This document provides an overview of access control systems. It discusses key aspects such as defining who is requesting access, where they are requesting access to, and when access is allowed. It also covers credential technologies like smart cards and biometrics. Proper key and credential management is emphasized as the most basic way to control physical access. Standards like HSPD-12 aim to increase security by establishing government-wide identification protocols.
Access control system for single to multi location security aspects.Not only access but access to multiple services within facility like elevator control and parking access
In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization. It is all about the physical security of the of the organization using the information technology and for the purpose of the restricting the access of unauthorized people and unauthorized employees. Saving your organization physically.
Access control system for single to multi location security aspects.Not only access but access to multiple services within facility like elevator control and parking access
In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization. It is all about the physical security of the of the organization using the information technology and for the purpose of the restricting the access of unauthorized people and unauthorized employees. Saving your organization physically.
Slides for a college course based on "Incident Response & Computer Forensics, Third Edition" by by Jason Luttgens, Matthew Pepe, and Kevin Mandia.
Teacher: Sam Bowne
Twitter: @sambowne
Website: https://samsclass.info/121/121_F16.shtml
This presentation covers the topic of access control in software. Access control is an essential part of every software application that manages data of any value. However, access control is also complex and hard to get right, both from a development and management point of view.
In this presentation, we first explore the concept and goals of access control in general. We then discuss the different models that exist in practice and in literature to reason about access control. We then investigate different approaches of how to enforce access control in an application. Overall, this sessions aims to provide deeper insights into access control in order to better reason about it and implement it correctly and efficiently.
A Building Management System (BMS) is a computer-based control system installed in buildings that controls and monitors the building’s mechanical and electrical equipment such as ventilation, lighting, power systems, fire systems, and security systems
Advantage and disadvantage of security systemsBeverlyIssac
The right systems can keep your valuables safe while saving you money in the process. They also give peace of mind and let you know someone will always be there in case of an emergency. For more : https://www.cspalarms.ca/service-areas/alarm-system-hamilton/
The WEP protocol was introduced with the original 802.11 standards as a means to provide authentication and encryption to wireless LAN implementations.
WPA, became available in 2003, and it was the Wi-Fi Alliance’s direct response and replacement to the increasingly apparent vulnerabilities of the WEP encryption standard
What is Wifi??
Working of Wifi
Advantages and Disadvantages
Wifi in Universities offices and Public and Privates Sectores
Uses
Why we use internet
Life Without internet
Slides for a college course based on "Incident Response & Computer Forensics, Third Edition" by by Jason Luttgens, Matthew Pepe, and Kevin Mandia.
Teacher: Sam Bowne
Twitter: @sambowne
Website: https://samsclass.info/121/121_F16.shtml
This presentation covers the topic of access control in software. Access control is an essential part of every software application that manages data of any value. However, access control is also complex and hard to get right, both from a development and management point of view.
In this presentation, we first explore the concept and goals of access control in general. We then discuss the different models that exist in practice and in literature to reason about access control. We then investigate different approaches of how to enforce access control in an application. Overall, this sessions aims to provide deeper insights into access control in order to better reason about it and implement it correctly and efficiently.
A Building Management System (BMS) is a computer-based control system installed in buildings that controls and monitors the building’s mechanical and electrical equipment such as ventilation, lighting, power systems, fire systems, and security systems
Advantage and disadvantage of security systemsBeverlyIssac
The right systems can keep your valuables safe while saving you money in the process. They also give peace of mind and let you know someone will always be there in case of an emergency. For more : https://www.cspalarms.ca/service-areas/alarm-system-hamilton/
The WEP protocol was introduced with the original 802.11 standards as a means to provide authentication and encryption to wireless LAN implementations.
WPA, became available in 2003, and it was the Wi-Fi Alliance’s direct response and replacement to the increasingly apparent vulnerabilities of the WEP encryption standard
What is Wifi??
Working of Wifi
Advantages and Disadvantages
Wifi in Universities offices and Public and Privates Sectores
Uses
Why we use internet
Life Without internet
Technology that identifies you based on your physical or behavioral traits- for added security to confirm that you are who you claim to be.(this ppt is very dear to me as i have given a talk on this topic twice. this also fetched me and migmar first prize at deen dayal upadhyay college- converging vectors - an inter college presentation competition organized by arya bhata science forum)
Este trabajo fue presentado como parte del curso Ingeniería y calidad del Software ofrecido como parte de la Especialización en Informática y Ciencias de la Computación en la Fundación Universitaria Konrad Lorenz
IBM i is securable BUT not secured by default. To help protect your organization from the increasing security threats, you must take control of all access points to your IBM i server. You can limit IBM i security threats by routinely assessing your risks and taking control of logon security, powerful authorities, and system access.
