. This information can be used for
security investigations or internal purposes.
10. Data Privacy :
1.VMS helps organizations comply with data privacy regulations by
securely storing visitor data, providing data access controls, and
enabling data removal when necessary.
11. Customization:
1.VMS can be customized to match the specific needs and
branding of an organization, creating a professional and
consistent visitor experience
36
Visitor management systems are commonly used in a wide
range of settings, including corporate offices, government
buildings, educational institutions, healthcare facilities,
manufacturing plants, and recreational venues. Their ability
to improve security, efficiency, and compliance while
providing a welcoming experience for visitors makes them
an essential tool in modern access control and security
strategies.
37
End of Session
37

More Related Content

Similar to BLE 1213 MUST (SESSION 2).pptx-Student learning Guide

High Security & Restricted System Access Control Services.pdf
High Security & Restricted System Access Control Services.pdfHigh Security & Restricted System Access Control Services.pdf
High Security & Restricted System Access Control Services.pdfService Pro Smith Lock
 
Access Control System_ An Overview - Bahaa Abdul Hadi.pdf
Access Control System_ An Overview - Bahaa Abdul Hadi.pdfAccess Control System_ An Overview - Bahaa Abdul Hadi.pdf
Access Control System_ An Overview - Bahaa Abdul Hadi.pdfBahaa Abdulhadi
 
Access Control Systems
Access Control SystemsAccess Control Systems
Access Control Systemsarnoldpeter01
 
Phases of Building Access Control Systems Houston, TX
Phases of Building Access Control Systems Houston, TXPhases of Building Access Control Systems Houston, TX
Phases of Building Access Control Systems Houston, TXNexlar Security
 
intelligent-buildings-ppt
intelligent-buildings-pptintelligent-buildings-ppt
intelligent-buildings-pptSyedAyanGame
 
Why Use Access Control Systems.pdf
Why Use Access Control Systems.pdfWhy Use Access Control Systems.pdf
Why Use Access Control Systems.pdfJaydenRees1
 
Significance of Quality Access Control System for Your Organization Safety
Significance of Quality Access Control System for Your Organization SafetySignificance of Quality Access Control System for Your Organization Safety
Significance of Quality Access Control System for Your Organization SafetyNexlar Security
 
Importance of Access Control Systems for Business Security.pdf
Importance of Access Control Systems for Business Security.pdfImportance of Access Control Systems for Business Security.pdf
Importance of Access Control Systems for Business Security.pdfLaurajonath
 
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingRemote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingKaren Oliver
 
Modern Office Space Ideas................
Modern Office Space Ideas................Modern Office Space Ideas................
Modern Office Space Ideas................siriajadhav28
 
Comprehensive Analysis of Contemporary Information Security Challenges
Comprehensive Analysis of Contemporary Information Security ChallengesComprehensive Analysis of Contemporary Information Security Challenges
Comprehensive Analysis of Contemporary Information Security Challengessidraasif9090
 
Importance of Technology Integration in Corporate Security.pdf
Importance of Technology Integration in Corporate Security.pdfImportance of Technology Integration in Corporate Security.pdf
Importance of Technology Integration in Corporate Security.pdfSecurity Guards
 
Locksmith in Dublin
Locksmith in DublinLocksmith in Dublin
Locksmith in Dublinpriyaanu2505
 
Access system.docx
Access system.docxAccess system.docx
Access system.docxWaseelsultan
 
Network and web security
Network and web securityNetwork and web security
Network and web securityNitesh Saitwal
 
Security Management Strategies and Defense and their uses.
Security Management Strategies and Defense and their uses.Security Management Strategies and Defense and their uses.
Security Management Strategies and Defense and their uses.Computer engineering company
 
Ensure Next-level Safety With Our Home & Office Security Systems.pdf
Ensure Next-level Safety With Our Home & Office Security Systems.pdfEnsure Next-level Safety With Our Home & Office Security Systems.pdf
Ensure Next-level Safety With Our Home & Office Security Systems.pdfmagePoint
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignRajat Jain
 

Similar to BLE 1213 MUST (SESSION 2).pptx-Student learning Guide (20)

High Security & Restricted System Access Control Services.pdf
High Security & Restricted System Access Control Services.pdfHigh Security & Restricted System Access Control Services.pdf
High Security & Restricted System Access Control Services.pdf
 
