3. RECAP-ULANGKAJI
1. Principles in Physical Security
The principles underlying Physical Security Management are
designed to create a comprehensive and layered approach to
protect against unauthorized access, theft, damage, and other
potential harms. Here are the key principles:
Deterrence
Detection
Delay
Response & Intervention
3
4. Defence-in-Depth
Defence in depth is about building multiple layers
of security that will protect the organization better
than one single layer.
https://www.youtube.com/watch?v=j9MQMVn3FV4&t=86s&ab_channel=TomOlzak
4
Pertahanan secara mendalam adalah tentang membina
berbilang lapisan keselamatan yang akan melindungi
organisasi lebih baik daripada satu lapisan tunggal.
8. 8
Contrary to PSTN, an IP PBX (Internet Protocol
Private Branch Exchange) system is a
telecommunication system that uses IP data
networks (like the internet) to manage and route
voice and video calls, in addition to other forms
of communication such as instant messaging and
A smart building, also
known as an intelligent
building or a smart
facility, is a structure that
uses advanced
technology and
integrated systems to
enhance the building's
overall functionality,
efficiency, security, and
sustainability.
The purpose of a CCTV
(Closed-Circuit Television)
system is to capture, record,
and monitor video footage in a
designated area for various
purposes such as security and
crime deterrence, surveillance,
visitor control etc ….
A Visitor
Management
System (VMS)
serves as a
comprehensive
solution to manage
and track visitors,
guests, and
personnel entering
a facility or
premises.
A security control room, often referred to
as a security operations center (SOC) or
command center, is a centralized facility
equipped with technology and staffed by
security personnel responsible for
monitoring, managing, and responding to
security-related events and incidents
within an organization or a specific area.
Access control refers to
the practice of regulating
and managing who has
permission to access
specific resources,
assets, areas, or
information within an
organization or physical
space.
Motion sensors,
also known as
motion detectors,
serve the primary
purpose of
detecting physical
movement or
motion within a
defined area.
A fire alarm system is a network of interconnected
devices and components designed to detect, notify,
and respond to the presence of a fire or smoke in a
building or area. The primary purpose of a fire alarm
system is to protect life and property by providing
early warning of a fire, allowing occupants to
evacuate safely and alerting emergency responders to
Parking zones inside facilities are
often equipped with security
features such as surveillance
cameras, adequate lighting, and
controlled access points. This
enhances the safety and security
of vehicles and their occupants,
reducing the risk of theft,
vandalism, and other security
concerns.
9. 9
Access Control Systems
Mechanical Locks and Keys
Electronic Card Access Control
Keypad Access Control
Biometric Access Control
Access Control Tokens
Mobile Access Control
Intercom Systems
Turnstiles and Speed Gates
Vehicle Access Control
Wireless Access Control
Cloud-Based Access Control
Integrated Access Control
Visitor Management System
10. 10
Access control is the art and science
of regulating who can enter a specific
area, building, or facility and under
what conditions. It's the guardian at
the gate, ensuring that only
authorized individuals gain entry,
while keeping potential threats at bay.
In an era where security concerns are
ever-evolving, understanding the core
concepts of access control is not only
essential but also a cornerstone in
building a secure environment.
11. 11
Kawalan akses ialah seni dan sains
mengawal selia orang yang boleh
memasuki kawasan, bangunan atau
kemudahan tertentu dan dalam keadaan
apa. Ia adalah penjaga di pintu pagar,
memastikan bahawa hanya individu yang
diberi kuasa boleh masuk, sambil
mengekalkan potensi ancaman.
Dalam era di mana kebimbangan
keselamatan sentiasa berkembang,
memahami konsep teras kawalan akses
bukan sahaja penting tetapi juga asas
dalam membina persekitaran yang
selamat.
12. 12
Access control systems in physical security
encompass various methods and technologies to
regulate entry to a physical space. These systems can
be categorized into several types, including:
1.Mechanical Locks and Keys: Traditional locks and
keys are still widely used for securing doors and cabinets.
They provide a basic level of access control but lack the
advanced features and auditing capabilities of electronic
systems.
2.Electronic Card Access Control: This type of system
uses access cards (e.g., proximity cards, smart cards) to
grant or deny access. Users present their card to a reader,
which then verifies their credentials and then unlocks the
door when authorized.