With the right tools and process, you can assure comprehensive control of unauthorized access and can trace any activity, suspicious or otherwise, on your IBM i systems.
Watch this on-demand webcast to learn:
• How to secure network access and communication ports
• How to implement different authentication options and tradeoffs
• How to limit the number of privileged user accounts
• How Precisely’s Assure Security can help
Webinar: Beyond Two-Factor: Secure Access Control for Office 365SecureAuth
James Romer, Chief Security Architect, discussed the requirements for achieving secure access control for Office 365, leveraging existing infrastructure and increasing security without compromising your user experience.
Explore how to move beyond two-factor authentication towards adaptive authentication which continuously analyzes risk-factors including, geo-location, behavioral biometrics and threat intelligence, to ensure your users are who they say they are.
In Federal Trade Commission v. Wyndham Worldwide Corp., 799 F.3d 236, (3d Cir. 2015), the FTC alleged Wyndham’s poor cybersecurity practices let hackers steal personal and financial information from hundreds of thousands of consumers on three different occasions. Are your cybersecurity practices leaving your law firm similarly vulnerable?
The FTC has presented 10 guidelines business should be following to build cybersecurity into their operations. Law firms can learn from these guidelines, developed by the FTC after 50 different cases. Learn from the errors of others in this unique presentation.
Presented by Joshua Lenon, lawyer-in-residence at Clio and Julianne Walsh, attorney-in-residence at Nextpoint, learn:
- How courts have recently interpreted the FTC’s power to regulate the cybersecurity practices of corporations and law firms;
- 10 practical tips for protecting your clients’ data in the cloud; and
- What legal technology providers are doing to build security into your law firm from the ground up.
Step Into Security Webinar - Physical Security Integration & Access Control -...Keith Harris
In LENSEC’s Step Into Security webinar, we take a look at integrations for physical security with a special focus on access control. In Part One, we focus on concepts and components.
Recently, access control has made big strides in technology incorporating biometrics, integrating with other security products, and moving to a digital deployment among other things. We'll provide an overview for end-users and security personnel.
LENSEC physical security expert Keith Harris will be presenting this topic. Keith is a veteran expert with extensive knowledge of security equipment. Keith has experience working with educators, law enforcement and others developing security solutions to meet their needs.
Please register for the upcoming webinar. Share this info with your colleagues and invite them to join us.
WEBINAR AGENDA:
• Access Control Deployment
• Building & Fire Codes
• Security Integration
• Choosing Components
Step Into Security Webinar Archive:
http://bit.ly/StepIntoSecurityWebinarArchive
What Does a Full Featured Security Strategy Look Like?Precisely
In today’s IT world, the threats from bad actors are increasing and the negative impacts of a data breach continue to rise. Responsible enterprises have an obligation to handle the personal data of their customers with care and protect their company’s information with all the tools at their disposal.
For IBM i customers, this includes system settings, company-wide security protocols and the strategic use of additional third-party solutions. These solutions should include things like multi factor authentication (MFA), auditing and SEIM features, access control, authority elevation, and more. In this presentation, we will help you understand how all these elements can work together to create an effective, comprehensive IBM i security environment.
Watch this on-demand webinar to learn about:
• taking a holistic approach to IBM i Security
• what to look for when you consider adding a security product to your IBM i IT infrastructure.
• the components to consider a comprehensive, effective security strategy
• how Precisely can help
Essential Layers of IBM i Security: System-Access SecurityPrecisely
Better understand the strategies and tactics to keep unauthorized users out of your IBM i and maintain tight controls over what authorized users can do once logged in.
Protecting Your Business from Unauthorized IBM i AccessPrecisely
Understanding and controlling all the points of access to IBM i systems
IBM i is securable BUT not secured by default. To comply with increasingly strict IT security regulations, you must take control of all access points to your IBM i server. You can limit IBM i security threats by routinely assessing risks and taking control of logon security, powerful authorities, and system access.