Access Control System_ An Overview - Bahaa Abdul Hadi.pdf
Access Control System_ An Overview - Bahaa Abdul Hadi.pdfAccess Control System_ An Overview - Bahaa Abdul Hadi.pdf
Access Control System_ An Overview - Bahaa Abdul Hadi.pdf
 
Access Control Systems
Access Control SystemsAccess Control Systems
Access Control Systems
 
Phases of Building Access Control Systems Houston, TX
Phases of Building Access Control Systems Houston, TXPhases of Building Access Control Systems Houston, TX
Phases of Building Access Control Systems Houston, TX
 
intelligent-buildings-ppt
intelligent-buildings-pptintelligent-buildings-ppt
intelligent-buildings-ppt
 
Why Use Access Control Systems.pdf
Why Use Access Control Systems.pdfWhy Use Access Control Systems.pdf
Why Use Access Control Systems.pdf
 
Access control
Access controlAccess control
Access control
 
Significance of Quality Access Control System for Your Organization Safety
Significance of Quality Access Control System for Your Organization SafetySignificance of Quality Access Control System for Your Organization Safety
Significance of Quality Access Control System for Your Organization Safety
 
Importance of Access Control Systems for Business Security.pdf
Importance of Access Control Systems for Business Security.pdfImportance of Access Control Systems for Business Security.pdf
Importance of Access Control Systems for Business Security.pdf
 
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingRemote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal Thing
 
Modern Office Space Ideas................
Modern Office Space Ideas................Modern Office Space Ideas................
Modern Office Space Ideas................
 
Comprehensive Analysis of Contemporary Information Security Challenges
Comprehensive Analysis of Contemporary Information Security ChallengesComprehensive Analysis of Contemporary Information Security Challenges
Comprehensive Analysis of Contemporary Information Security Challenges
 
Importance of Technology Integration in Corporate Security.pdf
Importance of Technology Integration in Corporate Security.pdfImportance of Technology Integration in Corporate Security.pdf
Importance of Technology Integration in Corporate Security.pdf
 
Locksmith in Dublin
Locksmith in DublinLocksmith in Dublin
Locksmith in Dublin
 
Dublin locksmith
Dublin locksmithDublin locksmith
Dublin locksmith
 
Access system.docx
Access system.docxAccess system.docx
Access system.docx
 
Network and web security
Network and web securityNetwork and web security
Network and web security
 
Security Management Strategies and Defense and their uses.
Security Management Strategies and Defense and their uses.Security Management Strategies and Defense and their uses.
Security Management Strategies and Defense and their uses.
 
Ensure Next-level Safety With Our Home & Office Security Systems.pdf
Ensure Next-level Safety With Our Home & Office Security Systems.pdfEnsure Next-level Safety With Our Home & Office Security Systems.pdf
Ensure Next-level Safety With Our Home & Office Security Systems.pdf
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect Design
 

More from Major K. Subramaniam Kmaravehlu

TRAINING PEDAGOGY.ppt Introduction to Understanding of Pedagogy.
TRAINING PEDAGOGY.ppt Introduction to Understanding of Pedagogy.TRAINING PEDAGOGY.ppt Introduction to Understanding of Pedagogy.
TRAINING PEDAGOGY.ppt Introduction to Understanding of Pedagogy.Major K. Subramaniam Kmaravehlu
 
PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY
PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITYPSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY
PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITYMajor K. Subramaniam Kmaravehlu
 
BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...
BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...
BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...Major K. Subramaniam Kmaravehlu
 
BLE 1213 MUST (SESSION 3).pptx- basic principles of physical security
BLE 1213 MUST (SESSION 3).pptx- basic principles of physical securityBLE 1213 MUST (SESSION 3).pptx- basic principles of physical security
BLE 1213 MUST (SESSION 3).pptx- basic principles of physical securityMajor K. Subramaniam Kmaravehlu
 
AI GENERATIVE.pptx- Introduction to AI generative in Warfare
AI GENERATIVE.pptx- Introduction to AI generative in WarfareAI GENERATIVE.pptx- Introduction to AI generative in Warfare
AI GENERATIVE.pptx- Introduction to AI generative in WarfareMajor K. Subramaniam Kmaravehlu
 
