1 / 28

ACCESS CONTROLS

ACCESS CONTROLS. Electronic alarm systems provide another element of defending a company’s assets from loss. A system must: be planned to operate without major problems. be economically feasible for the property or the building which is being protected. Alarms can be used to: detect fire.

francesk
Download Presentation

ACCESS CONTROLS

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ACCESS CONTROLS

  2. Electronic alarm systems provide another element of defending a company’s assets from loss. A system must: • be planned to operate without major problems. • be economically feasible for the property or the building which is being protected. • Alarms can be used to: • detect fire. • detect an unauthorized entry. • notify authorities during an emergency. • monitor equipment and report malfunction.

  3. BASIC COMPONENTS TO ANY ALARM SYSTEM • Sensory device • Control unit • Annunciator • Power source • Alarm circuit

  4. TYPES OF ALARM SENSORS • Perimeter or point of entry – usually a gate or door that, when opened, sounds an alarm. • Area protection – often a motion detector located within a room or hallway to detect unauthorized access. • Object protection – used to protect an item such as a safe, display cabinet, jewelry box, etc

  5. Sensors are designed to initiate alarms under several different conditions: • when a surface or area being protected is penetrated • when a power failure occurs • when the sensor is opened, grounded or shorted out • when the sensors fail due to age or wear • when the container which houses the sensor is opened

  6. SENSORS ELECTRO-MECHANICAL- considered to be reliable but may be costly FOIL – cost is small but its’ installation requires considerable time INTRUSION SWITCHES – always installed on the inside or side of the material to be protected MAGNETIC SWITCH - a switch is usually mounted on the fixed surface with the magnet fasted to the opening surface

  7. WIRE AND SCREEN DETECTORS – a valuable service to the home security system owner; provides a good level of security; may be expensive PRESSURE MATS – suited for carpeted office areas but most widely used in home security systems SOUDWAVE AND MICROWAVE – usable only inside a building; if heating/air conditioning air currents move displays suspended from a ceiling, alarm may be activated

  8. CAPACITANCE SENSORS – normally low in cost, suitable for outside use VIBRATION SENSORS - installed indoors on the surface to be protected; picks up vibrations and transmits them to a amplifier that initiates the alarm; not considered useful outside AUDIO SENSORS – activated by sound; used for vaults LIGHT SENSORS – set off if there is a change of light or if a beam of light is interrupted.

  9. ALARM ANSWERING SYSTEMS • LOCAL ALARM SYSTEM • CENTRAL STATION ALARM SYSTEM • DIRECT POLICE OR FIRE TERMINATION SYSTEM • PROPRIETARY TERMINATION SYSTEM

  10. ADVANTAGES Psychological deterrent Damage should be minimized since the intruder hears the alarm Inexpensive to install and easy to maintain DISADVANTAGES Easy to defeat because of simplicity Intruder will probably not be caught Alarm may be disregarded if no one is nearby to hear the alarm Local alarm systems sound a generating device on the outside to call attention to the alarm.

  11. Central Station (Silent Alarm) • Police are normally notified immediately which aids in apprehension of the intruder. • Many alarm companies provide a monitoring service for the central station systems which will require the company who desires coverage to test the system on a regular basis. • Telephone lines are used to carry the alarm. 4. Direct lines or use of a loop system may be used to provide the service.

  12. DIRECT POLICE OR FIRE TERMINATION SYSTEM DISADVANTAGE In many cities the police and/or fire departments are not permitted to receive the alarms directly unless the facility is a school, church or other public building. ADVANTAGE A quick response should be given to the alarm.

  13. PROPRIETARY TERMINATION A facility monitors its own alarms by using either security officers, maintenance or other employees to respond to the alarms. ADVANTAGES 1) System can be designed to meet the needs of the owner. 2) The system is operated and controlled by the owner. 3) Functions can be virtually unlimited if designed properly. 4) Line security is enhanced since the alarm line begins and ends on the owner’s property. 5) The system can be cost effective if designed properly.