With the right tools and process, you can ensure comprehensive control of unauthorized access and can trace any activity, suspicious or otherwise on your IBM i systems.
View this webcast on-demand to learn:
• How to secure network access and communication port
• How to implement different authentication options and tradeoffs
• How to limit the number of privileged user accounts
• How Syncsort’s security solutions can help
An overview of current cyber security concerns and ways to combat them, as well as an introduction to some of the capabilities of Azure Active Directory
How to create secure, convenient and easy to manage homes?
Only those solutions will survive that can ensure the highest level of security and easy integration for third-parties.
You Can't Spell Enterprise Security without MFA Ping Identity
Sure, you can spell enterprise security without the letters M-F-A, but the modern digital enterprise isn't as secure without a strong multi-factor authentication (MFA) strategy. Enterprises are under attack, and credentials are a primary target. Many leading enterprises are enhancing their security and control with MFA, allowing them to move away from a high-risk, password-based security approach and to give their employees, partners, and customers a better user experience. View this slide deck for best practices for a MFA strategy.
Similar to Managing your access control systems (20)
An introduction to the cryptocurrency investment platform Binance Savings.Any kyc Account
Learn how to use Binance Savings to expand your bitcoin holdings. Discover how to maximize your earnings on one of the most reliable cryptocurrency exchange platforms, as well as how to earn interest on your cryptocurrency holdings and the various savings choices available.
Business Valuation Principles for EntrepreneursBen Wann
This insightful presentation is designed to equip entrepreneurs with the essential knowledge and tools needed to accurately value their businesses. Understanding business valuation is crucial for making informed decisions, whether you're seeking investment, planning to sell, or simply want to gauge your company's worth.
Company Valuation webinar series - Tuesday, 4 June 2024FelixPerez547899
This session provided an update as to the latest valuation data in the UK and then delved into a discussion on the upcoming election and the impacts on valuation. We finished, as always with a Q&A
Cracking the Workplace Discipline Code Main.pptxWorkforce Group
Cultivating and maintaining discipline within teams is a critical differentiator for successful organisations.
Forward-thinking leaders and business managers understand the impact that discipline has on organisational success. A disciplined workforce operates with clarity, focus, and a shared understanding of expectations, ultimately driving better results, optimising productivity, and facilitating seamless collaboration.
Although discipline is not a one-size-fits-all approach, it can help create a work environment that encourages personal growth and accountability rather than solely relying on punitive measures.
In this deck, you will learn the significance of workplace discipline for organisational success. You’ll also learn
• Four (4) workplace discipline methods you should consider
• The best and most practical approach to implementing workplace discipline.
• Three (3) key tips to maintain a disciplined workplace.
In the Adani-Hindenburg case, what is SEBI investigating.pptxAdani case
Adani SEBI investigation revealed that the latter had sought information from five foreign jurisdictions concerning the holdings of the firm’s foreign portfolio investors (FPIs) in relation to the alleged violations of the MPS Regulations. Nevertheless, the economic interest of the twelve FPIs based in tax haven jurisdictions still needs to be determined. The Adani Group firms classed these FPIs as public shareholders. According to Hindenburg, FPIs were used to get around regulatory standards.
Premium MEAN Stack Development Solutions for Modern BusinessesSynapseIndia
Stay ahead of the curve with our premium MEAN Stack Development Solutions. Our expert developers utilize MongoDB, Express.js, AngularJS, and Node.js to create modern and responsive web applications. Trust us for cutting-edge solutions that drive your business growth and success.
Know more: https://www.synapseindia.com/technology/mean-stack-development-company.html
Recruiting in the Digital Age: A Social Media MasterclassLuanWise
In this masterclass, presented at the Global HR Summit on 5th June 2024, Luan Wise explored the essential features of social media platforms that support talent acquisition, including LinkedIn, Facebook, Instagram, X (formerly Twitter) and TikTok.
2. AGENDA
Access Control Systems
The Balancing Act
Access Control Defined
Key/Credential Management
Control Configuration
Software Features and Capabilities
Controller Hardware
Break
Peripheral Components
Access Controlled Door Hardware Types and Specifications
Trends and Convergence
Resources
3. How to get the most…
HARVARD RESEARCH STUDY
VERBAL COMMUNICATION
Approx 100% was what the speaker wanted to say
Approx 80% was said
Approx 60% was heard
Approx 40% was remembered after 3 hours
Approx 15% was remembered after 3 days
Approx 0-5% was remembered after 3 months
VERBAL + VISUAL COMMUNICATION
Approx 60% was remembered after 3 days
Approx 40-50% was remembered after 3 months
VERBAL + VISUAL + NOTES
Approx 80% was remembered after 3 days
Approx 60-70% was remembered after 3 months
4. How to get the most…
Why are we here?