AVI SAFETY CULTURE.pptx- maintenance engineers safety principles
AVI SAFETY CULTURE.pptx- maintenance engineers safety principlesAVI SAFETY CULTURE.pptx- maintenance engineers safety principles
AVI SAFETY CULTURE.pptx- maintenance engineers safety principlesMajor K. Subramaniam Kmaravehlu
 
Phy Sy CTPAT.pptx-ctpat training for supply chain managers.
Phy Sy CTPAT.pptx-ctpat training for supply chain managers.Phy Sy CTPAT.pptx-ctpat training for supply chain managers.
Phy Sy CTPAT.pptx-ctpat training for supply chain managers.Major K. Subramaniam Kmaravehlu
 
BLE 1213 PSM Fitri Gp 3.pptx- STUDENT GROUP PRESENTATION
BLE 1213 PSM Fitri Gp 3.pptx- STUDENT GROUP PRESENTATIONBLE 1213 PSM Fitri Gp 3.pptx- STUDENT GROUP PRESENTATION
BLE 1213 PSM Fitri Gp 3.pptx- STUDENT GROUP PRESENTATIONMajor K. Subramaniam Kmaravehlu
 
BLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSM
BLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSMBLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSM
BLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSMMajor K. Subramaniam Kmaravehlu
 
BLE 1213 MUST.pptx- basics principles of Physical Security
BLE 1213 MUST.pptx- basics  principles of Physical SecurityBLE 1213 MUST.pptx- basics  principles of Physical Security
BLE 1213 MUST.pptx- basics principles of Physical SecurityMajor K. Subramaniam Kmaravehlu
 

More from Major K. Subramaniam Kmaravehlu (20)

TRAINING PEDAGOGY.ppt Introduction to Understanding of Pedagogy.
TRAINING PEDAGOGY.ppt Introduction to Understanding of Pedagogy.TRAINING PEDAGOGY.ppt Introduction to Understanding of Pedagogy.
TRAINING PEDAGOGY.ppt Introduction to Understanding of Pedagogy.
 
PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY
PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITYPSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY
PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY
 
u2-lect-1-to-9-mtd-pvb-1801161758710.ppt
u2-lect-1-to-9-mtd-pvb-1801161758710.pptu2-lect-1-to-9-mtd-pvb-1801161758710.ppt
u2-lect-1-to-9-mtd-pvb-1801161758710.ppt
 
BLE 1213 PSM (SESSION 5).pptx-key Concepts in PSM
BLE 1213 PSM (SESSION 5).pptx-key Concepts in PSMBLE 1213 PSM (SESSION 5).pptx-key Concepts in PSM
BLE 1213 PSM (SESSION 5).pptx-key Concepts in PSM
 
BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...
BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...
BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...
 
BLE 1213 MUST (SESSION 3).pptx- basic principles of physical security
BLE 1213 MUST (SESSION 3).pptx- basic principles of physical securityBLE 1213 MUST (SESSION 3).pptx- basic principles of physical security
BLE 1213 MUST (SESSION 3).pptx- basic principles of physical security
 
AI GENERATIVE.pptx- Introduction to AI generative in Warfare
AI GENERATIVE.pptx- Introduction to AI generative in WarfareAI GENERATIVE.pptx- Introduction to AI generative in Warfare
AI GENERATIVE.pptx- Introduction to AI generative in Warfare
 
AVI SAFETY CULTURE.pptx- maintenance engineers safety principles
AVI SAFETY CULTURE.pptx- maintenance engineers safety principlesAVI SAFETY CULTURE.pptx- maintenance engineers safety principles
AVI SAFETY CULTURE.pptx- maintenance engineers safety principles
 
CTPAT PPTX Presentation.pptx - minimum security
CTPAT  PPTX Presentation.pptx - minimum securityCTPAT  PPTX Presentation.pptx - minimum security
CTPAT PPTX Presentation.pptx - minimum security
 
Phy Sy CTPAT.pptx-ctpat training for supply chain managers.
Phy Sy CTPAT.pptx-ctpat training for supply chain managers.Phy Sy CTPAT.pptx-ctpat training for supply chain managers.
Phy Sy CTPAT.pptx-ctpat training for supply chain managers.
 
