SlideShare uma empresa Scribd logo
1 de 103
Access Control Systems
WELCOME!
Access Control Systems
The Balancing Act
Access Control Defined
Key/Credential Management
Control Configuration
Software Features and Capabilities
Controller Hardware
Break
Peripheral Components
Access Controlled Door Hardware Types and Specifications
Trends and Convergence
Resources
AGENDA
How to get the most…
VERBAL COMMUNICATION
Approx 100% was what the speaker wanted to say
Approx 80% was said
Approx 60% was heard
Approx 40% was remembered after 3 hours
Approx 15% was remembered after 3 days
Approx 0-5% was remembered after 3 months
VERBAL + VISUAL COMMUNICATION
Approx 60% was remembered after 3 days
Approx 40-50% was remembered after 3 months
VERBAL + VISUAL + NOTES
Approx 80% was remembered after 3 days
Approx 60-70% was remembered after 3 months
HARVARD RESEARCH STUDY
How to get the most…
Why are we here?
Gain Knowledge.
Asking Questions.
The Balancing Act
• Security
• Balancing Openness and Public Safety
• Applying new technologies and lessons learned
• Improving the physical security of buildings
• Protecting people and assets while maintaining
a pleasant work environment.
• The challenge facing government officials,
realtors and corporate building owners.
Security….”The Absolutes”
• Our world is dangerous and will get more dangerous
• We take security for granted till something goes
wrong.
• Security is inconvenient- and expensive
• Paranoid or Prepared? Politics!
• Constant vigilance – Almost overwhelming!
• 100%, guaranteed security ?? No such thing !
• 100% security = 0% accessibility
• 100% security = 0% productivity
• Buildings must be functional,
comfortable, inspirational – SAFE
• You don’t design a building for security.
You secure the design of a building
• Rethinking Security – new meaning to
architects
Architects and Security
Security Elements
• Deterrence
• Training, Fences, Signage, Lighting,
Consequences
• Delay
• Locks, Doors
• Detection
• Alarms, CCTV, Metal Detectors, Motion & Sound
Sensors
• Communication
• Voice, Data, Video
• Response
• Crisis Preparedness, Security Personnel, Police
Access Control Defined
• WHO?
• WHERE? / WHAT?
• WHEN? / TIME?
The WHO
• The person, or device, requesting access to an
area, or asset, we want to control.
• Authentication Methods
…something the person / device…
• HAS – Physical
• KNOWS – Knowledge of
• IS / ARE – Biometric
The WHERE / WHAT
• The place or process we want to allow authorized
persons to get to.
• Physical and Logical
• Controlled or Restricted area
• As it relates to both manual and electronic
access controls this is critical to our access
management plan
• Vending, gas dispensing, copier machine
usage, time and attendance, meal plans and
more
The WHEN
• The time period or interval when access is
granted or denied.
• Can be managed with both on line and off
line systems
• Also used for setting events and logic
statements for:
• Triggers
• Time Zones
• Timing responses to alarms
• Timing for routing of messages to other devices
Access Control Defined
• WHO?
• WHERE? / WHAT?
• WHEN? / TIME?
Access Control is…
AS SIMPLE AS A KEY
• Knowing exactly who has keys
• Knowing areas of access of each key holder
• Knowing key blanks are not readily available
• Knowing keys cannot be copied without proper
authorization
• Having a policy on lost keys
• When issuing temporary use of keys, keeping record trail
Unauthorized key duplication remains the most
violated security policy and one of the largest
problem of facility managers
Ultimate Key Management
Key # 123
PLAIN
BOWS
D0 NOT
DUPLICATE
STAMPED
BOWS
Conventional
Keyways
A conventional keyway is one which the
manufacturer will sell to anyone, it may most
common, or the most used, or the "standard"
or it may be family of keyways
Yesterday’s Key Control
COMPLETE
KEY
CONTROL STRONG
UTILITY
PATENT
CONTROLLED
KEY
BLANKS
LEGAL
CONTRACTS
AUDIT
CONTROLS
ENFORCEMENT
Not a
Design
Patent
Not
Available
to all
Customers
Agreements
of
Control
Know
Where
Blanks
Are
Must Be
Aware of
Unauthorized
Copies
5 Steps To Key Management
1. Patented keyways
Utility patent gives manufacturer exclusive
manufacturing rights
Manufacturer control distribution
Patent good for 20 years
Imitation manufacturers cannot duplicate
Assures protection to facility / owner
Security Leg
Millings for
Keyway Blade
Security
Ledge
Blade
Today’s Key Management
2A. Manufacturer Controls
Policy and procedures in place
Signature verification
Controlled access to product areas
Ship key blanks direct to end user
Has return key policy
Provides specially coined blanks
Policy
1. Verify all signatures
2.
3.
4
Today’s Key Management
2B. Facility/Owner Controls
Policy and procedures in place supported by
upper management
Locksmith administrator on staff
Locked storage
Supervisor approval of new keys
Employee signs for key
Should have penalty attached
All keys numbered and logged into system
Procedure for keys to be returned
should have penalty attached
Additional procedures:
Cleaning crew
Outside contractors
ISSUE TO : Bill Jones
DATE ISSUED: 07-07-05
Request for New Key
DATE: 07-04-05
TO: Lock shop
NO. OF KEYS: 1
KEY NUMBER: 123
KEY SET: AB15
APPROVED BY: C T Smith
ISSUE TO: Bill Jones
RECEIVED BY: Bill Jones
By Lock Shop
ISSUE DATE: 07-07-05
ISSUED BY: CH
RETURNED DATE
Today’s Key Management
3. Contracts and Agreements
Protects facility / owner
Protects distributor
Protects manufacturer
Summarizes responsibilities to all
parties
Provides guide lines
Eliminates misunderstanding
We agree
Today’s Key Management
4. Audit Controls
Keep records – Use Software
Use manufacturers original blanks
Reduce master keying
Have employees carry more
than one key
Stamp keys with code
Utilize available forms
Use sealed key rings
AB15
123
1215
Today’s Key Management
Use a key cabinet; electronic or manual
Access Control is…
AS SIMPLE AS A KEY
Access Control is…
This is a key!
This too!
The Credential
• Most visible component of the system
• Issued to personnel as “electronic keys”
• Several Card Technologies
• Badge Construction
• Degree of Security Required
• Durability
• Reader Environment
• Convenience and Price
• Performance
Card / I D Technology Types
• Barium Ferrite
• Bar Codes
• Magnetic Stripe
• Wiegand
• Proximity
• Smart Card
• Hybrid
Biometrics – Another Key
• Biometrics and the “Smart Card”
• Iris Scan
• Finger Print
• Facial Recognition
• Retinal Scan
• Voice Recognition
• Hand Geometry
• Others on the horizon
Credentials / Smartcards
Access
Control
Time &
Attendance
Free
Free
Personal Data
Photo
Vending
Cafeteria
PC Login
Access Controls more about the “key”
•The “Common Access Card”
•FIPS 201 / HSPD12
•Database sharing trends
•Communications options
•Encryption – DES, AES
•PINs
Homeland Security Presidential Directive/Hspd-12
Subject: Policy for a Common Identification Standard for Federal
Employees and Contractors
(1) Wide variations in the quality and security of forms of
identification used to gain access to secure Federal and other
facilities where there is potential for terrorist attacks need to be
eliminated. Therefore, it is the policy of the United States to enhance
security, increase Government efficiency, reduce identity fraud, and
protect personal privacy by establishing a mandatory, Government-
wide standard for secure and reliable forms of identification issued by
the Federal Government to its employees and contractors (including
contractor employees).
HSPD-12
CONTROL CONFIGURATIONS
•Stand Alone Systems
•Multi-Door Systems
•Enterprise Integrated Systems
STAND ALONE SYSTEMS
• Authentication Types;
• PIN, Credential / Proximity, Biometric
• Battery Operated or Wired
• Keypad Programming
• Computer Managed / PDA
• Entry Automation
• 1st
Man In
• Audit Trail
• # Users
• Labor vs. Hardwired System
Single-User Multi-Door Systems
• Instant Local Notification
• Multiple Reader Type
• Input Output Linking
• Dedicated PC
Multi-User / Multi-Door Systems
• Instant Multiple Notification Options
• LAN Access
• Discretionary Reporting
• Mandatory Controls
IDENTITYIDENTITY
MANAGEMENTMANAGEMENT
DIGITAL VIDEODIGITAL VIDEO
SURVEILLANCE &SURVEILLANCE &
MANAGEMENTMANAGEMENT
INFORMATIONINFORMATION
SECURITYSECURITY
ASSETASSET
MANAGEMENTMANAGEMENT
VISITORVISITOR
MANAGEMENTMANAGEMENT
ACCESSACCESS
CONTROLCONTROL
INTRUSIONINTRUSION
DETECTIONDETECTION
FIRE ALARMFIRE ALARM
SYSTEMSSYSTEMS
WIRELESSWIRELESS
ACCESSACCESS
MULTI-TENANTMULTI-TENANT
PROPERTYPROPERTY
MANAGEMENTMANAGEMENT
INTEGRATEDINTEGRATED
ALARMALARM
MANAGEMENTMANAGEMENT
BUILDINGBUILDING
AUTOMATIONAUTOMATION
INTERCOMINTERCOM
COMMUNICATIONCOMMUNICATION
SYSTEMSSYSTEMS
Enterprise Systems
Smart CardsSmart Cards
IncidentIncident
ReportingReporting
Time andTime and
AttendanceAttendance
ERPERP
CriminalCriminal
HistoryHistory
PayrollPayroll
SocialSocial
SecuritySecurity
ActiveActive
Directory/LDAPDirectory/LDAP
AccessAccess
ControlControl
HumanHuman
ResourcesResources
MedicalMedical
InformationInformation
VisitorVisitor
ManagementManagement
BiometricBiometric
TemplatesTemplates
CredentialCredential
ManagementManagement
Bringing together
disparate databases
or information
sources
Enterprise Systems
System Architecture
Field Panel Door Controller
Direct Connect
RS-232 or RS-422 RS-422
CCTV System
Access Control
Life Safety
ManagementPhoto Imaging
Visitor
Management
Ethernet Network
LAN/WAN
RS-232
Field Panel
Cellular
POTS
Field Panel Field Panel
HVAC
RS-232
Readers
Field Panel
Modem
Dial-up Modem
SOFTWARE
• Integrated solutions sets
• Network ready
• SQL and Oracle
• Linux based embedded solutions
• Partition-able database
• Windows XP, NT, 2000, Vista Compatibility
• Web enabled
• Web Embedded
The Application Software
• This is the GUI- It should be intuitive easy to train
operators and managers
• The database manager
• Ability to partition and filter views based on passwords
• Import and export features
• Potential interface to HR database systems
• May be Standalone or
• Part of a network
• Numerous work stations
• Redundant emergency backup
• Full set of utilities for storage and archiving
Desired Software Features
• Migration path (scalability)
• Alarm Monitor capacity
• Anti-Pass back
• Event Triggers
• Time zones and Holidays
• Clearance (area) controls
• CCTV Matrix Switching
• Digital Video recorder event linking
Desired Software Features
•No limit on system scalability.
• Unlimited Card Readers.
• Unlimited Inputs/Outputs.
• Unlimited Cardholders.
• Unlimited Control Panels.
• Unlimited Holidays.
•Guard Tour application
•Elevator Control
•Full featured Badging
•Real time status monitoring
•Multiple reader technology
support
•Microsoft database
•Report Manager
•Visitor Management
•ODBC and MDAC Compliant
•Potential web access/enabled
Access Granted Transactions
 

