Last Updated on September 26, 2024 by Ranga
Nowadays, most sites rely on a combination of security personnel and access control system to manage the movement of people, vehicles, and goods.
Beyond physical security, organizations can integrate a range of tools and technologies to strengthen and enforce the access control policy at the ACP. These access control systems, or access control technologies, are typically divided into two main categories.
1. Mechanical access control tools;
These are typically described as locks, barriers, and systems that require manual operation. Examples include:
- Manually operated barrier
- Remotely operated barrier
- Chain or rope
- Sliding gate
- Lock and key
- Combination lock
- Deadbolt
- Physically supervised door
2. Electronic access control;
The security industry offers a wide range of electronic access control tools, with multiple methods available for implementation. These technologies can assist with:
- Attendance management
- Canceling access privileges
- Accounting for personnel during emergencies, such as fire evacuations
Electronic access control technology can be monitored through the security control room, allowing for a more flexible ACP procedure on-site. Devices are categorized by their specific functions, each with its own advantages and vulnerabilities.
-
RFID:
This technology is commonly used in the security industry as a key card.
Feature;
- Vicinity reading (6-10m reading distance)
- Proximity reading (approx. 10cm distance)
- No personal details stored in the card, only a number that references a remote database
Strengths;
- Simple to issue and carry
- Rapid logging of the user, location, time, etc.
Weakness:
- Vulnerable to theft
- No verification of authorized owner using the card
2. Passcode access joystick
The security department or admin department provides an authorized user with a digital PIN after securely storing their data in the system. Only the authorized individual can access the area by entering the correct PIN.
Strength:
- Only the user will know their passcode
- Less vulnerable to theft
Weakness:
- Can be shared by dishonest users
- Maybe guessed by others
3. Biometric:
Reading of biometric information of the person such as fingertips, voice and eye retina, etc.
Features;
- Unique to each individual
- Personally identifiable data stored in a database
- Useful for personnel entry points
Strength:
- High level of security
- Difficult to falsify diametrically readings
Weakness:
- May be costly to install and manage
4. Iris and fingerprint scanning
There are various brands under this technology. A device can be installed at the entry point, door, and restricted area. It can read the previously installed data. For example; the door or gate only opens when the user scans his fingertips.
Access control zones;
While security staff aren’t directly responsible for designing the Access Control Point (ACP), having a clear understanding of the site’s layout is crucial for performing their duties effectively. Typically, the site is structured into three key zones:
- Approach Zone
- Access Control Zone
- Response Zone
Approach Zone;
- A road approaching the front gate of a site or facility
- Pathway to the lobby of a corporate building
- Departures hall of an airport
Technology installation;
- CCTV Cameras
- Motion sensors
- Vehicle speed sensors
- Security staff
Access control zone;
- Customs and immigration control at an airport
- Entry gate at a sports stadium
- Entry gate at an industrial site
Systems may contain;
- Queuing and movement control
- Security screening (additional methods of detection)
- ID inspection
- Physical barriers
Response zone;
- Car parking areas placed between an ACP and the entry point of a building or facility
- Secondary perimeter lines inside a military camp
The system may contain;
- Final denial barriers
- Enough space to allow a response time
Conclusion:
Every access control system and technology comes with its own set of strengths and weaknesses, and security staff needs to be aware of them.
Remember, even the most advanced access control system in an organization isn’t foolproof, as criminals are always looking for ways to exploit vulnerabilities.
Ultimately, site safety hinges on how effectively security personnel execute their duties in conjunction with these systems.
I am a student of BAK College. The recent paper competition gave me a lot of headaches, and I checked a lot of information. Finally, after reading your article, it suddenly dawned on me that I can still have such an idea. grateful. But I still have some questions, hope you can help me.
Thanks for sharing. I read many of your blog posts, cool, your blog is very good.