SECURITY PLANNING DESIGN (SESSION 3).ppt
SECURITY PLANNING  DESIGN (SESSION 3).pptSECURITY PLANNING  DESIGN (SESSION 3).ppt
SECURITY PLANNING DESIGN (SESSION 3).ppt
 
Physical_Security_Historical_perspective.ppt
Physical_Security_Historical_perspective.pptPhysical_Security_Historical_perspective.ppt
Physical_Security_Historical_perspective.ppt
 
BLE 1213 PSM-Rosaini Gp 2.pptx- GROUP DISCUSSION
BLE 1213 PSM-Rosaini Gp 2.pptx- GROUP DISCUSSIONBLE 1213 PSM-Rosaini Gp 2.pptx- GROUP DISCUSSION
BLE 1213 PSM-Rosaini Gp 2.pptx- GROUP DISCUSSION
 
BLE 1213 PSM Fitri Gp 3.pptx- STUDENT GROUP PRESENTATION
BLE 1213 PSM Fitri Gp 3.pptx- STUDENT GROUP PRESENTATIONBLE 1213 PSM Fitri Gp 3.pptx- STUDENT GROUP PRESENTATION
BLE 1213 PSM Fitri Gp 3.pptx- STUDENT GROUP PRESENTATION
 
BLE 1213 PSM - GP 1,2,3 PRSTN.ppt-Presentation slidesx
BLE 1213 PSM - GP 1,2,3 PRSTN.ppt-Presentation slidesxBLE 1213 PSM - GP 1,2,3 PRSTN.ppt-Presentation slidesx
BLE 1213 PSM - GP 1,2,3 PRSTN.ppt-Presentation slidesx
 
BLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSM
BLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSMBLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSM
BLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSM
 
BLE 1213 MUST.pptx- basics principles of Physical Security
BLE 1213 MUST.pptx- basics  principles of Physical SecurityBLE 1213 MUST.pptx- basics  principles of Physical Security
BLE 1213 MUST.pptx- basics principles of Physical Security
 
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
 
CTPAT-MSR.pptx- Presentation Slides for trainees
CTPAT-MSR.pptx- Presentation Slides for traineesCTPAT-MSR.pptx- Presentation Slides for trainees
CTPAT-MSR.pptx- Presentation Slides for trainees
 
DLE 1013-ISM REV.pptx - This note covers 20 over slides
DLE 1013-ISM REV.pptx - This note covers 20 over slidesDLE 1013-ISM REV.pptx - This note covers 20 over slides
DLE 1013-ISM REV.pptx - This note covers 20 over slides
 

Recently uploaded

Goal Presentation_NEW EMPLOYEE_NETAPS FOUNDATION.pptx
Goal Presentation_NEW EMPLOYEE_NETAPS FOUNDATION.pptxGoal Presentation_NEW EMPLOYEE_NETAPS FOUNDATION.pptx
Goal Presentation_NEW EMPLOYEE_NETAPS FOUNDATION.pptxNetapsFoundationAdmi
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxCynthia Clay
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAITim Wilson
 
PALWAL CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN PALWAL ESCORTS
PALWAL CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN PALWAL ESCORTSPALWAL CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN PALWAL ESCORTS
PALWAL CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN PALWAL ESCORTSkajalroy875762
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPanhandleOilandGas
 
10 Influential Leaders Defining the Future of Digital Banking in 2024.pdf
10 Influential Leaders Defining the Future of Digital Banking in 2024.pdf10 Influential Leaders Defining the Future of Digital Banking in 2024.pdf
10 Influential Leaders Defining the Future of Digital Banking in 2024.pdfciolook1
 
Abortion pills in Jeddah ! +27737758557, cytotec pill riyadh. Saudi Arabia" A...
Abortion pills in Jeddah ! +27737758557, cytotec pill riyadh. Saudi Arabia" A...Abortion pills in Jeddah ! +27737758557, cytotec pill riyadh. Saudi Arabia" A...
Abortion pills in Jeddah ! +27737758557, cytotec pill riyadh. Saudi Arabia" A...bleessingsbender
 
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxQSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxDitasDelaCruz
 
Thompson_Taylor_MBBS_PB1_2024-03 (1)- Project & Portfolio 2.pptx
Thompson_Taylor_MBBS_PB1_2024-03 (1)- Project & Portfolio 2.pptxThompson_Taylor_MBBS_PB1_2024-03 (1)- Project & Portfolio 2.pptx
Thompson_Taylor_MBBS_PB1_2024-03 (1)- Project & Portfolio 2.pptxtmthompson1
 