 
Access Denied Transactions
 

 
Contact Transactions
 

 
Relay Transactions
 

 
Actions that effect Card Readers
 

 
Actions that effect Contact Devices
 

 
Actions that effect Relays
 

 
Card Reader Triggers and Actions
 

 
Integrated Applications
• Photo I D Creation
• Bio-metric enrollment
• Alarm management
• Access Management
• Air Quality monitoring
• Visitor Controls
• Digital Video event linking
• Event and data base linking
• Camera Controls
• Virtual CCTV Matrixes
• CCTV Analytics
• Smartcard Application Support
Access Control Panel Operation
• Card is presented data sent to Panel
• Panel compares information
• Grants/Denies access
• Based on Card Status
• Time of Day
• Cardholder’s access privileges
• Other Administrator selected features
Access Control Panels
• Contain Microprocessors
• On-board Random Access Memory (RAM)
• Upgradeable Software stored in Erasable Program Read
Only Memory (EPROM)
• System Administrator or authorized web client
enters all information related to system at host
computer or direct to board via web with on
board software in panel
• Information may be downloaded to Access
Control Panel’s RAM
Access Control Panels
• Once downloaded/programmed a Panel
can process information locally.
• “Intelligent” panels inform the Host of all
actions taken, including time and date
• Often referred to as “distributed processing”
• Saves Host processing time
Access Control Panel Operations
• May be configured many ways
• Can store thousands & some users are requiring
Millions of records!
• Multiple access levels
• Time Zones
• Thousands of historical transactions
• Quantum leaps in storage abound
Access Control Panel Operations
• Can support Inputs
• Can detect an input’s change of state, process the
information and report it to the host computer/ or web based
client on alarm
• Typical Inputs include door monitor and request to exit (or
bypass) devices
• Can support Outputs
• Door locking mechanisms
• Sound or broadcast alarm devices
• Lights, sirens, bells, digital dialers, etc.
• Can be programmed so an Input activates or deactivates
outputs automatically
• Example: Glass break sensor (input) might activate a
siren (output)
Access Control Panel Wiring
Access Control Panel Wiring
• Three different approaches to cabling of
readers
• Bus Cabling
• Readers can be wired to a common cable that runs back to the
panel
• Saves wiring costs when readers are close to each other
• Star Cabling
• Readers can be wired to the panel individually
• Combination Bus and Star sometimes is best
• Independent IP / Network Drop communications via Network
Access Control Panel Trends
• Distributed intelligence
• Embedded software – web enabled data
management
• FIPS- 201 for Federal Employees
• Full feature set resident at the local panel
• POTS pack up / cellular back up
• HiCap memory backup
• On line and off line capacity
• Bio-metric / Smartcard
• Integrated into lock hardware
SEE YOU IN 5 Minutes
QUESTIONS?
Kevin Klemmer, PSP, CISSP
Access Control Systems
Access Control Hardware / Peripherals
&
IT Convergence
Kevin Klemmer, PSP, CISSP
First Security Measures
The more things change…
• Which one is the lock?
Modern Castle – Corporate Campus
Entrance to the Castle
Entrance to the Castle
The Opening
25 to 50% of the
cost of access
control
implementation.
Often perceived
as the first line of
defense.
Systems Building Blocks
Access Control Components
The Basics: Electric Locks
Maglocks
Strikes
Cylindrical
Mortise
Exits
Peripherals
Safety Security
Control & Monitoring Remote Locking
Reduces Manpower Convenience
ADA requirements
Benefits of Electrified Hardware
ELECTRIFIED HARDWARE
Performs functions normally executed manually, usually
from remote location or automated.
Must specify a system with all components compatible.
One component will not work without the others.
Components of a System
ACCESS CONTROL HARDWARE
TRANSFORME
R
INPUT
120VA
C
OUTPUT
24VDC
RECTIFIER
REGULATOR
CAPACITOR
FILTER
Reduces Voltage
Converts AC to DC
Stores needed current
Eliminates “Noise”
Keeps Output Constant
Parts of a Regulated
Power Supply
ACCESS CONTROL HARDWARE
The power supply must furnish the
SAME voltage as required by the
load.
The current (amps) available from
the power supply must be
EQUAL TO or GREATER THAN that
required by the total load of the
system.
ACCESS CONTROL HARDWARE
Converts electrical energy into another form I.e.,
unlocks a solenoid, retracts a latch bolt, etc
Performs the work required
Electric Lock or Strike
Electric Exit Device
Closer / Holder
Electromagnetic
Holders
ACCESS CONTROL HARDWARE
FAIL SAFE
• Lock or locking device
that remains
UNLOCKED on loss of
power
FAIL SECURE
(non-fail safe)
• Lock or locking device
that remains LOCKED
on loss of power
Terminology
ACCESS CONTROL HARDWARE
Electrical Characteristics of a Load
Need to Know to
Select Power
Supply
• Current Draw In Amps
• Voltage Required
• Fail Safe / Fail Secure
ACCESS CONTROL HARDWARE
Key Pad
Key Switch
Toggle Switch
Push Button
Stand Alone System
Access Control
System
Switches are used to control a locking device
or to signal a monitoring device
ACCESS CONTROL HARDWARE
Switches are used to control a locking device
or to signal a monitoring device
Each switch has one movable contact, the POLE, and one or
more fixed contacts, the THROWS
SWITCH SYMBOL
Normally open
ACCESS CONTROL HARDWARE
Normally closed
Switches are used to control a locking device
or to signal a monitoring device
Each switch has one movable contact, the POLE, and one or
more fixed contacts, the THROWS
SWITCH SYMBOL
ACCESS CONTROL HARDWARE
MAINTAINED
CONTACT
• A switch designed for
applications requiring
sustained contact; but with
provision for resetting
i.e., ordinary light switch
MOMENTARY
CONTACT
• A spring loaded switch
designed for applications
requiring constant contact;
when pressure is removed,
reverts back to original
position
i.e., door bell
Terminology
ACCESS CONTROL HARDWARE
Carries current through system
The more distance between the
power source and the load, a
heavier wire gauge is required
# 1 TROUBLESHOOTING PROBLEM
ACCESS CONTROL HARDWARE
Size of Conductor (Gauge)
Length of Conductor (Resistance)
The farther the load is from the power supply, the more
resistance is experienced; a heavier gauge wire is required
Need to Know
ACCESS CONTROL HARDWARE
25 50 100 150 200 250 300 400 500
0.25 18 18 18 18 18 18 18 18 16
0.50 18 18 18 18 16 16 16 14 14