  14. DISADVANTAGES 1. The cost of providing personnel to monitor. 2. Additional costs if designed improperly. 3. Patrols may still be needed.

  15. If most police officers were asked what they believe is the single greatest problem with alarm systems they would probably answer – false alarms. False alarms are a result of: • User error or negligence • Poor installation or servicing • Faulty equipment • SOME SOLUTIONS Sell the system correctly. Don’t use space protection excessively. Instruct the subscriber on proper use and re-instruct frequently. Maintain system in proper working order.

  16. CCTV - Closed Circuit Television CCTV cameras support security in several ways: • Allow for hidden surveillance of an area which is vulnerable to theft. • Allow for the positive identification of persons and/or material prior to granting entrance or exit privileges. • Provide a deterrent to crime when cameras are visible to employees and visitors. • When used in conjunction with a video tape recorder, thefts or other incidents are permanently recorded. • Provide better use and efficiency of security personnel.

  17. CCTV TERMINOLOGY Pan & Tilt Camera Camera which has mechanical components which allow it to be moved up and down and from side to side with remote control. Fixed Camera Camera which is permanently mounted which views one area constantly; cannot be moved for alternate viewing.

  18. Console An arrangement of CCTV monitors,switches and devices that house all of the equipment necessary to monitor cameras, alarms, etc. Switcher A device that alternates the monitoring of cameras in order that one (or more) monitors can be used to view more than one camera. Four cameras may be monitored by one CCTV monitor that alternates or “switches” screens every 3-5 seconds.

  19. ACCESS CONTROL Access Control refers to an electronic means of controlling access and identifying users. • uses a card • typically one or two door variety • identifies a card as valid or invalid and allows or denies access BASIC • does not identify the valid card to a particular user • no hard copy report or other record of entry • simply an electric key

  20. SOPHISTICATED • has the ability to identify a particular card to an assigned user of the card • not only permits or denies access, but also can identify the user by name, employee I.D. number, and by access level: the system can also permit or restrict access by time, date, day of week, and as many as fifty access authorization levels • every entry or “transaction” is recorded in the system; larger access systems can automatically log, display and print out upwards of 1.5 million transactions

  21. PERFORMANCE • Is the system reliable? • Is the system easy to use? • Is the system secure? • Is it durable? • Is the system hardened to its’ environment? • Is the system easy to maintain? • Is the card valid?

  22. SYSTEM TECHNOLOGY Magnetic Stripe Readers Characters on magnetic tape affixed to card Relatively inexpensive Easy to duplicate Hollerith Readers Punched holes in card Inexpensive Easy to duplicate Proximity Reader Individually tuned Non-contact, virtually never wears out Can often be used in wallet or purse Expensive, can be duplicated

  23. Bar Code Readers Inexpensive Good for low security areas Easily duplicated Some errors or false reads Good for dual technology Weigand readers Imbedded wire Almost impossible to duplicate Non-contact Offers higher level of security than others

  24. BIOMETRIC SYSTEMS Retina Scanners – identifies user’s unique retinal blood vessel pattern Hand geometry – measures the user’s unique hand Fingerprints – identifies user’s unique fingerprints Voice Verification – computer identifies user’s voice pattern within previously established parameters

  25. VIDEO BADGING • Positively identifies the user by displaying the card holder’s picture on the security monitor. • Allows the officer to see an image of the person passing through the door. • Allows a quick and easy means of keeping, storing, and upgrading the employee photo I.D., since it is stored on a digital disc rather than on hard film.

  26. ACCESS CONTROL DEVICES Doors, locks or barriers commonly referred to as turnstiles may work with card access systems. A card reader scans and accepts a card, transmitting a signal to open, unlock or release a barrier.

  27. USER FRIENDLY The modern card access systems have become user friendly with one and two key stroke commands for the security officer operator.The most important feature of the newest systems is that they can tell us immediately who went through what door, or which door is propped open or ajar.

  28. If access control systems fail, security personnel will be required to ask for personal identification (i.e. California driver’s license) from an individual before granting access. Information should then be maintained in the DAR or computerized reporting system.

More Related