JIND CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JIND ESCORTS SERVICE PROVIDE
JIND CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JIND ESCORTS SERVICE PROVIDEJIND CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JIND ESCORTS SERVICE PROVIDE
JIND CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JIND ESCORTS SERVICE PROVIDEkajalroy875762
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Adnet Communications
 
A DAY IN THE LIFE OF A SALESPERSON .pptx
A DAY IN THE LIFE OF A SALESPERSON .pptxA DAY IN THE LIFE OF A SALESPERSON .pptx
A DAY IN THE LIFE OF A SALESPERSON .pptxseemajojo02
 
Progress Report - Oracle's OCI Analyst Summit 2024
Progress Report - Oracle's OCI Analyst Summit 2024Progress Report - Oracle's OCI Analyst Summit 2024
Progress Report - Oracle's OCI Analyst Summit 2024Holger Mueller
 
Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...
Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...
Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...Klinik kandungan
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptxRoofing Contractor
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfwill854175
 
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow ChallengesFalcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challengeshemanthkumar470700
 
The Art of Decision-Making: Navigating Complexity and Uncertainty
The Art of Decision-Making: Navigating Complexity and UncertaintyThe Art of Decision-Making: Navigating Complexity and Uncertainty
The Art of Decision-Making: Navigating Complexity and Uncertaintycapivisgroup
 

Recently uploaded (20)

Goal Presentation_NEW EMPLOYEE_NETAPS FOUNDATION.pptx
Goal Presentation_NEW EMPLOYEE_NETAPS FOUNDATION.pptxGoal Presentation_NEW EMPLOYEE_NETAPS FOUNDATION.pptx
Goal Presentation_NEW EMPLOYEE_NETAPS FOUNDATION.pptx
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
Home Furnishings Ecommerce Platform Short Pitch 2024
Home Furnishings Ecommerce Platform Short Pitch 2024Home Furnishings Ecommerce Platform Short Pitch 2024
Home Furnishings Ecommerce Platform Short Pitch 2024
 
PALWAL CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN PALWAL ESCORTS
PALWAL CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN PALWAL ESCORTSPALWAL CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN PALWAL ESCORTS
PALWAL CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN PALWAL ESCORTS
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
10 Influential Leaders Defining the Future of Digital Banking in 2024.pdf
10 Influential Leaders Defining the Future of Digital Banking in 2024.pdf10 Influential Leaders Defining the Future of Digital Banking in 2024.pdf
10 Influential Leaders Defining the Future of Digital Banking in 2024.pdf
 
Abortion pills in Jeddah ! +27737758557, cytotec pill riyadh. Saudi Arabia" A...
Abortion pills in Jeddah ! +27737758557, cytotec pill riyadh. Saudi Arabia" A...Abortion pills in Jeddah ! +27737758557, cytotec pill riyadh. Saudi Arabia" A...
Abortion pills in Jeddah ! +27737758557, cytotec pill riyadh. Saudi Arabia" A...
 
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxQSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
 
Thompson_Taylor_MBBS_PB1_2024-03 (1)- Project & Portfolio 2.pptx
Thompson_Taylor_MBBS_PB1_2024-03 (1)- Project & Portfolio 2.pptxThompson_Taylor_MBBS_PB1_2024-03 (1)- Project & Portfolio 2.pptx
Thompson_Taylor_MBBS_PB1_2024-03 (1)- Project & Portfolio 2.pptx
 
JIND CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JIND ESCORTS SERVICE PROVIDE
JIND CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JIND ESCORTS SERVICE PROVIDEJIND CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JIND ESCORTS SERVICE PROVIDE
JIND CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JIND ESCORTS SERVICE PROVIDE
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
A DAY IN THE LIFE OF A SALESPERSON .pptx
A DAY IN THE LIFE OF A SALESPERSON .pptxA DAY IN THE LIFE OF A SALESPERSON .pptx
A DAY IN THE LIFE OF A SALESPERSON .pptx
 
Progress Report - Oracle's OCI Analyst Summit 2024
Progress Report - Oracle's OCI Analyst Summit 2024Progress Report - Oracle's OCI Analyst Summit 2024
Progress Report - Oracle's OCI Analyst Summit 2024
 
Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...
Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...
Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
WheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond InsightsWheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond Insights
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow ChallengesFalcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
 