0.75 18 18 18 18 16 16 14 14
1.00 18 18 18 16 16 14 14
1.50 18 18 18 16 16 14
2.00 18 18 16 16 14
2.50 18 18 16 14
3.00 18 16 14
3.50 18 16 14
Distance in feet from Power Supply to Locking Device
MINIMUM WIRE GAUGE FOR 24V DC or AC
A
M
P
S
ACCESS CONTROL HARDWARE
ONE
OPERATIONS
NARRATIVE
HARDWARE
LIST THREE
ELEVATION
DRAWING FOUR
SYSTEM
WIRING
DIAGRAM
TWO
Elements of a System
ACCESS CONTROL HARDWARE
1.
OPERATIONS
NARRATIVE
4.
WIRING
DIAGRAM
2.
HARDWARE
LIST
3.
ELEVATION
DRAWING
REQUIREMENTS
• Outside Operation
• At Rest (while locked)
• Electrically Unlock
• Mechanically Unlock
• Power Failure
• LED’s
• Inside Operation
1.
OPERATIONS
NARRATIVE
ACCESS CONTROL HARDWARE
1. Power Supply
2. Key Pad
3. Power Transfer
4. Electric Exit Device
3.
ELEVATION
DRAWING
4.
WIRING
DIAGRAM
2.
HARDWARE
LIST
1.
OPERATIONS
NARRATIVE
2.
HARDWARE
LIST
ACCESS CONTROL HARDWARE
3.
ELEVATION
DRAWING
4.
WIRING
DIAGRAM
1.
OPERATIONS
NARRATIVE
2.
HARDWARE
LIST
3.
ELEVATION
DRAWING
120VAC inputPower
Supply
ACCESS CONTROL HARDWARE
4.
WIRING
DIAGRAM
2.
HARDWARE
LIST
3.
ELEVATION
DRAWING
1.
OPERATIONS
NARRATIVE
4.
WIRING
DIAGRAM
ACCESS CONTROL HARDWARE
Making Hardware Selections
Based On Owner’s
InstructionsCashier's Door from Drivers Lounge
Closed and Locked at all Times
Must Be Entered During Day Employees
Secretary To Remotely Unlock Door
Management Always Able To Enter
*
DRIVERS
LOUNGE
CASHIER
CHOICES
1.OPERATIONS
NARRATIVE
Door is normally closed, latched and
secure from the outside. Depressing
the push switch will unlock the electric
strike to allow ingress.
Door will relock as soon as
push button returns to normal position.
Loss of power, the door will
remain locked.
Enter by key at all times.
Free egress from inside
at all times.
2.HARDWARE
LIST
Load
Switch
Power Supply
Electric Strike
712NFS 24VDC
Push Button
PB
Transformer
TP-24-2
EXAMPLE
TO
RISER
DIAGRAM
3. ELEVATION
EXAMPLE
18 ga
18 ga
GAGE AND NUMBER
OF CONDUCTORS
Rectifier
PB
712NFS
Electric
Strike
Transformer
24VAC output
TP-24-2
120VAC INPUT
Systems Wiring Diagram or
Point to Point Wiring Diagram
4. WIRING
DIAGRAM
EXAMPLE
Electric StrikeTransformer
+ -
Non-
polarized
C
NO
NC
Pushbutton
PUSH
TO
EXIT
120VAC
LockedUn-
Locked
COMPONENTS & ELEMENTS
POWER
SUPPLY
LOAD SWITCH CONDUCTORS
4 COMPONENTS
OPERATIONS
NARRATIVE
HARDWARE
LIST
ELEVATION
DRAWING
WIRING
DIAGRAM
4 ELEMENTS
Access Control Trends
Smaller, Faster, Better
More Integrated Features
Embedded Web Server
Open Source
WiFi - Wireless
Access Control Trends
Embedded Prox Technology
Monitoring Options
Request To Exit
Door Contact
Keyswitch Monitoring
Other options…
Convergence
Analog to IP (Security to IT)
Applications Convergence
Physical and Cyber
“Soon the security industry will move to systems in which there
are no analog or proprietary wired devices at all; where all
devices connect to the Ethernet infrastructure. The knowledge
of how to design efficient network systems and how to secure
those systems is paramount to successful security systems.
This is the future of security technology”
Thomas Norman, Protection Partners International
Integrated Security Systems Design
Threats of Converged Enterprise
Mode
of
Attack
Physical
Security
Physical
Attack
Physical Attacks
Against Cyber
Information
Security
Information
Attack
Cyber Intrusion Identifies
Valued Targets
Targets
Facilities People
Media
$$$
Computers
Information
Convergence Migration
IP Communications
Fire
Physical
Security
Lighting
Visitor
Access
Elevator
24 / 7
Monitor
Energy HVAC
WAN
Intelligent Converged EnvironmentDisparate Building Networks
Convergence Benefits
HVAC
24/7 Monitor
Video surveillance
Elevator
Lighting
Fire
Access
Energy
Benefits:
 Safety and security
 Environmental sustainability
 Occupant comfort
 Organizational flexibility
 Streamlined operations
 Reduced costs
 Energy savings
 Managed services
 Data mining
 Process Measurement
ServicesandTechnologies
Resources
Reduce security vulnerabilities in all types of facilities.
The industry's first-ever guide for exterior and interior
security features, NFPA 730: Guide for Premises Security
addresses security in all occupancies from residential
dwellings to large industrial complexes. Uniform guidelines
help you assess vulnerability and design appropriate security
plans.
Provisions describe construction, protection, and occupancy
features and practices intended to reduce security risks to
life and property.
Topics covered include:
General requirements and facility classifications
Security vulnerability assessment
Exterior security devices and systems
Physical security devices
Interior security systems
Security planning
Measures to control security vulnerabilities in educational,
healthcare, and other facilities
The Guide also addresses protocols for special events, and
the responsibilities of security personnel.
(Approx. 88 pp., 2006)
Resources
Ensure the quality and reliability of security system
installations
NFPA 731; Installation of Electronic Premises Security
Systems is the first Standard developed primarily to define the
means of signal initiation, transmission, notification, and
annunciation, as well as the levels of performance and the
reliability of electronic security systems.
Requirements cover every step of security equipment
installation, with provisions for the application, location,
performance, testing, and maintenance of physical security
systems and their components.
Detailed chapters are included for:
Intrusion detection systems
Electronic access control systems
Video surveillance systems
Holdup, duress, and ambush systems
Testing and inspection
Rules address the protected premises from the property line to
the interior of the premises. NFPA 731 also references or
incorporates provisions from applicable UL, SIA, and other
standards.
(Approx. 43 pp., 2006)
Resources
ETHICS IN SECURITY
• Perform professional duties in accordance with the law and
the highest moral principles.
• Observe the precepts of truthfulness, honesty, and
integrity.
• Be faithful, competent, and diligent in discharging their
professional duties.
• Safeguard confidential and privileged information and
exercise due care to prevent its improper disclosure.
• Not maliciously injure the professional reputation or
practice of colleagues, clients, or employees.
Physical Security Professionals must
adhere to the Code of Professional
Responsibility, agreeing to:
QUESTIONS?
Thank You!Thank You!

