ACCESS CONTROL SYSTEM (ACS)
At a very basic level, access control is a means of controlling who enters a location and when.The person entering may be an employee, a contractor or a visitor and they may be on foot,driving a vehicle or using another mode of transport. The location they’re entering may be,for example, a site, a building, a room or a cabinet.
WHAT IS QUEUE MANAGEMENT?
Access control is a security technique that can be used to regulate who or what can view or use resources in a computing environment.
There are two main types of access control:
– Physical access control limits access to campuses, buildings, rooms & physical IT assets.
– Logical access limits connections to computer networks, system files and data.
THE FOUR MAIN CATEGORIES OF ACCESS CONTROL ARE:
- Mandatory access control
- Discretionary access control
- Role-based access control
- Rule-based access control
- Access control systems
Performauthorization identification, authentication, access approval, and accountability of entities through login credentials includingpasswords, personal identification numbers (PINS), biometric scans, and physical or electronic keys.
INCREASED ACCESS CONTROL AND SECURITY
By using an electronic access control system, you can avoid the downsides of using mechanical keys and also gain much more control.
It will manage:
Who has access
You may, for example, only want to allow automatic access to employees. Whereas you’d like visitors and contractors to report to the reception desk on arrival.
Which doors they have access to
You may want only some people to enter certain areas. For example, you only want technicians to be allowed in your labs.
What times they can gain access
Contractors and junior staff may only be allowed access during their standard shift pattern,whereas senior staff can enter the building at any time.
Under which conditions they’re allowed access For example, you may set your system so contractors are only allowed access if it shows they’ve presented their certification. What gives you even more control is that a good access control system lets you set these parameters for each individual. And you can quickly & easily update them whenever you need to.
A VARIETY OF IDENTIFIERS
FOR ACCESS CONTROL SOLUTIONS
Access cards are still the most common identifiers used in access control systems. You present your card to a reader &, if all the conditions stored in the system are met, you’re allowed to enter.
There are other options to cards, however, and some offer higher levels of security.
The key identification methods are:
Something you have – such as an access card or badge or another type of identification tag.
Something you know – for example a PIN or password.
Something you are – biometric identifiers such as your fingerprint or iris.
Each identification method has pros and cons, so the method to choose depends on the situation. You might choose one method for external doors, for example, and another method for internal doors.
You can also combine two identification methods to increase your security standards. This is called verification – you use the first method to identify yourself and the second to verify that it’s you. So, for a room that holds valuable goods, you might ask people to use their access card for identification and then ask them to supply a PIN or present their fingerprint for verification.