The Art of Decision-Making: Navigating Complexity and Uncertainty
The Art of Decision-Making: Navigating Complexity and UncertaintyThe Art of Decision-Making: Navigating Complexity and Uncertainty
The Art of Decision-Making: Navigating Complexity and Uncertainty
 

BLE 1213 MUST (SESSION 2).pptx-Student learning Guide

  • 3. RECAP-ULANGKAJI 1. Principles in Physical Security The principles underlying Physical Security Management are designed to create a comprehensive and layered approach to protect against unauthorized access, theft, damage, and other potential harms. Here are the key principles:  Deterrence  Detection  Delay  Response & Intervention 3
  • 4. Defence-in-Depth Defence in depth is about building multiple layers of security that will protect the organization better than one single layer. https://www.youtube.com/watch?v=j9MQMVn3FV4&t=86s&ab_channel=TomOlzak 4 Pertahanan secara mendalam adalah tentang membina berbilang lapisan keselamatan yang akan melindungi organisasi lebih baik daripada satu lapisan tunggal.
  • 7. 7
  • 8. 8 Contrary to PSTN, an IP PBX (Internet Protocol Private Branch Exchange) system is a telecommunication system that uses IP data networks (like the internet) to manage and route voice and video calls, in addition to other forms of communication such as instant messaging and A smart building, also known as an intelligent building or a smart facility, is a structure that uses advanced technology and integrated systems to enhance the building's overall functionality, efficiency, security, and sustainability. The purpose of a CCTV (Closed-Circuit Television) system is to capture, record, and monitor video footage in a designated area for various purposes such as security and crime deterrence, surveillance, visitor control etc …. A Visitor Management System (VMS) serves as a comprehensive solution to manage and track visitors, guests, and personnel entering a facility or premises. A security control room, often referred to as a security operations center (SOC) or command center, is a centralized facility equipped with technology and staffed by security personnel responsible for monitoring, managing, and responding to security-related events and incidents within an organization or a specific area. Access control refers to the practice of regulating and managing who has permission to access specific resources, assets, areas, or information within an organization or physical space. Motion sensors, also known as motion detectors, serve the primary purpose of detecting physical movement or motion within a defined area. A fire alarm system is a network of interconnected devices and components designed to detect, notify, and respond to the presence of a fire or smoke in a building or area. The primary purpose of a fire alarm system is to protect life and property by providing early warning of a fire, allowing occupants to evacuate safely and alerting emergency responders to Parking zones inside facilities are often equipped with security features such as surveillance cameras, adequate lighting, and controlled access points. This enhances the safety and security of vehicles and their occupants, reducing the risk of theft, vandalism, and other security concerns.
  • 9. 9 Access Control Systems  Mechanical Locks and Keys  Electronic Card Access Control  Keypad Access Control  Biometric Access Control  Access Control Tokens  Mobile Access Control  Intercom Systems  Turnstiles and Speed Gates  Vehicle Access Control  Wireless Access Control  Cloud-Based Access Control  Integrated Access Control  Visitor Management System
  • 10. 10 Access control is the art and science of regulating who can enter a specific area, building, or facility and under what conditions. It's the guardian at the gate, ensuring that only authorized individuals gain entry, while keeping potential threats at bay. In an era where security concerns are ever-evolving, understanding the core concepts of access control is not only essential but also a cornerstone in building a secure environment.
  • 11. 11 Kawalan akses ialah seni dan sains mengawal selia orang yang boleh memasuki kawasan, bangunan atau kemudahan tertentu dan dalam keadaan apa. Ia adalah penjaga di pintu pagar, memastikan bahawa hanya individu yang diberi kuasa boleh masuk, sambil mengekalkan potensi ancaman. Dalam era di mana kebimbangan keselamatan sentiasa berkembang, memahami konsep teras kawalan akses bukan sahaja penting tetapi juga asas dalam membina persekitaran yang selamat.
  • 12. 12 Access control systems in physical security encompass various methods and technologies to regulate entry to a physical space. These systems can be categorized into several types, including: 1.Mechanical Locks and Keys: Traditional locks and keys are still widely used for securing doors and cabinets. They provide a basic level of access control but lack the advanced features and auditing capabilities of electronic systems. 2.Electronic Card Access Control: This type of system uses access cards (e.g., proximity cards, smart cards) to grant or deny access. Users present their card to a reader, which then verifies their credentials and then unlocks the door when authorized.
  • 13. 13 Mechanical Locks and Keys The primary purpose of mechanical lock and key systems is to provide a basic level of security and access control by allowing authorized individuals to lock and unlock specific areas while preventing unauthorized access. Mechanical locks and keys have been used for centuries as a fundamental means of securing doors, cabinets, safes, and other physical enclosures.