Mais conteúdo relacionado

Mais procurados

Data Center Security
Data Center SecurityData Center Security
Data Center Security
devalnaik
 
Reader Options Access Control 2015
Reader Options Access Control  2015Reader Options Access Control  2015
Reader Options Access Control 2015
Andy Armour
 
Hotel locks-solitaire-710-ii-brochure
Hotel locks-solitaire-710-ii-brochureHotel locks-solitaire-710-ii-brochure
Hotel locks-solitaire-710-ii-brochure
Mail Box Production
 
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMNetwork Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Jim Gilsinn
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, Outsourcing
Nicholas Davis
 

Mais procurados (20)

Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)
 
Physical Security Domain
Physical Security DomainPhysical Security Domain
Physical Security Domain
 
Data Center Security
Data Center SecurityData Center Security
Data Center Security
 
Essential Layers of IBM i Security: Physical Security
Essential Layers of IBM i Security: Physical SecurityEssential Layers of IBM i Security: Physical Security
Essential Layers of IBM i Security: Physical Security
 
Reader Options Access Control 2015
Reader Options Access Control  2015Reader Options Access Control  2015
Reader Options Access Control 2015
 
Securing embedded systems
Securing embedded systemsSecuring embedded systems
Securing embedded systems
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
 
[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael Firstenberg[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael Firstenberg
 
The journey to ICS - Extended
The journey to ICS - Extended The journey to ICS - Extended
The journey to ICS - Extended
 
Hotel locks-solitaire-710-ii-brochure
Hotel locks-solitaire-710-ii-brochureHotel locks-solitaire-710-ii-brochure
Hotel locks-solitaire-710-ii-brochure
 
[CLASS 2014] Palestra Técnica - Samuel Linares
[CLASS 2014] Palestra Técnica - Samuel Linares[CLASS 2014] Palestra Técnica - Samuel Linares
[CLASS 2014] Palestra Técnica - Samuel Linares
 
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMNetwork Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
 
Embedded
EmbeddedEmbedded
Embedded
 
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
 
SCADA hacking industrial-scale fun
SCADA hacking industrial-scale funSCADA hacking industrial-scale fun
SCADA hacking industrial-scale fun
 
Monitoring ICS Communications
Monitoring ICS CommunicationsMonitoring ICS Communications
Monitoring ICS Communications
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, Outsourcing
 
Data Center Security: Always a Main Concern for Businesses
Data Center Security:  Always a Main Concern for BusinessesData Center Security:  Always a Main Concern for Businesses
Data Center Security: Always a Main Concern for Businesses
 
Safend Solution Set
Safend Solution SetSafend Solution Set
Safend Solution Set
 
Internet Accessible ICS in Japan (English)
Internet Accessible ICS in Japan (English)Internet Accessible ICS in Japan (English)
Internet Accessible ICS in Japan (English)
 

Semelhante a managingyouraccesscontrolsystems-130223182036-phpapp01

experience_and_perspective_of_security_installation.ppt
experience_and_perspective_of_security_installation.pptexperience_and_perspective_of_security_installation.ppt
experience_and_perspective_of_security_installation.ppt
PawachMetharattanara
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
AugmentedWorldExpo
 
Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01
Hai Nguyen
 
NARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeNARCA Presentation - IT Best Practice
NARCA Presentation - IT Best Practice
Brenda Majewski
 
Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013
Niraj Kumar
 
Limtech - Presentation Product
Limtech - Presentation ProductLimtech - Presentation Product
Limtech - Presentation Product
Andréa Berry
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
Wajahat Rajab
 

Semelhante a managingyouraccesscontrolsystems-130223182036-phpapp01 (20)

experience_and_perspective_of_security_installation.ppt
experience_and_perspective_of_security_installation.pptexperience_and_perspective_of_security_installation.ppt
experience_and_perspective_of_security_installation.ppt
 
OT Solution Overview.pptx
OT Solution Overview.pptxOT Solution Overview.pptx
OT Solution Overview.pptx
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 
All Your Base Still Belong To Us Physical Penetration Testing Tales From The ...
All Your Base Still Belong To Us Physical Penetration Testing Tales From The ...All Your Base Still Belong To Us Physical Penetration Testing Tales From The ...
All Your Base Still Belong To Us Physical Penetration Testing Tales From The ...
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
 
Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
Social Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity RiskSocial Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity Risk
 
Introducing Assure Security Risk Assessment
Introducing Assure Security Risk AssessmentIntroducing Assure Security Risk Assessment
Introducing Assure Security Risk Assessment
 
NARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeNARCA Presentation - IT Best Practice
NARCA Presentation - IT Best Practice
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the Cloud
 
Advanced Security Technologies and Trends
Advanced Security Technologies and TrendsAdvanced Security Technologies and Trends
Advanced Security Technologies and Trends
 
Advanced Security Technologies and Trends
Advanced Security Technologies and TrendsAdvanced Security Technologies and Trends
Advanced Security Technologies and Trends
 
Reducing Human Error in GMP with Automation
Reducing Human Error in GMP with AutomationReducing Human Error in GMP with Automation
Reducing Human Error in GMP with Automation
 
ClearPass Overview
ClearPass OverviewClearPass Overview
ClearPass Overview
 
Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013
 
Limtech - Presentation Product
Limtech - Presentation ProductLimtech - Presentation Product
Limtech - Presentation Product
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
3 02
3 023 02
3 02
 
O365 security and privacy de_novo_event_july2014
O365 security and privacy de_novo_event_july2014O365 security and privacy de_novo_event_july2014
O365 security and privacy de_novo_event_july2014
 