Gain Knowledge.
Asking Questions.
5. The Balancing Act
• Security
• Balancing Openness and Public Safety
• Applying new technologies and lessons learned
• Improving the physical security of buildings
• Protecting people and assets while maintaining
a pleasant work environment.
• The challenge facing government officials,
realtors and corporate building owners.
6. Security….”The Absolutes”
• Our world is dangerous and will get more dangerous
• We take security for granted till something goes
wrong.
• Security is inconvenient- and expensive
• Paranoid or Prepared? Politics!
• Constant vigilance – Almost overwhelming!
• 100%, guaranteed security ?? No such thing !
• 100% security = 0% accessibility
• 100% security = 0% productivity
7. Architects and Security
• Buildings must be functional,
comfortable, inspirational – SAFE
• You don’t design a building for security.
You secure the design of a building
• Rethinking Security – new meaning to
architects
10. The WHO
• The person, or device, requesting access to an
area, or asset, we want to control.
• Authentication Methods
…something the person / device…
• HAS – Physical
• KNOWS – Knowledge of
• IS / ARE – Biometric
11. The WHERE / WHAT
• The place or process we want to allow authorized
persons to get to.
• Physical and Logical
• Controlled or Restricted area
• As it relates to both manual and electronic
access controls this is critical to our access
management plan
• Vending, gas dispensing, copier machine
usage, time and attendance, meal plans and
more
12. The WHEN
• The time period or interval when access is
granted or denied.
• Can be managed with both on line and off
line systems
• Also used for setting events and logic
statements for:
• Triggers
• Time Zones
• Timing responses to alarms
• Timing for routing of messages to other devices
15. Ultimate Key Management
Unauthorized key duplication remains the most
violated security policy and one of the largest
problem of facility managers
• Knowing exactly who has keys
• Knowing areas of access of each key holder
• Knowing key blanks are not readily available
• Knowing keys cannot be copied without proper
authorization
• Having a policy on lost keys
• When issuing temporary use of keys, keeping record trail
16. Yesterday’s Key Control
Conventional A conventional keyway is one which the
manufacturer will sell to anyone, it may most
Keyways common, or the most used, or the "standard"
or it may be family of keyways
D0 NOT Key # 123
DUPLICATE
PLAIN STAMPED
BOWS BOWS
17. 5 Steps To Key Management
COMPLETE
KEY
CONTROL STRONG CONTROLLED LEGAL AUDIT ENFORCEMENT
UTILITY KEY CONTRACTS CONTROLS
PATENT BLANKS
Not a Not Agreements Know Must Be
Design Available of Where Aware of
Patent to all Control Blanks Unauthorized
Customers Are Copies
18. Today’s Key Management
1. Patented keyways
Blade
Utility patent gives manufacturer exclusive
manufacturing rights
Security
Manufacturer control distribution
Ledge
Security Leg Patent good for 20 years
Millings for Imitation manufacturers cannot duplicate
Keyway Blade Assures protection to facility / owner
19. Today’s Key Management
2A. Manufacturer Controls
Policy
1. Verify all signatures
2. Policy and procedures in place
3.