  • 14. Electronic Card Access Control 14 The primary purpose of electronic card access control is to enhance security, provide convenience, and monitor access to controlled areas. This technology uses electronic cards or key fobs as access credentials to regulate and manage entry into secured areas, buildings, or digital systems. These electronic cards typically contain embedded data that is read by card readers, allowing authorized individuals to gain access while denying entry to unauthorized users.
  • 15. • Keypad Access Control: Access is granted based on a numeric code entered into a keypad. This method is often used in conjunction with electronic locks and is suitable for low-security areas. • Biometric Access Control: Biometric systems use unique physical or behavioral traits, such as fingerprints, iris scans, facial recognition, or hand geometry, to verify a person's identity and grant access. • Access Control Tokens: These are physical devices, like key fobs or tokens, that users carry with them to gain access. They are often used in conjunction with card readers or biometric systems for additional security. 15
  • 16. 16 Keypad Access Control The primary purpose of keypad access control is to enhance security by requiring individuals to enter a correct PIN (Personal Identification Number) or code before gaining entry. Keypad access control is a security technology that uses a numerical keypad as a means of granting or restricting access to a physical location, building, room, or digital system.
  • 17. 17 Biometric Access Control The primary purpose of biometric access control is to enhance security, accuracy, and convenience in various environments. Biometric access control is a security technology that uses unique physiological or behavioral characteristics of individuals to verify their identity and regulate access to physical locations, digital systems, data, or resources.
  • 18. Access Control Tokens 18 The primary purpose of access control tokens is to enhance security and manage access permissions effectively. Access control tokens, play a critical role in computer security and authentication systems. These tokens are used to confirm the identity and authorization of users, devices, or applications attempting to access resources, services, or data in a digital environment.
  • 19. • Mobile Access Control: With the increasing prevalence of smartphones, mobile access control allows users to gain entry using their mobile devices, often through Bluetooth or NFC technology. • Intercom Systems: Commonly used in residential or small commercial settings, intercom systems require visitors to identify themselves before granting access. • Turnstiles and Speed Gates: These physical barriers control access to a specific area by allowing only one person to pass at a time. They are often used in high-security environments like transportation hubs 19
  • 20. 20 Mobile Access Control The primary purpose of mobile access control is to enhance convenience, security, and flexibility in various environments. Mobile access control devices, such as smartphones and tablets are used as means of gaining access to secured areas, systems, or resources. This technology allows individuals to use their mobile devices as digital keys or access credentials, replacing traditional physical keys, access cards, or PIN codes.
  • 21. 21 Intercom Systems The primary purpose of intercom systems is to facilitate efficient and secure communication for a variety of applications. In residential buildings and gated communities, intercoms are often used at entry points (gates or building entrances) to verify the identity of visitors before granting them access. Residents can communicate with visitors and remotely unlock doors or gates if necessary.
  • 22. Turnstiles and Speed Gates 22 Speed gates are designed to provide rapid and efficient pedestrian access control. They are often used in settings where high throughput of authorized individuals is required, such as office buildings, airports, corporate headquarters, and government facilities The primary purpose of turnstiles is to control the entry and exit of pedestrians into or out of a secured area. They are often used in settings where access needs to be regulated, such as public transportation hubs, stadiums, amusement parks, office buildings, and more.
  • 23. • Vehicle Access Control: Systems like automatic gates, barriers, and license plate recognition are used to control vehicular access to parking lots, garages, and restricted areas. • Wireless Access Control: Utilizing wireless communication, this type of access control system offers flexibility and scalability, making it suitable for both small and large installations. • Cloud-Based Access Control: Access control data and management are hosted in the cloud, allowing for remote monitoring and management of access points. 23
  • 24. 24 Vehicle Access Control Vehicle access control is a security system that manages and regulates the entry and exit of vehicles into a specific area or facility. It is commonly used in various environments, including commercial properties, residential complexes, parking lots, industrial facilities, and gated communities. The primary goal of vehicle access control is to enhance security, improve traffic management, and monitor vehicle kawalan akses kenderaan
