1 / 1

Major mistakes in the turnstiles and access control

"The introduction of access control in the enterprise due to security requirements, as well as the need to<br>obtain high-quality tools for time tracking. However, the neglect of some of the technical features, as<br>well as violation mounting technology of essential elements of the system leads to the appearance of<br>""holes"" in security."<br>

magnumtele
Download Presentation

Major mistakes in the turnstiles and access control

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Major mistakes in the turnstiles and access control The introduction of access control in the enterprise due to security requirements, as well as the need to obtain high-quality tools for time tracking. However, the neglect of some of the technical features, as well as violation mounting technology of essential elements of the system leads to the appearance of "holes" in security. These errors make it possible to penetrate into the territory of non-authorized persons, as well as provide opportunities for violation of the regime on the part of the staff. Improper installation of turnstiles and doors Many businesses wrongly placed tourniquets, especially if the passage is wide. A key principle of the turnstile rotary element should completely cover the passage, prevent squeeze sideways, etc. If the passage width substantially greater than the width of the working mechanism of the turnstile, it is necessary either to introduce a system of several turnstiles or artificially make passage already in place turnstile installation. Often tourniquets left unattended. This is a flagrant violation of Security: provides automation but does not protect against malicious acts because communicating have to be protected, to be under control. The presence of a security guard immediately deprives potential violator’s enthusiasm for illegal entry. When installing Security Access Control System In India on the door with automatic door closer is too long a period, closing the door. We need to set up closer so that it is closed as soon as possible. Even if it would seem subjectively uncomfortable for those, who pass through the door. Since the possibility to intercept the door during closing - one of the common causes of penetration of foreign object. Protection systems make "symbolic." Instead of strong and reliable doors (and good-quality turnstiles ), which is very problematic to open by force, set the budget and "decorative" model, which only indicates the obstruction passes. Of course, no one, even the most robust, the door will not provide 100% protection against hacking. But the more powerful mechanical obstruction, the longer it takes an attacker to penetrate, and therefore the higher the chances that it will notice and put an end activity. Conceptual errors in the development of Access Control Systems Access Control Systems does not complement the surveillance system. This is a grave miscalculation since no events on fixing video skipping points system remain virtually defenseless. If there is any irregularity, tracking it will be almost impossible. In a large company with several particularly responsible zones (e.g., a server or storage) use ACS with one level of access without individual access rights for each door. Or worse, use single-door access control system, giving all personnel access to all rooms. This significantly increases the risks, both external and internal. For objects with high-security requirements apply solutions that do not cover the whole control of the triad (“Key + knowledge + biometrics"), resulting in a potential for hacking. For objects with a large number of operating personnel and a considerable flow of people passing through the turnstile, the checkpoint is set too narrow (e.g., two turnstiles) and introducing inefficient solutions themselves turnstiles with low bandwidth.

More Related