4
Signature verification
Controlled access to product areas
Ship key blanks direct to end user
Has return key policy
Provides specially coined blanks
20. Today’s Key Management
Request for New Key 2B. Facility/Owner Controls
DATE: 07-04-05
Policy and procedures in place supported by
TO: Lock shop
upper management
ISSUE TO: Bill Jones
Locksmith administrator on staff
NO. OF KEYS: 1 Locked storage
APPROVED BY: C T Smith Supervisor approval of new keys
Employee signs for key
ISSUE TO : Bill Jones
By Lock Shop Should have penalty attached
KEY NUMBER: 123
All keys numbered and logged into system
KEY SET: AB15
ISSUE DATE: 07-07-05 Procedure for keys to be returned
ISSUED BY: CH
DATE ISSUED: 07-07-05 should have penalty attached
RECEIVED BY: Bill Jones
RETURNED DATE
Additional procedures:
Cleaning crew
Outside contractors
21. Today’s Key Management
3. Contracts and Agreements
Protects facility / owner
We agree Protects distributor
Protects manufacturer
Summarizes responsibilities to all
parties
Provides guide lines
Eliminates misunderstanding
22. Today’s Key Management
4. Audit Controls
Keep records – Use Software
AB15
1215 Use manufacturers original blanks
123 Reduce master keying
Have employees carry more
than one key
Stamp keys with code
Utilize available forms
Use sealed key rings
Use a key cabinet; electronic or manual
25. The Credential
• Most visible component of the system
• Issued to personnel as “electronic keys”
• Several Card Technologies
• Badge Construction
• Degree of Security Required
• Durability
• Reader Environment
• Convenience and Price
• Performance
26. Card / I D Technology Types
• Barium Ferrite
• Bar Codes
• Magnetic Stripe
• Wiegand
• Proximity
• Smart Card
• Hybrid
27. Biometrics – Another Key
• Biometrics and the “Smart Card”
• Iris Scan
• Finger Print
• Facial Recognition
• Retinal Scan
• Voice Recognition
• Hand Geometry
• Others on the horizon
28. Credentials / Smartcards
Access PC Login
Control
Time &
Attendance
Personal Data
Photo Cafeteria
Vending
Free
Free
29. Access Controls more about the “key”
• The “Common Access Card”
• FIPS 201 / HSPD12
• Database sharing trends
• Communications options
• Encryption – DES, AES
• PINs
30. HSPD-12
Homeland Security Presidential Directive/Hspd-12
Subject: Policy for a Common Identification Standard for Federal
Employees and Contractors
(1) Wide variations in the quality and security of forms of
identification used to gain access to secure Federal and other
facilities where there is potential for terrorist attacks need to be
eliminated. Therefore, it is the policy of the United States to enhance
security, increase Government efficiency, reduce identity fraud, and
protect personal privacy by establishing a mandatory, Government-
wide standard for secure and reliable forms of identification issued by
the Federal Government to its employees and contractors (including
contractor employees).
34. Multi-User / Multi-Door Systems
• Instant Multiple Notification Options
• LAN Access
• Discretionary Reporting
• Mandatory Controls
35. Enterprise Systems
ACCESS
CONTROL DIGITAL VIDEO
SURVEILLANCE &
MANAGEMENT
IDENTITY
MANAGEMENT INTEGRATED
ALARM
MANAGEMENT
INFORMATION
SECURITY MULTI-TENANT
PROPERTY
MANAGEMENT
BUILDING
AUTOMATION
VISITOR
MANAGEMENT
ASSET
WIRELESS
MANAGEMENT
ACCESS
INTRUSION
INTERCOM DETECTION
COMMUNICATION FIRE ALARM
SYSTEMS SYSTEMS
36. Enterprise Systems
Human Access
Credential Resources Control Biometric
Management Templates
Medical Visitor
Information Management
Bringing together
ERP disparate databases Social
Security
or information
Time and sources Incident
Attendance Reporting
Criminal
Smart Cards History
Active
Payroll
Directory/LDAP
37. System Architecture
Life Safety
Visitor
Photo Imaging Management Management
POTS
CCTV System RS-232
Access Control
Ethernet Network
Dial-up Modem LAN/WAN
Cellular
Direct Connect
RS-232 or RS-422 RS-422
Field Panel Door Controller Field Panel Field Panel
RS-232
Modem HVAC Field Panel
Field Panel
Readers
38. SOFTWARE
• Integrated solutions sets
• Network ready
• SQL and Oracle
• Linux based embedded solutions
• Partition-able database
• Windows XP, NT, 2000, Vista Compatibility
• Web enabled
• Web Embedded
39. The Application Software
• This is the GUI- It should be intuitive easy to train
operators and managers
• The database manager
• Ability to partition and filter views based on passwords
• Import and export features
• Potential interface to HR database systems
• May be Standalone or
• Part of a network
• Numerous work stations
• Redundant emergency backup
• Full set of utilities for storage and archiving
40. Desired Software Features
• Migration path (scalability)
• Alarm Monitor capacity
• Anti-Pass back
• Event Triggers
• Time zones and Holidays
• Clearance (area) controls
• CCTV Matrix Switching
• Digital Video recorder event linking
41. Desired Software Features
•No limit on system scalability.