13. 13
Mechanical Locks and Keys
The primary purpose of
mechanical lock and key systems
is to provide a basic level of
security and access control by
allowing authorized individuals to
lock and unlock specific areas
while preventing unauthorized
access. Mechanical locks and
keys have been used for centuries
as a fundamental means of
securing doors, cabinets, safes,
and other physical enclosures.
14. Electronic Card Access Control
14
The primary purpose of electronic card
access control is to enhance security,
provide convenience, and monitor
access to controlled areas. This
technology uses electronic cards or
key fobs as access credentials to
regulate and manage entry into
secured areas, buildings, or digital
systems. These electronic cards
typically contain embedded data that is
read by card readers, allowing
authorized individuals to gain access
while denying entry to unauthorized
users.
15. • Keypad Access Control: Access is granted based on a
numeric code entered into a keypad. This method is often used in
conjunction with electronic locks and is suitable for low-security
areas.
• Biometric Access Control: Biometric systems use unique
physical or behavioral traits, such as fingerprints, iris scans, facial
recognition, or hand geometry, to verify a person's identity and
grant access.
• Access Control Tokens: These are physical devices, like key
fobs or tokens, that users carry with them to gain access. They
are often used in conjunction with card readers or biometric
systems for additional security.
15
16. 16
Keypad Access Control
The primary purpose of keypad access
control is to enhance security by
requiring individuals to enter a correct
PIN (Personal Identification Number) or
code before gaining entry. Keypad
access control is a security technology
that uses a numerical keypad as a
means of granting or restricting access
to a physical location, building, room, or
digital system.
17. 17
Biometric Access Control
The primary purpose of
biometric access control is to
enhance security, accuracy,
and convenience in various
environments. Biometric
access control is a security
technology that uses unique
physiological or behavioral
characteristics of individuals to
verify their identity and
regulate access to physical
locations, digital systems, data,
or resources.
18. Access Control Tokens
18
The primary purpose of access control
tokens is to enhance security and manage
access permissions effectively. Access
control tokens, play a critical role in
computer security and authentication
systems. These tokens are used to
confirm the identity and authorization of
users, devices, or applications attempting
to access resources, services, or data in a
digital environment.
19. • Mobile Access Control: With the increasing prevalence of
smartphones, mobile access control allows users to gain entry
using their mobile devices, often through Bluetooth or NFC
technology.
• Intercom Systems: Commonly used in residential or small
commercial settings, intercom systems require visitors to identify
themselves before granting access.
• Turnstiles and Speed Gates: These physical barriers control
access to a specific area by allowing only one person to pass at a
time. They are often used in high-security environments like
transportation hubs
19
20. 20
Mobile Access Control
The primary purpose of mobile access
control is to enhance convenience,
security, and flexibility in various
environments. Mobile access control
devices, such as smartphones and tablets
are used as means of gaining access to
secured areas, systems, or resources. This
technology allows individuals to use their
mobile devices as digital keys or access
credentials, replacing traditional physical
keys, access cards, or PIN codes.
21. 21
Intercom Systems
The primary purpose of intercom
systems is to facilitate efficient and
secure communication for a variety of
applications. In residential buildings
and gated communities, intercoms are
often used at entry points (gates or
building entrances) to verify the identity
of visitors before granting them access.
Residents can communicate with
visitors and remotely unlock doors or
gates if necessary.
22. Turnstiles and Speed Gates
22
Speed gates are designed to provide
rapid and efficient pedestrian access
control. They are often used in settings
where high throughput of authorized
individuals is required, such as office
buildings, airports, corporate
headquarters, and government facilities
The primary purpose of turnstiles is to
control the entry and exit of pedestrians
into or out of a secured area. They are
often used in settings where access
needs to be regulated, such as public
transportation hubs, stadiums,
amusement parks, office buildings, and
more.
23. • Vehicle Access Control: Systems like automatic gates,
barriers, and license plate recognition are used to control
vehicular access to parking lots, garages, and restricted areas.
• Wireless Access Control: Utilizing wireless communication,
this type of access control system offers flexibility and scalability,
making it suitable for both small and large installations.
• Cloud-Based Access Control: Access control data and
management are hosted in the cloud, allowing for remote
monitoring and management of access points.
23
24. 24
Vehicle Access Control
Vehicle access control is a security
system that manages and regulates the
entry and exit of vehicles into a specific
area or facility. It is commonly used in
various environments, including
commercial properties, residential
complexes, parking lots, industrial
facilities, and gated communities. The
primary goal of vehicle access control is
to enhance security, improve traffic
management, and monitor vehicle
kawalan akses kenderaan
25. Wireless Access Control
25
Wireless access control refers to a security
system that uses wireless technology to
manage and regulate access to physical
spaces, such as buildings, rooms, or
restricted areas. This technology
eliminates the need for traditional wired
access control systems, which rely on
physical connections for communication.