  • 25. Wireless Access Control 25 Wireless access control refers to a security system that uses wireless technology to manage and regulate access to physical spaces, such as buildings, rooms, or restricted areas. This technology eliminates the need for traditional wired access control systems, which rely on physical connections for communication. Wireless access control offers greater flexibility, scalability, and ease of installation, making it a popular choice for many organizations Kawalan Akses Tanpa Wayar
  • 26. 26 Cloud-Based Access Control 1.Cloud Computing: Cloud computing involves delivering computing services (such as servers, storage, databases, networking, software, analytics, and intelligence) over the internet. Cloud service providers host and manage these services, allowing organizations to leverage them without the need to own or maintain physical infrastructure. 2.Access Control: Access control is the process of regulating who can access specific resources, data, or services within a system. It involves authentication (verifying the identity of users or entities), authorization (determining what actions or data they are allowed to access), and auditing (tracking and logging access activities). Kawalan Akses Berasaskan Awan
  • 27. • Integrated Access Control: This involves the integration of access control systems with other security systems like surveillance cameras, alarms, and intrusion detection to create a comprehensive security solution. • Visitor Management Systems: These systems are designed to manage and track visitors, issuing temporary access credentials and monitoring their movements within a facility. • Each of these access control systems has its own advantages and limitations, and the choice of system depends on factors such as the level of security required, the size and complexity of the facility, and budget considerations 27
  • 28. The primary purpose of an integrated access control system is to enhance security, streamline access management, and provide a holistic approach to safeguarding assets, data, and personnel. An integrated access control system serves as a comprehensive and centralized security solution designed to regulate, monitor, and manage access to physical areas, digital resources, and facilities. 28 Integrated Access Control Kawalan Akses Bersepadu
  • 29. 29 Visitor Management Systems Sistem Pengurusan Pelawat A visitor management system (VMS) is a software- based solution designed to streamline and enhance the process of managing visitors to a facility or organization. The primary purpose of a visitor management system is to improve security, increase efficiency, and create a positive and controlled visitor experience.
  • 32. 32 1.Enhanced Security: 1.One of the primary purposes of a visitor management system is to enhance security by accurately verifying the identity of visitors before granting them access to a facility. It helps ensure that only authorized individuals gain entry. 2.Visitor Registration: 1.VMS allows organizations to register and record visitor information, including their name, contact details, purpose of visit, and the person or department they are visiting. This data is essential for security, safety, and compliance The Purpose of VMS
  • 33. 33 3. Access Control: 1.VMS can be integrated with access control systems, allowing it to issue temporary access credentials, such as visitor badges or access cards. This ensures that visitors can only access approved areas during their visit. 4. Improved Efficiency: 1.VMS streamlines the check-in process by automating visitor registration. This reduces wait times and administrative overhead, making the visitor experience more efficient and pleasant. 5. Notification and Alerts: 1.VMS can automatically notify hosts or employees when their expected visitors arrive. This ensures a warm welcome and minimizes delays in meeting schedules.
  • 34. 34 6. Visitor Badges: 1.VMS can print visitor badges with important information, such as the visitor's name, photo, date, and purpose of the visit. These badges enhance security by clearly identifying visitors. 7. Emergency Response: 1.In case of emergencies or evacuations, VMS can provide an accurate record of the individuals present in the facility, including visitors, helping security personnel and emergency responders account for everyone's safety. 8. Compliance and Reporting: 1.VMS generates detailed reports on visitor activity and compliance with security policies. This documentation is valuable for audits and regulatory compliance
  • 35. 35 9. Visitor Tracking: 1.VMS maintains a log of visitor arrivals, departures, and movements within the facility. This information can be used for security investigations or internal purposes. 10. Data Privacy : 1.VMS helps organizations comply with data privacy regulations by securely storing visitor data, providing data access controls, and enabling data removal when necessary. 11. Customization: 1.VMS can be customized to match the specific needs and branding of an organization, creating a professional and consistent visitor experience
  • 36. 36 Visitor management systems are commonly used in a wide range of settings, including corporate offices, government buildings, educational institutions, healthcare facilities, manufacturing plants, and recreational venues. Their ability to improve security, efficiency, and compliance while providing a welcoming experience for visitors makes them an essential tool in modern access control and security strategies.