• Unlimited Card Readers.
• Unlimited Inputs/Outputs.
• Unlimited Cardholders.
• Unlimited Control Panels.
• Unlimited Holidays.
•Guard Tour application
•Elevator Control
•Full featured Badging
•Real time status monitoring
•Multiple reader technology
support
•Microsoft database
•Report Manager
•Visitor Management
•ODBC and MDAC Compliant
•Potential web access/enabled
50. Integrated Applications
• Photo I D Creation
• Bio-metric enrollment
• Alarm management
• Access Management
• Air Quality monitoring
• Visitor Controls
• Digital Video event linking
• Event and data base linking
• Camera Controls
• Virtual CCTV Matrixes
• CCTV Analytics
• Smartcard Application Support
51. Access Control Panel Operation
• Card is presented data sent to Panel
• Panel compares information
• Grants/Denies access
• Based on Card Status
• Time of Day
• Cardholder’s access privileges
• Other Administrator selected features
52. Access Control Panels
• Contain Microprocessors
• On-board Random Access Memory (RAM)
• Upgradeable Software stored in Erasable Program Read
Only Memory (EPROM)
• System Administrator or authorized web client
enters all information related to system at host
computer or direct to board via web with on
board software in panel
• Information may be downloaded to Access
Control Panel’s RAM
53. Access Control Panels
• Once downloaded/programmed a Panel
can process information locally.
• “Intelligent” panels inform the Host of all
actions taken, including time and date
• Often referred to as “distributed processing”
• Saves Host processing time
54. Access Control Panel Operations
• May be configured many ways
• Can store thousands & some users are requiring
Millions of records!
• Multiple access levels
• Time Zones
• Thousands of historical transactions
• Quantum leaps in storage abound
55. Access Control Panel Operations
• Can support Inputs
• Can detect an input’s change of state, process the
information and report it to the host computer/ or web based
client on alarm
• Typical Inputs include door monitor and request to exit (or
bypass) devices
• Can support Outputs
• Door locking mechanisms
• Sound or broadcast alarm devices
• Lights, sirens, bells, digital dialers, etc.
• Can be programmed so an Input activates or deactivates
outputs automatically
• Example: Glass break sensor (input) might activate a
siren (output)
57. Access Control Panel Wiring
• Three different approaches to cabling of
readers
• Bus Cabling
• Readers can be wired to a common cable that runs back to the
panel
• Saves wiring costs when readers are close to each other
• Star Cabling
• Readers can be wired to the panel individually
• Combination Bus and Star sometimes is best
• Independent IP / Network Drop communications via Network
58. Access Control Panel Trends
• Distributed intelligence
• Embedded software – web enabled data
management
• FIPS- 201 for Federal Employees
• Full feature set resident at the local panel
• POTS pack up / cellular back up
• HiCap memory backup
• On line and off line capacity
• Bio-metric / Smartcard
• Integrated into lock hardware
68. The Basics: Electric Locks
Maglocks
Strikes
Cylindrical
Mortise
Exits
Peripherals
69. ELECTRIFIED HARDWARE
Benefits of Electrified Hardware
Safety Security
Control & Monitoring Remote Locking
Reduces Manpower Convenience
ADA requirements
Performs functions normally executed manually, usually
from remote location or automated.
Must specify a system with all components compatible.
One component will not work without the others.
71. ACCESS CONTROL HARDWARE
Parts of a Regulated
Power Supply
INPUT Reduces Voltage
120VA TRANSFORME
C R
RECTIFIER Converts AC to DC
CAPACITOR Stores needed current
FILTER Eliminates “Noise”
OUTPUT REGULATOR Keeps Output Constant
24VDC
72. ACCESS CONTROL HARDWARE
The power supply must furnish the
SAME voltage as required by the
load.
The current (amps) available from
the power supply must be
EQUAL TO or GREATER THAN that
required by the total load of the
system.
