Pages

Access Control Systems

Access Control Systems



Access control is an important part of a security guard’s work. Security personnel are hired to protect people, property and information. The purpose of access control is to make sure the movement of people, materials and information at a site is authorized.
You will be responsible for some type of access control at each site where you work, but the duties you will have to perform will vary greatly.


What are the different levels of access control?
The amount of access control needed at each site will vary from minimum to maximum, depending on what needs to be protected.

Minimum access control
This type of control is used at sites that allow general admission, such as malls. It assumes everyone is entering for lawful purposes. People are only denied entry by the security guard if rules are not followed or the law is broken.

Medium access control
This type of control is often used at office or residential buildings. The security guard or someone in the building may use an intercom to allow access to the property. The intercom system may discourage someone from coming in, but if they really want to get in they can enter behind someone who has authority to enter the building.

Maximum access control
This type of control is found at sites with high security, such as some government offices, labs, military bases, software manufacturers, etc. Sites like these use a combination of security personnel and alarm systems to have total access control in all parts of the property.

What are some common ways to control access?
Companies often use more than one type of access control at a site. Generally, as you
move from the perimeter of a property, to the outside of the building, to the centre of a
protected site, the access control becomes harder to get through.
Access Control Areas
A combination of controls may even be used in one part of a site. For example, access to the perimeter of a property may be controlled by a fence, infrared beam sensors, or a security guard in a booth. It is not possible to cover all of the combinations, but we can look at some of the more common types of access control by thinking about the different areas shown in the model above.

Property perimeter
Physical barriers such as fences, walls, gates, and booths are used. A security guard can control access in person from a booth at the entrance, or by remote control using a video camera.


Building perimeter and entrance
An alarm system will often be attached to doors and windows on the outside of the building. We will look more closely at Alarm Systems in the next section. Access control usually happens in one of two ways in this area. These ways are: entry through the security guard and entry through a mechanical or electronic device.


1. Entry through security guard
You may be asked to stand or sit at the main entrance of a site. Your main tasks are to check identification and to decide if people are authorized to enter.

Personnel recognition - This is often used at small sites. You let in only people who you recognize. Staff tells you if they are expecting any visitors. You use a special form to write down information about visitors. This method only works if you know each person who enters and if you see each person enter. If your attention is somewhere else or you don’t have time to identify everyone,
unauthorized people may enter.

ID systems - Many government offices use this method. All employees show you an ID card before entering. You check each ID card carefully.
Things to look for are:

  1. A coloured photo and physical description of the holder
  2. The full name and signature of the holder
  3. The company’s name and an issuing authority’s signature
  4. An expiry date
  5. A serial number (for the card itself or an employee number)


Special passes - In high security areas you may allow only people with special passes or badges to enter. You must be very familiar with this type of access
control so you know what to look for. If visitors and short-term workers want a pass to enter the area, they may have to give you a piece of ID such as their driver’s licence. Their names must be entered in a logbook. You return their ID when they give back the pass as they are leaving. In sites with maximum access control visitors may have their picture taken and be given a temporary ID card that they must wear until they leave the property.

Access control doesn’t work unless you follow the rules carefully for everyone. Some
people, especially employees who have worked at a site for many years, may become
angry or frustrated if they have to show their ID everyday. If you are new to a site you
will not be able to recognize all employees. Check ID cards even if you know the person.
The card may no longer be good. If someone challenges you remain calm, explain the
reason for security, record information in a logbook or report sheet, and follow your post
orders.
2. Entry through mechanical / electronic device
On medium access sites, a security guard does not always control access. Employees can
let themselves into the area. There are many ways that this happens.
Keys - Some employees are given a building master key that allows them to enter
the building and most areas inside. New technology is replacing the standard
metal key at many sites.
Touch keypads - A keypad is on the wall at the entrance. Users are given
passwords, codes, or personal identification numbers (PIN) that they must punch
in order to enter.
ID card tags - Some cards have a magnetic strip like you see on the back of a
debit card. Other cards have a bar code like you see on a store product. The user
swipes the card or puts it in a slot in the reader. The reader is mounted on the
wall or door. It checks the code on the card. If the card is authorized, the door is
unlocked for a short period of time.
Proximity cards - These cards work in a similar way to cards with stripes or bar
codes, but they do not have to touch the reader. Someone can unlock the door by
passing their card near the reader. These cards may show only an identification
number or one side may include photo ID. A key fob is a device that acts the
same way as a proximity card. It is a small plastic device that can be attached to a
key ring.

Biometric identification - Biographical information about individual employees
is stored in a data bank. This could include fingerprints, palm prints, retina
patterns (blood vessel patterns in the eye) or face recognition information. If an
employee wants to enter an area they must pass their hand, eye, or face by a
reader. If the reader matches this information with the stored data bank, the door
is unlocked. Because biometric data is unique to each person, this system can be
used to prevent theft or fraud. Unlike a password or PIN, a biometric trait cannot
be forgotten or lost.

Inside of building
An intruder is someone who enters an area without authorization. Alarms that are used to detect
intruders are called intrusion alarm systems. Access to valuable property inside buildings is often
controlled by an intrusion alarm system. This means that the security guard does not always have to be in the area of the object that needs protecting. They can move about more freely and perform other duties. More than one area can be monitored at once, and the alarm will alert the security guard to intruders. The following section will look more closely at these types of systems.



                                                                       Thank you

No comments:

Post a Comment