Wireless access control offers greater
flexibility, scalability, and ease of
installation, making it a popular choice for
many organizations
Kawalan Akses Tanpa Wayar
26. 26
Cloud-Based Access Control
1.Cloud Computing: Cloud computing involves
delivering computing services (such as
servers, storage, databases, networking,
software, analytics, and intelligence) over the
internet. Cloud service providers host and
manage these services, allowing organizations
to leverage them without the need to own or
maintain physical infrastructure.
2.Access Control: Access control is the
process of regulating who can access specific
resources, data, or services within a system. It
involves authentication (verifying the identity
of users or entities), authorization (determining
what actions or data they are allowed to
access), and auditing (tracking and logging
access activities).
Kawalan Akses Berasaskan Awan
27. • Integrated Access Control: This involves the integration
of access control systems with other security systems
like surveillance cameras, alarms, and intrusion detection
to create a comprehensive security solution.
• Visitor Management Systems: These systems are
designed to manage and track visitors, issuing temporary
access credentials and monitoring their movements
within a facility.
• Each of these access control systems has its own
advantages and limitations, and the choice of system
depends on factors such as the level of security required,
the size and complexity of the facility, and budget
considerations 27
28. The primary purpose of an
integrated access control
system is to enhance security,
streamline access
management, and provide a
holistic approach to
safeguarding assets, data,
and personnel. An integrated
access control system serves
as a comprehensive and
centralized security solution
designed to regulate, monitor,
and manage access to
physical areas, digital
resources, and facilities. 28
Integrated Access Control Kawalan Akses Bersepadu
29. 29
Visitor Management Systems Sistem Pengurusan Pelawat
A visitor management
system (VMS) is a software-
based solution designed to
streamline and enhance the
process of managing visitors
to a facility or organization.
The primary purpose of a
visitor management system
is to improve security,
increase efficiency, and
create a positive and
controlled visitor experience.
32. 32
1.Enhanced Security:
1.One of the primary purposes of a visitor management system
is to enhance security by accurately verifying the identity of
visitors before granting them access to a facility. It helps
ensure that only authorized individuals gain entry.
2.Visitor Registration:
1.VMS allows organizations to register and record visitor
information, including their name, contact details, purpose of
visit, and the person or department they are visiting. This data
is essential for security, safety, and compliance
The Purpose of VMS
33. 33
3. Access Control:
1.VMS can be integrated with access control systems, allowing it
to issue temporary access credentials, such as visitor badges
or access cards. This ensures that visitors can only access
approved areas during their visit.
4. Improved Efficiency:
1.VMS streamlines the check-in process by automating visitor
registration. This reduces wait times and administrative
overhead, making the visitor experience more efficient and
pleasant.
5. Notification and Alerts:
1.VMS can automatically notify hosts or employees when their
expected visitors arrive. This ensures a warm welcome and
minimizes delays in meeting schedules.
34. 34
6. Visitor Badges:
1.VMS can print visitor badges with important information, such
as the visitor's name, photo, date, and purpose of the visit.
These badges enhance security by clearly identifying visitors.
7. Emergency Response:
1.In case of emergencies or evacuations, VMS can provide an
accurate record of the individuals present in the facility,
including visitors, helping security personnel and emergency
responders account for everyone's safety.
8. Compliance and Reporting:
1.VMS generates detailed reports on visitor activity and
compliance with security policies. This documentation is
valuable for audits and regulatory compliance
35. 35
9. Visitor Tracking:
1.VMS maintains a log of visitor arrivals, departures, and
movements within the facility. This information can be used for
security investigations or internal purposes.
10. Data Privacy :
1.VMS helps organizations comply with data privacy regulations by
securely storing visitor data, providing data access controls, and
enabling data removal when necessary.
11. Customization:
1.VMS can be customized to match the specific needs and
branding of an organization, creating a professional and
consistent visitor experience
36. 36
Visitor management systems are commonly used in a wide
range of settings, including corporate offices, government
buildings, educational institutions, healthcare facilities,
manufacturing plants, and recreational venues. Their ability
to improve security, efficiency, and compliance while
providing a welcoming experience for visitors makes them
an essential tool in modern access control and security
strategies.