73. ACCESS CONTROL HARDWARE
Converts electrical energy into another form I.e.,
unlocks a solenoid, retracts a latch bolt, etc
Performs the work required
Electric Lock or Strike
Electric Exit Device
Closer / Holder
Electromagnetic
Holders
74. ACCESS CONTROL HARDWARE
Terminology
FAIL SAFE FAIL SECURE
• Lock or locking device (non-fail safe)
that remains • Lock or locking device
UNLOCKED on loss of that remains LOCKED
power on loss of power
75. ACCESS CONTROL HARDWARE
Need to Know to
Select Power
Supply
Electrical Characteristics of a Load
• Current Draw In Amps
• Voltage Required
• Fail Safe / Fail Secure
76. ACCESS CONTROL HARDWARE
Switches are used to control a locking device
or to signal a monitoring device
Key Pad
Key Switch
Toggle Switch
Push Button
Stand Alone System
Access Control
System
77. ACCESS CONTROL HARDWARE
Switches are used to control a locking device
or to signal a monitoring device
Each switch has one movable contact, the POLE, and one or
more fixed contacts, the THROWS
Normally open
SWITCH SYMBOL
78. ACCESS CONTROL HARDWARE
Switches are used to control a locking device
or to signal a monitoring device
Each switch has one movable contact, the POLE, and one or
more fixed contacts, the THROWS
Normally closed
SWITCH SYMBOL
79. ACCESS CONTROL HARDWARE
Terminology
MAINTAINED MOMENTARY
CONTACT CONTACT
• A switch designed for • A spring loaded switch
applications requiring designed for applications
sustained contact; but with requiring constant contact;
provision for resetting when pressure is removed,
i.e., ordinary light switch reverts back to original
position
i.e., door bell
80. ACCESS CONTROL HARDWARE
Carries current through system
The more distance between the
power source and the load, a
heavier wire gauge is required
# 1 TROUBLESHOOTING PROBLEM
81. ACCESS CONTROL HARDWARE
Need to Know
Size of Conductor (Gauge)
Length of Conductor (Resistance)
The farther the load is from the power supply, the more
resistance is experienced; a heavier gauge wire is required
82. ACCESS CONTROL HARDWARE
MINIMUM WIRE GAUGE FOR 24V DC or AC
Distance in feet from Power Supply to Locking Device
25 50 100 150 200 250 300 400 500
0.25 18 18 18 18 18 18 18 18 16
0.50 18 18 18 18 16 16 16 14 14
0.75 18 18 18 18 16 16 14 14
A
M 1.00 18 18 18 16 16 14 14
P
S
1.50 18 18 18 16 16 14
2.00 18 18 16 16 14
2.50 18 18 16 14
3.00 18 16 14
3.50 18 16 14
83. ACCESS CONTROL HARDWARE
Elements of a System
HARDWARE SYSTEM
ONE LIST THREE WIRING
DIAGRAM
OPERATIONS
NARRATIVE
TWO ELEVATION
DRAWING FOUR
84. ACCESS CONTROL HARDWARE
REQUIREMENTS
1. 2. • Outside Operation
OPERATIONS HARDWARE • At Rest (while locked)
NARRATIVE LIST • Electrically Unlock
• Mechanically Unlock
• Power Failure
• LED’s
3. 4. • Inside Operation
ELEVATION WIRING
DRAWING DIAGRAM
85. ACCESS CONTROL HARDWARE
1. 2. 1. Power Supply
OPERATIONS HARDWARE 2. Key Pad
NARRATIVE LIST 3. Power Transfer
4. Electric Exit Device
3. 4.
ELEVATION WIRING
DRAWING DIAGRAM
86. ACCESS CONTROL HARDWARE
Power 120VAC input
Supply
1. 2.
OPERATIONS HARDWARE
NARRATIVE LIST
3. 4.
ELEVATION WIRING
DRAWING DIAGRAM
87. ACCESS CONTROL HARDWARE
1. 2.
OPERATIONS HARDWARE
NARRATIVE LIST
3. 4.
ELEVATION WIRING
DRAWING DIAGRAM
88. CHOICES
Making Hardware Selections
Based On Owner’s
Instructions
Cashier's Door from Drivers Lounge
Closed and Locked at all Times
Must Be Entered During Day Employees
Secretary To Remotely Unlock Door
Management Always Able To Enter
*
CASHIER DRIVERS
LOUNGE
89. EXAMPLE
1. OPERATIONS 2. HARDWARE
NARRATIVE LIST
Door is normally closed, latched and
secure from the outside. Depressing Load
the push switch will unlock the electric Electric Strike
strike to allow ingress. 712NFS 24VDC
Door will relock as soon as
push button returns to normal position. Switch
Push Button
Loss of power, the door will PB
remain locked. Power Supply
Enter by key at all times.
