0% found this document useful (0 votes)
10 views3 pages

Handout 9 - Access Control System

Uploaded by

Sharvin Mungur
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views3 pages

Handout 9 - Access Control System

Uploaded by

Sharvin Mungur
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 3

MITD KBTC – Electronic Security and Control Systems in

Buildings– Access Control System – Handout 9

1.0 Introduction

Access control is a system which enables an authority to control access to areas and resources in
a given physical facility or computer-based information system. An access control system, within
the field of physical security, is generally seen as the second layer in the security of a physical
structure.

Access control is, in reality, an everyday phenomenon. A lock on a car door is essentially a form
of access control. A PIN on an ATM system at a bank is another means of access control.
Bouncers standing in front of a night club is perhaps a more primitive mode of access control
(given the evident lack of information technology involved). The possession of access control is
of prime importance when persons seek to secure important, confidential, or sensitive
information and equipment.

In some cases, physical access control systems are integrated with electronic ones. For example, a door
may be unlocked with, keypad, a swipe card, an RFID keyfob, or through biometric means. A card access
control system is one of the most common types of electronic door control, using a card with a magnetic
stripe which can be swiped through a reader on the door. Hotels often use this system, which can be used
to make temporary room keys.

Depending on the size of the organization and the varying levels of security which may be necessary, physical access
control systems within a building may be linked or standardized, as is the case with a key which opens all of the doors in a
building, or each access point may be controlled individually. The use of electronic systems allows an administrator to
precisely define access privileges for each user and also instantly update them within the system, which is much more
convenient than granting or revoking key privileges.

When installing access control systems, companies should consider who will use the system, and how it will be used. The
larger the number of users, the higher the risk for a security business. In a situation where numerous users, including
guests, are entering the area, tiered levels of security may be advisable. For example, a bank with a large staff and
customer base will undoubtedly employ multiple access control systems to ensure that the public cannot reach the safe,
unauthorized staff cannot reach the automatic teller machine, and so forth. On the other hand, a small business might be
satisfied with a single key used to open all of the doors in the building, distributed to all employees.

2.0 Swipe Card

A magnetic stripe card is a type of card capable of storing data by modifying the magnetism of
tiny iron-based magnetic particles on a band of magnetic material on the card. The magnetic
stripe, sometimes called swipe card or magstripe, is read by physical contact and swiping past a
magnetic reading head.

Prepare by B Jankee MITD – KBTC 12/01/2011


A number of International Organization for Standardization standards, ISO/IEC 7810, ISO/IEC
7811, ISO/IEC 7812, ISO/IEC 7813, ISO 8583, and ISO/IEC 4909, define the physical
properties of the card, including size, flexibility, location of the magstripe, magnetic
characteristics, and data formats. They also provide the standards for financial cards, including
the allocation of card number ranges to different card issuing institutions.

3.0 Keypad

Prepare by B Jankee MITD – KBTC 12/01/2011


A keypad uses a numerical code for numerical code for authentication; the correct code must be entered in
order for the lock to deactivate. Such locks typically provide a keypad, and some feature an audible response
to each press. Combination lengths are usually between 4 and 6 digits long.

4.0 RFID Proximity

Radio-frequency identification (RFID) is the use of an object (typically referred to as an RFID tag)
applied to or incorporated into a product, animal, or person for the purpose of identification and
tracking using radio waves. Some tags can be read from several meters away and beyond the line of
sight of the reader. This technology is also used in modern electronic locks.

5.0 Biometric

Biometric is becoming more and more prominent as a recognized means of positive identification, because
they are difficult to tamper with. Some new electronic locks take advantage of technologies such
as fingerprint scanning, retinal scanning, iris scanning and voiceprint identification to authenticate users.

Prepare by B Jankee MITD – KBTC 12/01/2011

You might also like