managingyouraccesscontrolsystems-130223182036-phpapp01

  • 2. Access Control Systems The Balancing Act Access Control Defined Key/Credential Management Control Configuration Software Features and Capabilities Controller Hardware Break Peripheral Components Access Controlled Door Hardware Types and Specifications Trends and Convergence Resources AGENDA
  • 3. How to get the most… VERBAL COMMUNICATION Approx 100% was what the speaker wanted to say Approx 80% was said Approx 60% was heard Approx 40% was remembered after 3 hours Approx 15% was remembered after 3 days Approx 0-5% was remembered after 3 months VERBAL + VISUAL COMMUNICATION Approx 60% was remembered after 3 days Approx 40-50% was remembered after 3 months VERBAL + VISUAL + NOTES Approx 80% was remembered after 3 days Approx 60-70% was remembered after 3 months HARVARD RESEARCH STUDY
  • 4. How to get the most… Why are we here? Gain Knowledge. Asking Questions.
  • 5. The Balancing Act • Security • Balancing Openness and Public Safety • Applying new technologies and lessons learned • Improving the physical security of buildings • Protecting people and assets while maintaining a pleasant work environment. • The challenge facing government officials, realtors and corporate building owners.
  • 6. Security….”The Absolutes” • Our world is dangerous and will get more dangerous • We take security for granted till something goes wrong. • Security is inconvenient- and expensive • Paranoid or Prepared? Politics! • Constant vigilance – Almost overwhelming! • 100%, guaranteed security ?? No such thing ! • 100% security = 0% accessibility • 100% security = 0% productivity
  • 7. • Buildings must be functional, comfortable, inspirational – SAFE • You don’t design a building for security. You secure the design of a building • Rethinking Security – new meaning to architects Architects and Security
  • 8. Security Elements • Deterrence • Training, Fences, Signage, Lighting, Consequences • Delay • Locks, Doors • Detection • Alarms, CCTV, Metal Detectors, Motion & Sound Sensors • Communication • Voice, Data, Video • Response • Crisis Preparedness, Security Personnel, Police
  • 9. Access Control Defined • WHO? • WHERE? / WHAT? • WHEN? / TIME?
  • 10. The WHO • The person, or device, requesting access to an area, or asset, we want to control. • Authentication Methods …something the person / device… • HAS – Physical • KNOWS – Knowledge of • IS / ARE – Biometric
  • 11. The WHERE / WHAT • The place or process we want to allow authorized persons to get to. • Physical and Logical • Controlled or Restricted area • As it relates to both manual and electronic access controls this is critical to our access management plan • Vending, gas dispensing, copier machine usage, time and attendance, meal plans and more
  • 12. The WHEN • The time period or interval when access is granted or denied. • Can be managed with both on line and off line systems • Also used for setting events and logic statements for: • Triggers • Time Zones • Timing responses to alarms • Timing for routing of messages to other devices
  • 13. Access Control Defined • WHO? • WHERE? / WHAT? • WHEN? / TIME?
  • 14. Access Control is… AS SIMPLE AS A KEY
  • 15. • Knowing exactly who has keys • Knowing areas of access of each key holder • Knowing key blanks are not readily available • Knowing keys cannot be copied without proper authorization • Having a policy on lost keys • When issuing temporary use of keys, keeping record trail Unauthorized key duplication remains the most violated security policy and one of the largest problem of facility managers Ultimate Key Management
  • 16. Key # 123 PLAIN BOWS D0 NOT DUPLICATE STAMPED BOWS Conventional Keyways A conventional keyway is one which the manufacturer will sell to anyone, it may most common, or the most used, or the "standard" or it may be family of keyways Yesterday’s Key Control
  • 17. COMPLETE KEY CONTROL STRONG UTILITY PATENT CONTROLLED KEY BLANKS LEGAL CONTRACTS AUDIT CONTROLS ENFORCEMENT Not a Design Patent Not Available to all Customers Agreements of Control Know Where Blanks Are Must Be Aware of Unauthorized Copies 5 Steps To Key Management
  • 18. 1. Patented keyways Utility patent gives manufacturer exclusive manufacturing rights Manufacturer control distribution Patent good for 20 years Imitation manufacturers cannot duplicate Assures protection to facility / owner Security Leg Millings for Keyway Blade Security Ledge Blade Today’s Key Management
  • 19. 2A. Manufacturer Controls Policy and procedures in place Signature verification Controlled access to product areas Ship key blanks direct to end user Has return key policy Provides specially coined blanks Policy 1. Verify all signatures 2. 3. 4 Today’s Key Management
  • 20. 2B. Facility/Owner Controls Policy and procedures in place supported by upper management Locksmith administrator on staff Locked storage Supervisor approval of new keys Employee signs for key Should have penalty attached All keys numbered and logged into system Procedure for keys to be returned should have penalty attached Additional procedures: Cleaning crew Outside contractors ISSUE TO : Bill Jones DATE ISSUED: 07-07-05 Request for New Key DATE: 07-04-05 TO: Lock shop NO. OF KEYS: 1 KEY NUMBER: 123 KEY SET: AB15 APPROVED BY: C T Smith ISSUE TO: Bill Jones RECEIVED BY: Bill Jones By Lock Shop ISSUE DATE: 07-07-05 ISSUED BY: CH RETURNED DATE Today’s Key Management
  • 21. 3. Contracts and Agreements Protects facility / owner Protects distributor Protects manufacturer Summarizes responsibilities to all parties Provides guide lines Eliminates misunderstanding We agree Today’s Key Management
  • 22. 4. Audit Controls Keep records – Use Software Use manufacturers original blanks Reduce master keying Have employees carry more than one key Stamp keys with code Utilize available forms Use sealed key rings AB15 123 1215 Today’s Key Management Use a key cabinet; electronic or manual
  • 23. Access Control is… AS SIMPLE AS A KEY
  • 24. Access Control is… This is a key! This too!
  • 25. The Credential • Most visible component of the system • Issued to personnel as “electronic keys” • Several Card Technologies • Badge Construction • Degree of Security Required • Durability • Reader Environment • Convenience and Price • Performance
  • 26. Card / I D Technology Types • Barium Ferrite • Bar Codes • Magnetic Stripe • Wiegand • Proximity • Smart Card • Hybrid
  • 27. Biometrics – Another Key • Biometrics and the “Smart Card” • Iris Scan • Finger Print • Facial Recognition • Retinal Scan • Voice Recognition • Hand Geometry • Others on the horizon
  • 28. Credentials / Smartcards Access Control Time & Attendance Free Free Personal Data Photo Vending Cafeteria PC Login
  • 29. Access Controls more about the “key” •The “Common Access Card” •FIPS 201 / HSPD12 •Database sharing trends •Communications options •Encryption – DES, AES •PINs
  • 30. Homeland Security Presidential Directive/Hspd-12 Subject: Policy for a Common Identification Standard for Federal Employees and Contractors (1) Wide variations in the quality and security of forms of identification used to gain access to secure Federal and other facilities where there is potential for terrorist attacks need to be eliminated. Therefore, it is the policy of the United States to enhance security, increase Government efficiency, reduce identity fraud, and protect personal privacy by establishing a mandatory, Government- wide standard for secure and reliable forms of identification issued by the Federal Government to its employees and contractors (including contractor employees). HSPD-12
  • 31. CONTROL CONFIGURATIONS •Stand Alone Systems •Multi-Door Systems •Enterprise Integrated Systems
  • 32. STAND ALONE SYSTEMS • Authentication Types; • PIN, Credential / Proximity, Biometric • Battery Operated or Wired • Keypad Programming • Computer Managed / PDA • Entry Automation • 1st Man In • Audit Trail • # Users • Labor vs. Hardwired System
