Why do you need to know the ABC's of Access Control? With threats to security being a constant concern, the quest on how to better control facility access
is an ongoing process. When talking access control, it is all about WHO, WHERE and WHEN.
Prior to the introduction of electronic access control systems
, an access control was enforced through keys and locks. A person with a key could enter a locked door; and that is about as far as access control went. There was no way to restrict access on specific times or dates; so long as a person possessed the key, they were in.
The dawn of electronic access control systems began in the 1960’s. They were developed to eliminate problems with lost keys. Not only was a lost key a high security risk, it was also a big hassle to change locks each time it happened.
However, more than just addressing the lost key situation, it enabled those in charge of security to add, allow, restrict or deny any person’s access to any specific area at any time.
The use of electronic access control systems answered the need to control WHO
can gain and WHERE
that access is given.
This is the equipment that electronically locks and unlocks the doors that are controlled by the access control system. The hardware, in most cases, is designed to control entrance into a building
or a secure space, but in order to comply with building and fire codes, they do not normally restrict exit at any time, although there are exceptions.
The server computer serves as the “brain” of the access control system. The server computer runs easy to understand access control application software. The server and the accompanying software contains the database of authorized persons, as well as, the commands for entryways within the building or property.
New technology today provides for the option for the Access Control Server and associated software to run in the cloud as a cloud-based solution. The cloud-based access control system
reduces costs and increases ease of access to the system through the internet or a smartphone, with proper credentials, of course.
The system allows for tracking of WHO entered the premises, at WHAT time and WHERE they went. An audit trail is generated and can be used to assist investigation into any security breach.
In electronic access control systems, credentials are essentially the “keys”. These are presented to the reader to gain access to a secure area. When access is granted, the door is unlocked for a predetermined time. Information such as time and date of entry is recorded.
Credentials used in electronic access control systems depend on the kind of readers that are used:
a. Personal Identification Number (PIN) in case of Keypads
b. Smart Card or Fob
for Card Readers
c. Fingerprint, Handprint or any Biometric characteristic for Biometric Readers
As mentioned above, audit trails are created and businesses can keep a record of persons who entered and the exact time they entered. This becomes especially useful if thefts or any incidents occur that can be narrowed down to a specific time period; records can be pulled up to determine who entered the building corresponding to the time period.
What information is stored by the system?
- Date and time credential was used
- Name of credential holder
- Unique ID number or badge number
- Name of door or reader being accessed
- Access granted/denied condition
This information can stored up to several years.