Module 2 - Implementing Access Control

  • May 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Module 2 - Implementing Access Control as PDF for free.

More details

  • Words: 1,406
  • Pages: 10
Module 2

ACCESS CONTROL FUNDAMENTALS 1. Managing access control in large areas. Outcome 1.1

The learner is able to identify first level access points to a campus and building.

Key Question

Where does one begin to control access to a campus or building?

Key Text

Entrances to campuses and buildings are the most obvious points of access to anyone wishing to gain entry unlawfully, but are fortunately also the easiest to identify and control. In addition any weakness in the perimeter must be secured – e.g. fences in the case of campuses and ground floor windows or emergency fire exits in buildings.

Lab

Handout - building diagram. Identify all access points

Page 1 of 10

5’00”

Module 2

ACCESS CONTROL FUNDAMENTALS 1. Managing access control in large areas Outcome 1.2

The learner is able to understand the importance of controlling access to the internal areas of a building.

Key Question

Now that we have allowed a valid person into the building, do we need to limit their access to various areas inside the building? If so, why?

Key Text

In large buildings everything cannot be locked away constantly, and neither is it possible for everything to be watched by someone all the time. Access control and surveillance equipment under the control of security personnel has a major role to play in protecting assets. Information protection in the form of either computer data or physical paper documents is vital. The safety of people is a matter of great concern and it is therefore vital that they are protected in secure conditions. Terrorists are aware that a successful strike at the operations centre will effectively compromise security in all other areas, therefore the operations centre needs to be very secure. No exceptions to security policy should be allowed and all procedures should be followed closely.

Lab

Indicate high sensitivity areas in diagram. Page 2 of 10

5’00”

Module 2

ACCESS CONTROL FUNDAMENTALS 1. Managing access control in large areas Outcome 1.3

The learner is able to understand how access control and monitoring of large areas can be made easier by means of zoning.

Key Question

How can we subdivide large areas to make access control easier?

Key Text

Dividing a building up into separate areas called zones is done for two reasons, namely the size of the area may be too big for one team to handle, and as we saw in the previous module, some areas have a higher strategic value to us. Therefore zoning a building or campus is an exercise in risk management. The objective is to identify and then limit access to high security areas and to direct the flow of other traffic away from those areas in such a way that a small team of personnel are able to effectively deal with all problems arising. Each zone has its own boundaries, defined by access ways such as stairways, lifts, doorways and corridors, all of which need to be monitored by physical presence or through the use of technology.

Lab

Outline appropriate zones on your building diagram

Page 3 of 10

10’00”

Module 2

ACCESS CONTROL FUNDAMENTALS 2. Monitoring movement between zones. Outcome 2.1

The learner can identify the four main technologies used in access control.

Key Question

What technology is available to control access between zones?

Key Text

Typically the technologies available falls into four categories, namely turnstiles and magnetic door locks, access card readers, optical motion detectors and cameras. Based on the strategic importance of different zones, decisions will be made as to what the most appropriate technology or combinations of these technologies will be used. Of course all access points to a zone should have the same level of security. For instance, in a high security zone, personnel, mag locks, readers, optics and cameras may be used. In a low security zone, perhaps only a reader and mag lock may be used.

Lab

Brief explanations of various means of monitoring within zones. 2’00”

Page 4 of 10

Module 2

ACCESS CONTROL FUNDAMENTALS 2. Monitoring movement between zones Outcome 2.2

The learner understands the role of turnstiles.

Key Question

Where are turnstiles used?

Key Text

Turnstiles provide a physical barrier as a means of controlling access. They are usually an initial form of access control in high traffic areas such as the entrance to a building. Turnstiles can control pedestrian traffic entering or exiting a building or a specific area of a building or campus. Because they are not a complete physical barrier, they should always be manned by security personnel.

Lab

Add turnstiles to diagram.

5’00”

Page 5 of 10

Module 2

ACCESS CONTROL FUNDAMENTALS 2. Monitoring movement between zones Outcome 2.3

The learner understands how magnetic door locks operate.

Key Question

How does a mag lock operate and when is it used?

Key Text

‘Mag’ or magnetic locks, hold a door securely closed until released by the access control computer system. It will do this when it receives valid card identification from an active card reader mounted near the door for that purpose. They are usually fitted to unmanned doors where access needs to be monitored or access is limited to particular people.

Lab

Add mag locks to diagram.

5’00”

Page 6 of 10

Module 2

ACCESS CONTROL FUNDAMENTALS 2. Monitoring movement between zones Outcome 2.4

The learner understands how active card readers operate.

Key Question

What is an active card reader and how does it work?

Key Text

Active card readers are a means of unobtrusively monitoring where any person may be at any time and whether they have the right to be in any particular zone. Each person authorised to be in a building or on campus is issued an access card which they are to carry and display at all times. Active card readers are able to sense these cards and can be used to monitor the location of the card holder on the campus. These readers are also used at doors to open the mag locks if the card is so authorised. Readers are usually placed on both sides of doors with mag locks, at turnstiles and in greater numbers in high security areas.

Lab

Add readers to diagram.

5’00”

Page 7 of 10

Module 2

ACCESS CONTROL FUNDAMENTALS 2. Monitoring movement between zones Outcome 2.5

The learner understands the purpose of optics.

Key Question

Where are optics used and how do they function?

Key Text

“Optics” are devices that monitor pedestrian traffic at a particular place. Typically they can either be fairly uncomplicated devices that simply recognise that someone went past, or more sophisticated devices that can tell which direction the person was going.

Lab

Insert optics in appropriate positions on your diagram.

Page 8 of 10

5’00”

Module 2

ACCESS CONTROL FUNDAMENTALS 2. Monitoring movement between zones Outcome 2.6

The learner understands how video surveillance cameras operate.

Key Question

How do video cameras contribute to access control?

Key Text

The placement of cameras at strategic points can be most effective. They can be on duty constantly particularly in areas that are seldom frequented but important from a security viewpoint. Cameras are programmed to begin recording when they pick up an exception for later playback. Video recordings can immediately be relayed to your screen for a visual assessment of what happened in the affected zone. Many cameras can be monitored simultaneously on your screen. Cameras are usually placed in elevated positions to give maximum coverage of the area being monitored.

Lab

Add video cameras to diagram.

Page 9 of 10

5’00”

Module 2

ACCESS CONTROL FUNDAMENTALS 2. Monitoring movement between zones Outcome 2.7

The learner appreciates the importance of their role in access control.

Key Question

Why is technology only part of the success of access control?

Key Text

The human element of any access control system is vital to its success. The ultimate responsibility of ensuring a system operates to its potential rests with those given the authority to control access. Any computer system can only operate within its bounds, but has no capacity for objective reasoning and is therefore no match for a well trained and alert security official. At best it is a tool that can make your life easier by taking care of the monotonous part of your job. Like any tool, the success of your experience with it will rest very much with you and how well you understand it and use it.

Lab

Discuss.

5’00”

Page 10 of 10

Related Documents