  • 33. Single-User Multi-Door Systems • Instant Local Notification • Multiple Reader Type • Input Output Linking • Dedicated PC
  • 34. Multi-User / Multi-Door Systems • Instant Multiple Notification Options • LAN Access • Discretionary Reporting • Mandatory Controls
  • 35. IDENTITYIDENTITY MANAGEMENTMANAGEMENT DIGITAL VIDEODIGITAL VIDEO SURVEILLANCE &SURVEILLANCE & MANAGEMENTMANAGEMENT INFORMATIONINFORMATION SECURITYSECURITY ASSETASSET MANAGEMENTMANAGEMENT VISITORVISITOR MANAGEMENTMANAGEMENT ACCESSACCESS CONTROLCONTROL INTRUSIONINTRUSION DETECTIONDETECTION FIRE ALARMFIRE ALARM SYSTEMSSYSTEMS WIRELESSWIRELESS ACCESSACCESS MULTI-TENANTMULTI-TENANT PROPERTYPROPERTY MANAGEMENTMANAGEMENT INTEGRATEDINTEGRATED ALARMALARM MANAGEMENTMANAGEMENT BUILDINGBUILDING AUTOMATIONAUTOMATION INTERCOMINTERCOM COMMUNICATIONCOMMUNICATION SYSTEMSSYSTEMS Enterprise Systems
  • 36. Smart CardsSmart Cards IncidentIncident ReportingReporting Time andTime and AttendanceAttendance ERPERP CriminalCriminal HistoryHistory PayrollPayroll SocialSocial SecuritySecurity ActiveActive Directory/LDAPDirectory/LDAP AccessAccess ControlControl HumanHuman ResourcesResources MedicalMedical InformationInformation VisitorVisitor ManagementManagement BiometricBiometric TemplatesTemplates CredentialCredential ManagementManagement Bringing together disparate databases or information sources Enterprise Systems
  • 37. System Architecture Field Panel Door Controller Direct Connect RS-232 or RS-422 RS-422 CCTV System Access Control Life Safety ManagementPhoto Imaging Visitor Management Ethernet Network LAN/WAN RS-232 Field Panel Cellular POTS Field Panel Field Panel HVAC RS-232 Readers Field Panel Modem Dial-up Modem
  • 38. SOFTWARE • Integrated solutions sets • Network ready • SQL and Oracle • Linux based embedded solutions • Partition-able database • Windows XP, NT, 2000, Vista Compatibility • Web enabled • Web Embedded
  • 39. The Application Software • This is the GUI- It should be intuitive easy to train operators and managers • The database manager • Ability to partition and filter views based on passwords • Import and export features • Potential interface to HR database systems • May be Standalone or • Part of a network • Numerous work stations • Redundant emergency backup • Full set of utilities for storage and archiving
  • 40. Desired Software Features • Migration path (scalability) • Alarm Monitor capacity • Anti-Pass back • Event Triggers • Time zones and Holidays • Clearance (area) controls • CCTV Matrix Switching • Digital Video recorder event linking
  • 41. Desired Software Features •No limit on system scalability. • Unlimited Card Readers. • Unlimited Inputs/Outputs. • Unlimited Cardholders. • Unlimited Control Panels. • Unlimited Holidays. •Guard Tour application •Elevator Control •Full featured Badging •Real time status monitoring •Multiple reader technology support •Microsoft database •Report Manager •Visitor Management •ODBC and MDAC Compliant •Potential web access/enabled
  • 42. Access Granted Transactions     
  • 43. Access Denied Transactions     
  • 46. Actions that effect Card Readers     
  • 47. Actions that effect Contact Devices     
  • 48. Actions that effect Relays     
  • 49. Card Reader Triggers and Actions     
  • 50. Integrated Applications • Photo I D Creation • Bio-metric enrollment • Alarm management • Access Management • Air Quality monitoring • Visitor Controls • Digital Video event linking • Event and data base linking • Camera Controls • Virtual CCTV Matrixes • CCTV Analytics • Smartcard Application Support
  • 51. Access Control Panel Operation • Card is presented data sent to Panel • Panel compares information • Grants/Denies access • Based on Card Status • Time of Day • Cardholder’s access privileges • Other Administrator selected features
  • 52. Access Control Panels • Contain Microprocessors • On-board Random Access Memory (RAM) • Upgradeable Software stored in Erasable Program Read Only Memory (EPROM) • System Administrator or authorized web client enters all information related to system at host computer or direct to board via web with on board software in panel • Information may be downloaded to Access Control Panel’s RAM
  • 53. Access Control Panels • Once downloaded/programmed a Panel can process information locally. • “Intelligent” panels inform the Host of all actions taken, including time and date • Often referred to as “distributed processing” • Saves Host processing time
  • 54. Access Control Panel Operations • May be configured many ways • Can store thousands & some users are requiring Millions of records! • Multiple access levels • Time Zones • Thousands of historical transactions • Quantum leaps in storage abound
  • 55. Access Control Panel Operations • Can support Inputs • Can detect an input’s change of state, process the information and report it to the host computer/ or web based client on alarm • Typical Inputs include door monitor and request to exit (or bypass) devices • Can support Outputs • Door locking mechanisms • Sound or broadcast alarm devices • Lights, sirens, bells, digital dialers, etc. • Can be programmed so an Input activates or deactivates outputs automatically • Example: Glass break sensor (input) might activate a siren (output)
  • 57. Access Control Panel Wiring • Three different approaches to cabling of readers • Bus Cabling • Readers can be wired to a common cable that runs back to the panel • Saves wiring costs when readers are close to each other • Star Cabling • Readers can be wired to the panel individually • Combination Bus and Star sometimes is best • Independent IP / Network Drop communications via Network
  • 58. Access Control Panel Trends • Distributed intelligence • Embedded software – web enabled data management • FIPS- 201 for Federal Employees • Full feature set resident at the local panel • POTS pack up / cellular back up • HiCap memory backup • On line and off line capacity • Bio-metric / Smartcard • Integrated into lock hardware
  • 59. SEE YOU IN 5 Minutes QUESTIONS? Kevin Klemmer, PSP, CISSP
  • 60. Access Control Systems Access Control Hardware / Peripherals & IT Convergence Kevin Klemmer, PSP, CISSP
  • 62. The more things change… • Which one is the lock?
  • 63. Modern Castle – Corporate Campus
  • 64. Entrance to the Castle
  • 65. Entrance to the Castle The Opening 25 to 50% of the cost of access control implementation. Often perceived as the first line of defense.
  • 68. The Basics: Electric Locks Maglocks Strikes Cylindrical Mortise Exits Peripherals
  • 69. Safety Security Control & Monitoring Remote Locking Reduces Manpower Convenience ADA requirements Benefits of Electrified Hardware ELECTRIFIED HARDWARE Performs functions normally executed manually, usually from remote location or automated. Must specify a system with all components compatible. One component will not work without the others.
  • 70. Components of a System ACCESS CONTROL HARDWARE
  • 71. TRANSFORME R INPUT 120VA C OUTPUT 24VDC RECTIFIER REGULATOR CAPACITOR FILTER Reduces Voltage Converts AC to DC Stores needed current Eliminates “Noise” Keeps Output Constant Parts of a Regulated Power Supply ACCESS CONTROL HARDWARE
  • 72. The power supply must furnish the SAME voltage as required by the load. The current (amps) available from the power supply must be EQUAL TO or GREATER THAN that required by the total load of the system. ACCESS CONTROL HARDWARE
  • 73. Converts electrical energy into another form I.e., unlocks a solenoid, retracts a latch bolt, etc Performs the work required Electric Lock or Strike Electric Exit Device Closer / Holder Electromagnetic Holders ACCESS CONTROL HARDWARE
