dq6
.docx
keyboard_arrow_up
School
American Public University *
*We aren’t endorsed by this school
Course
390
Subject
Information Systems
Date
Jan 9, 2024
Type
docx
Pages
1
Uploaded by NadiaP6
from a security manager’s perspective, what is the importance of an access control system and outline what specific features should be utilized on an integrated access control system? Select a particular biometric security application to focus upon that can be employed at a facility. Regarding it, what are some of its strengths as it relates to providing security as well as challenges presented to the security manager and its application?
Security
is the set of measures put in place to discourage or eliminate the likelihood of anything bad occurring. Achieving this objective via the utilization of our physical and, more recently, technical resources or a combination of the two is good security. In the past, we used to do business in a different manner, but we
now know that this created a host of problems with falsifications and false IDs. When we think of Access Control Systems (ACS), we typically picture a guard standing at the entrance, checking IDs or badges. We can improve our protection strategy with the help of technology, but we need to figure out what function technology plays in our plan before we can use it (Brooks & Smith, 2013, p.154)
An individual's eligibility to be at a certain location is dependent on their ability to be detected, recognized, and identified, the three pillars of advanced citizen security (ACS).For instance, at a bank, only the manager and a select few individuals are given access to the valve, while other workers do not. This is just one example of how high-level executives in a company have exclusive privileges. This also applies to facilities that allow visitors with prior permission and restricted access to certain areas; for instance, it would be nice to use a nuclear power plant as an example.
Some features that I would want to see implemented in an ACS facility include measures to prevent unauthorized entry, such as security guards who conduct searches at the entrance, round-the-clock surveillance cameras that cover the whole perimeter and all doors, and the ability to open primary doors with a badge scan. Biometrics, as we have seen, allow for the identification of individuals by means of their unique physical and behavioral traits (Smith & Brooks, 2013p160).A radio-frequency identification (RFID) reader that uses a Han-geometry system to compare a user's hand shape and other measures to those already saved in a database would be perfect for my facility's needs. The primary entry points for plant personnel are ideal locations for this system to be installed. Workers will be able to open doors by placing their proximity cards on a hand-key reader, which will then compare the data stored with their card.
Reference
Clifton L. Smith & David J. Brooks, 2013, The Theory and Practice of Security, 2013
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help