Transformer
Free egress from inside
TP-24-2
at all times.
90. EXAMPLE
Transformer GAGE AND NUMBER
24VAC output OF CONDUCTORS
3. ELEVATION TP-24-2 18 ga
TO 120VAC INPUT
RISER
DIAGRAM 18 ga
Rectifier
712NFS
Electric PB
Strike
91. EXAMPLE
4. WIRING
DIAGRAM
120VAC Pushbutton Locked
Un-
Transformer Locked
Electric Strike
PUSH
TO
EXIT
NC
C
Non-
polarized NO
+ -
Systems Wiring Diagram or
Point to Point Wiring Diagram
92. COMPONENTS & ELEMENTS
4 COMPONENTS
POWER LOAD SWITCH CONDUCTORS
SUPPLY
OPERATIONS HARDWARE ELEVATION WIRING
NARRATIVE LIST DRAWING DIAGRAM
4 ELEMENTS
94. Access Control Trends
Embedded Prox Technology
Monitoring Options
Request To Exit
Door Contact
Keyswitch Monitoring
Other options…
95. Convergence
Analog to IP (Security to IT)
Applications Convergence
Physical and Cyber
“Soon the security industry will move to systems in which there
are no analog or proprietary wired devices at all; where all
devices connect to the Ethernet infrastructure. The knowledge
of how to design efficient network systems and how to secure
those systems is paramount to successful security systems.
This is the future of security technology”
Thomas Norman, Protection Partners International
Integrated Security Systems Design
96. Threats of Converged Enterprise
Targets
Physical
Attack Physical
Security
Facilities People
Cyber Intrusion Identifies
Mode Valued Targets
of
Attack Physical Attacks
Against Cyber Media Computers
Information
Attack Information
Security Information $$$
97. Convergence Migration
Disparate Building Networks Intelligent Converged Environment
IP Communications
Fire Lighting
Physical Elevator
Security
Visitor 24 / 7
Access Monitor
Energy HVAC
WAN
98. Convergence Benefits
Benefits: Lighting
Safety and security
Elevator
Environmental sustainability
Services and Technologies
Occupant comfort 24/7 Monitor
Organizational flexibility
Streamlined operations HVAC
Reduced costs
Fire
Energy savings
Managed services
Video surveillance
Data mining
Process Measurement Access
Energy
100. Resources
Reduce security vulnerabilities in all types of facilities.
The industry's first-ever guide for exterior and interior
security features, NFPA 730: Guide for Premises Security
addresses security in all occupancies from residential
dwellings to large industrial complexes. Uniform guidelines
help you assess vulnerability and design appropriate security
plans.
Provisions describe construction, protection, and occupancy
features and practices intended to reduce security risks to
life and property.
Topics covered include:
General requirements and facility classifications
Security vulnerability assessment
Exterior security devices and systems
Physical security devices
Interior security systems
Security planning
Measures to control security vulnerabilities in educational,
healthcare, and other facilities
The Guide also addresses protocols for special events, and
the responsibilities of security personnel.
(Approx. 88 pp., 2006)
101. Resources
Ensure the quality and reliability of security system
installations
NFPA 731; Installation of Electronic Premises Security
Systems is the first Standard developed primarily to define the
means of signal initiation, transmission, notification, and
annunciation, as well as the levels of performance and the
reliability of electronic security systems.
Requirements cover every step of security equipment
installation, with provisions for the application, location,
performance, testing, and maintenance of physical security
systems and their components.
Detailed chapters are included for:
Intrusion detection systems
Electronic access control systems
Video surveillance systems
Holdup, duress, and ambush systems
Testing and inspection
Rules address the protected premises from the property line to
the interior of the premises. NFPA 731 also references or
incorporates provisions from applicable UL, SIA, and other
standards.
(Approx. 43 pp., 2006)
102. ETHICS IN SECURITY
Physical Security Professionals must
adhere to the Code of Professional
Responsibility, agreeing to:
• Perform professional duties in accordance with the law and
the highest moral principles.
• Observe the precepts of truthfulness, honesty, and
integrity.
• Be faithful, competent, and diligent in discharging their
professional duties.
• Safeguard confidential and privileged information and
exercise due care to prevent its improper disclosure.
• Not maliciously injure the professional reputation or
practice of colleagues, clients, or employees.