  • 74. FAIL SAFE • Lock or locking device that remains UNLOCKED on loss of power FAIL SECURE (non-fail safe) • Lock or locking device that remains LOCKED on loss of power Terminology ACCESS CONTROL HARDWARE
  • 75. Electrical Characteristics of a Load Need to Know to Select Power Supply • Current Draw In Amps • Voltage Required • Fail Safe / Fail Secure ACCESS CONTROL HARDWARE
  • 76. Key Pad Key Switch Toggle Switch Push Button Stand Alone System Access Control System Switches are used to control a locking device or to signal a monitoring device ACCESS CONTROL HARDWARE
  • 77. Switches are used to control a locking device or to signal a monitoring device Each switch has one movable contact, the POLE, and one or more fixed contacts, the THROWS SWITCH SYMBOL Normally open ACCESS CONTROL HARDWARE
  • 78. Normally closed Switches are used to control a locking device or to signal a monitoring device Each switch has one movable contact, the POLE, and one or more fixed contacts, the THROWS SWITCH SYMBOL ACCESS CONTROL HARDWARE
  • 79. MAINTAINED CONTACT • A switch designed for applications requiring sustained contact; but with provision for resetting i.e., ordinary light switch MOMENTARY CONTACT • A spring loaded switch designed for applications requiring constant contact; when pressure is removed, reverts back to original position i.e., door bell Terminology ACCESS CONTROL HARDWARE
  • 80. Carries current through system The more distance between the power source and the load, a heavier wire gauge is required # 1 TROUBLESHOOTING PROBLEM ACCESS CONTROL HARDWARE
  • 81. Size of Conductor (Gauge) Length of Conductor (Resistance) The farther the load is from the power supply, the more resistance is experienced; a heavier gauge wire is required Need to Know ACCESS CONTROL HARDWARE
  • 82. 25 50 100 150 200 250 300 400 500 0.25 18 18 18 18 18 18 18 18 16 0.50 18 18 18 18 16 16 16 14 14 0.75 18 18 18 18 16 16 14 14 1.00 18 18 18 16 16 14 14 1.50 18 18 18 16 16 14 2.00 18 18 16 16 14 2.50 18 18 16 14 3.00 18 16 14 3.50 18 16 14 Distance in feet from Power Supply to Locking Device MINIMUM WIRE GAUGE FOR 24V DC or AC A M P S ACCESS CONTROL HARDWARE
  • 84. 1. OPERATIONS NARRATIVE 4. WIRING DIAGRAM 2. HARDWARE LIST 3. ELEVATION DRAWING REQUIREMENTS • Outside Operation • At Rest (while locked) • Electrically Unlock • Mechanically Unlock • Power Failure • LED’s • Inside Operation 1. OPERATIONS NARRATIVE ACCESS CONTROL HARDWARE
  • 85. 1. Power Supply 2. Key Pad 3. Power Transfer 4. Electric Exit Device 3. ELEVATION DRAWING 4. WIRING DIAGRAM 2. HARDWARE LIST 1. OPERATIONS NARRATIVE 2. HARDWARE LIST ACCESS CONTROL HARDWARE
  • 88. Making Hardware Selections Based On Owner’s InstructionsCashier's Door from Drivers Lounge Closed and Locked at all Times Must Be Entered During Day Employees Secretary To Remotely Unlock Door Management Always Able To Enter * DRIVERS LOUNGE CASHIER CHOICES
  • 89. 1.OPERATIONS NARRATIVE Door is normally closed, latched and secure from the outside. Depressing the push switch will unlock the electric strike to allow ingress. Door will relock as soon as push button returns to normal position. Loss of power, the door will remain locked. Enter by key at all times. Free egress from inside at all times. 2.HARDWARE LIST Load Switch Power Supply Electric Strike 712NFS 24VDC Push Button PB Transformer TP-24-2 EXAMPLE
  • 90. TO RISER DIAGRAM 3. ELEVATION EXAMPLE 18 ga 18 ga GAGE AND NUMBER OF CONDUCTORS Rectifier PB 712NFS Electric Strike Transformer 24VAC output TP-24-2 120VAC INPUT
  • 91. Systems Wiring Diagram or Point to Point Wiring Diagram 4. WIRING DIAGRAM EXAMPLE Electric StrikeTransformer + - Non- polarized C NO NC Pushbutton PUSH TO EXIT 120VAC LockedUn- Locked
  • 92. COMPONENTS & ELEMENTS POWER SUPPLY LOAD SWITCH CONDUCTORS 4 COMPONENTS OPERATIONS NARRATIVE HARDWARE LIST ELEVATION DRAWING WIRING DIAGRAM 4 ELEMENTS
  • 93. Access Control Trends Smaller, Faster, Better More Integrated Features Embedded Web Server Open Source WiFi - Wireless
  • 94. Access Control Trends Embedded Prox Technology Monitoring Options Request To Exit Door Contact Keyswitch Monitoring Other options…
  • 95. Convergence Analog to IP (Security to IT) Applications Convergence Physical and Cyber “Soon the security industry will move to systems in which there are no analog or proprietary wired devices at all; where all devices connect to the Ethernet infrastructure. The knowledge of how to design efficient network systems and how to secure those systems is paramount to successful security systems. This is the future of security technology” Thomas Norman, Protection Partners International Integrated Security Systems Design
  • 96. Threats of Converged Enterprise Mode of Attack Physical Security Physical Attack Physical Attacks Against Cyber Information Security Information Attack Cyber Intrusion Identifies Valued Targets Targets Facilities People Media $$$ Computers Information
  • 97. Convergence Migration IP Communications Fire Physical Security Lighting Visitor Access Elevator 24 / 7 Monitor Energy HVAC WAN Intelligent Converged EnvironmentDisparate Building Networks
  • 98. Convergence Benefits HVAC 24/7 Monitor Video surveillance Elevator Lighting Fire Access Energy Benefits:  Safety and security  Environmental sustainability  Occupant comfort  Organizational flexibility  Streamlined operations  Reduced costs  Energy savings  Managed services  Data mining  Process Measurement ServicesandTechnologies
  • 100. Reduce security vulnerabilities in all types of facilities. The industry's first-ever guide for exterior and interior security features, NFPA 730: Guide for Premises Security addresses security in all occupancies from residential dwellings to large industrial complexes. Uniform guidelines help you assess vulnerability and design appropriate security plans. Provisions describe construction, protection, and occupancy features and practices intended to reduce security risks to life and property. Topics covered include: General requirements and facility classifications Security vulnerability assessment Exterior security devices and systems Physical security devices Interior security systems Security planning Measures to control security vulnerabilities in educational, healthcare, and other facilities The Guide also addresses protocols for special events, and the responsibilities of security personnel. (Approx. 88 pp., 2006) Resources
  • 101. Ensure the quality and reliability of security system installations NFPA 731; Installation of Electronic Premises Security Systems is the first Standard developed primarily to define the means of signal initiation, transmission, notification, and annunciation, as well as the levels of performance and the reliability of electronic security systems. Requirements cover every step of security equipment installation, with provisions for the application, location, performance, testing, and maintenance of physical security systems and their components. Detailed chapters are included for: Intrusion detection systems Electronic access control systems Video surveillance systems Holdup, duress, and ambush systems Testing and inspection Rules address the protected premises from the property line to the interior of the premises. NFPA 731 also references or incorporates provisions from applicable UL, SIA, and other standards. (Approx. 43 pp., 2006) Resources
  • 102. ETHICS IN SECURITY • Perform professional duties in accordance with the law and the highest moral principles. • Observe the precepts of truthfulness, honesty, and integrity. • Be faithful, competent, and diligent in discharging their professional duties. • Safeguard confidential and privileged information and exercise due care to prevent its improper disclosure. • Not maliciously injure the professional reputation or practice of colleagues, clients, or employees. Physical Security Professionals must adhere to the Code of Professional Responsibility, agreeing to:

Notas do Editor

  1. >>note to speaker—orange text block will pop in on next screen click—you may want it to come in first<< or you may want it to come in last >> Studies have shown that unauthorized duplication remains the most violated security policy and largest single problem with large facility managers Well, what are some of the ways a facility manager can protect the integrity of the system? First, by knowing the answers to these questions >>speaker can read questions and make comments if desired<<
  2. Let’s explore the five points of today’s key control. First, is the patent itself. When a strong utility patent is granted it gives the holder certain rights under the law. With a patent, the manufacturer controls the sale and distribution of keys and blanks for the life of the patent. Then, extensions have been known to be granted. A distributor must enter into agreements with the manufacturer to protect his patents and to protect the end user. One of those agreements is audit controls from all three levels; the manufacturer, the distributor and the owner/facility must have controls in place to insure blanks do not get in the market. And the manufacturer must be willing to take violators of their patents to court. Let’s explore the five points of today’s key control. First, is the patent itself. When a strong utility patent is granted it gives the holder certain rights under the law. With a patent, the manufacturer controls the sale and distribution of keys and blanks for the life of the patent. Then, extensions have been known to be granted. A distributor must enter into agreements with the manufacturer to protect his patents and to protect the end user. One of those agreements is audit controls from all three levels; the manufacturer, the distributor and the owner/facility must have controls in place to insure blanks do not get in the market. And the manufacturer must be willing to take violators of their patents to court.
  3. Now, let’s discuss each of the five points. A strong utility patent gives the patent holder exclusive manufacturing rights , usually for 18 or 20 years depending on the patent. This in turn gives the manufacturer total control of distribution for that time. Secondary or imitation manufacturers cannot duplicate that product, in our case here, a patented key or keyway until penalty of law. Now the manufacturer has some teeth in the statement “DO NOT DUPLICATE UNDER PENALTY OF LAW” This, in turn, gives the end-user protection from every big box store and local locksmith from having keys to their system and the ability to duplicate keys.
  4. Now, this talk about point 2, How the manufacturer may protect keys and key blanks. The manufacturer should have in place policies and procedures governing employees during the process of these orders. At the order entry level, how the handling of orders, how data is entered, how data is transferred all should be different procedures from normal incoming orders; because they are different. More control is required including a system that only allows certain persons to place orders for this material; including, many times, a signature verification. The factory level should have restricted areas where the material is fabricated, assembled or stored with a controlled access for those employees only. In addition, the factory employees should be familiar with other procedures like key blanks only shipping direct to the end-user, that manufacturing keeps count of all keys, even ones discovered to be made wrong. This what we refer to when we say “a return key policy”. Not physically having keys returned, but knowing where all keys and blanks are, or what happened to them. Keys made wrong in factory should be destroyed, but records kept. A specially coined key bow to identify the patent number should be used to discourage any counterfeiters.
  5. No system will be reliable if the owner or end-user does not protect his investment. If keys are duplicated and distributed at will, with no controls, then the owner is still on the road to “lost key control”. Therefore, polices and procedures should be in place at the facility level. These polices must be supported by upper management if they are going to work properly. Having two sets of polices, one for management and one for others will not work for long. Employees should know that rules will be followed by all. Some of the policies or procedures should include: an administrator on staff who is responsible for record keeping; having supervisors only request new keys; having employees sign for keys; some facilities are even putting a penalty clause in the signature form acknowledges a lost key and it goes into the personnel file. The administrator should make sure make sure materials sure under locked storage; having all keys numbered and logged into system identifying which employees has which key number and what access that person has with that key. Also, let’s not forget about outside personnel who make require keys from time to time; such as after hours cleaning crew or outside contractors like air conditioning & heating workers. They should sign affidavits when given a key and when it should be returned and who it should be returned to. And a penalty if they key is lost. Maybe the penalty should be re-keying the area or the entire building.
  6. For the protection of the system, these policies and procedures should be agreed to by the parties involved; the manufacturer, distributor and end-user so that all know is being done. These agreements protect all three levels by summarizing responsibilities of all parties and providing guidelines on how to maintain the system at each level. These are not formal contracts requiring attorney approval, just simple agreements by eliminating possible misunderstandings.
  7. What else can be done? Simple steps like reduce the levels of master keying, and especially cross keying; have employees carry more than one key; stamp all keys with a code and match the code with an employee; use sealed key rings so keys cannot be removed; and, use some type of key cabinet and their forms.
  8. Enterprise solutions, today, it touches everything in the building.
  9. Realization of the need to integrate ALL security data sources Bringing together disparate databases or information sources
  10. Typical system.
  11. This diagram shows what happens inside a typical filtered and regulated power supply unit: CLICK: the house current, 120VAC enters and the transformer CLICK: reduces the voltage to 24 volts CLICK: the rectifier CLICK: converts AC to DC CLICK: a capacitor CLICK: stores the needed current and filters out “noise” or interference CLICK: and a regulator CLICK: maintains a constant level of current CLICK: to deliver reliable energy in the form of a filtered and regulated 24VDC output. This type of power supply is the best choice in most systems and may be required for warranty purposes as well.
  12. All loads are either FAIL SAFE or FAIL SECURE. Folger Adam frequently list FAIL SECURE as NON-FAIL SAFE (NFS) Fail Safe means that the door will be unlocked upon the loss of power. A fail safe lock needs to be energized to be locked. Fail Secure is just the opposite. A fail secure lock will be locked upon the loss of power. A fail secure lock needs to be energized to be unlocked. Non fail safe means the same as fail secure (opposite of fail safe) For doors required in secure areas (such as an exterior door or a door to a sensitive area like a payroll office) fail secure is the best choice. Fail safe operation is usually found on doors that would be required for life safety – such as stairwell doors that are usually locked but would be needed for egress in the event of a fire.
  13. The electrical characteristics you need to know about the load are the current draw and the required operating voltage. For example, if a system consists of 2 doors each with an electric strike that draws .33 (point three three) amps at 24VDC, there is a total of .66 (point six six) amps at 24VDC. A 1.0 (one point zero) amp, 24 Volt DC power supply would be sufficient to make this system work.
  14. This diagram shows a symbol for a switch that might be used on a wiring diagram. This switch is shown in the “open” condition meaning that the circuit is open and there is no flow of energy. When operated, the pole is moved to make contact with the throw and thus closing the circuit to allow current flow.
  15. This diagram shows a symbol for a switch that might be used on a wiring diagram. This switch is shown in the “open” condition meaning that the circuit is open and there is no flow of energy. When operated, the pole is moved to make contact with the throw and thus closing the circuit to allow current flow.
  16. The other concept concerning switches is how long the switch makes contact when it is actuated. When a maintained contact switch, also known as alternate action (AA), is pressed, it stays in that position until it is pressed again. Think of a light switch. When you turn on the light, it stays that way until you touch it again. Then it stays THAT way. A momentary contact switch changes status only while it is being pressed. As soon as you take your finger off, it springs back to its original status. An example would be a door bell. Either of these switches can be wired NORMALLY OPEN or NORMALLY CLOSED. The point to remember is you must choose MAINTAINED or MOMENTARY in advance and they can be wired either NORMALLY OPEN or NORMALLY CLOSED depending on how the system is supposed to work.
  17. Although there are guides to follow that help determine the proper conductor to use, the fact remains that the larger the current, the larger the wire; BUT the smaller the gauge measurement. For example, 14 ga. wire is heavier than 20 ga. The other principle to consider is the distance from the power supply to the load. Longer wire runs will require heavier gauge wire to prevent voltage drop. This distance will obviously vary from project to project.
  18. This is sample of the National Electric Code minimum wire size for 24VDC. Other charts will detail other voltages. An expanded chart is shown on page ? of the Accessories and Technical Data section of the Folger Adam Electric Strike Catalog
  19. Now let’s explore how to select electrified hardware based on an owner’s instructions. The door is a interior office door to a cashiers window. The owner has indicated that the door is closed and locked at all times, but wants entry controlled by the secretary to avoid overcrowding the tiny space. Management needs to be able to get in at any time, particular in the morning before the secretary comes in (click)
  20. The first thing we need to do is develop a Operations Narrative from the owner’s instructions. It might read like this: (READ NARRATIVE) A narrative may be in bullet point method or written paragraph form. The main goal is to interpret what the owner wants and needs. The next step is to choose the hardware products that will satisfy the narrative. (click for hardware list) My first choice is usually the load. I want to know what is doing the work. In more complex systems, I will also want to know the amperes of my load. As in any electrified system, the choices are as varied as days of the week. Since this is a seemingly simple system using an interior door, the choice here is a electric strike. (click) We chose the heavy duty 712 instead of a 100 series because of the expected abuse and frequency it might take and because it works with mortise and cylindrical locks. And it fits into a standard hollow metal frame with minimum modifications. We also chose Fail Secure or Non-Fail Safe (or NFS) because with loss of power we want it to be locked. A electric lock could have been chosen, but the owner seemed to want traffic control more than security according to his instructions. (click) Next, we would choose a switch. In this case, the FAPB momentary push button switch was selected. Depressing the button will send power to the strike and it will unlock. When the button returns to a normal state, the power is removed and the strike is locked. (click) For our power supply, transformer was selected to keep the system simple. We chose a relative common transformer with 24 volts DC. You will notice that our strike is be the same voltage, 24 volts DC as we learned earlier. What other fact do we need prior to making a final selection of our transformer? If you remember, the power supply must furnish the same or more current than what our load uses. According to the Folger Adam catalog, the 712 electric strike strike at 24VDC uses .15 amps and our ASE-1-20 is .800 mA, so we have a match with plenty to spare. The power supply could be the last item selected since we need to know the total amps being used if it were operating more than one door or load The conductors are usually supplied by the installer, so we have not included them here. Operations narratives should be included in all specifications and hardware submittals to make sure all components are included and everyone knows how the system is supposed to work Any questions (click to next slide)
  21. This would resemble a elevation drawing as described earlier in the presentation. If we wanted to, we could add the Operations Narrative and Hardware List to the elevation for more detail, but if we have attached, that’s ok too. To make this a Riser Diagram, we would need to know the location of each product and use the NEC chart to indicate the wire size. Let’s say the secretary’s desk is 33 feet from the door and the transformer and rectifier are within two feet of the door. Then we could use the chart as shown in the Folger Adam catalog and determine the wire size. If the dimension we are looking for is not there, we go to the next length; in this case it would be 50 feet. So running 24VDC to 50 feet, the chart indicates the wire size should be 18 gauge. (click for wire gauge) The term “riser diagram” is different here than when used in true electrical and plumbing floor plans where the illustration shows all electrical or plumbing hook ups building wide. The elevation should be included with all hardware submittals to show a connectivety to all components and if you can change that to a riser diagram, make it the submittal instead of a elevation. (click to next slide)
  22. If you will remember “the fours”, (click …click) you will be able to plan, specify, furnish and furnish electrified hardware access control systems and have them installed and operating the way the owner wants them to operate.