Alarm systems use sensors to detect unauthorized access and trigger a response from security personnel. However, some intruders may test response times to determine if an attack could succeed before authorities arrive. Surveillance cameras can act as both a deterrent when visible and be used to verify alarms or review past incidents. Access control methods monitor and control traffic through access points using systems like CCTV, identification cards, locks, and security guards. Identification policies and security checks at entry points supplement other access control methods.