Who Goes There?

Access Control Offers Power to Choose


A Look at the Future

New smart cards, now being developed, will increase storage from 30 bits of data to about 2K bits – enough to store a biometric template. The scanner can compare the onboard template to the actual hand, fingerprint, or iris much faster than retrieving a template from a central database. While databases are secure, this technology adds layers of protection to protect privacy.

New networking and interface protocols will also make access control systems easier to integrate into building automation systems. TCP/IP systems will eliminate the need for separate security hard-wiring, allowing security components to be given IP addresses and connected using fast Ethernet or the like.

System modifications will be easier, and even a small company’s security personnel will be able to view an entrance door at a subsidiary in Hong Kong, in real-time, using the Internet.

By Richard Chace

Since Sept. 11, security and safety have occupied a much more prominent place in the minds of most Americans, while their tolerance of increased security measures has increased. That makes this an excellent time to consider your building’s security profile, and to make any improvements that may be necessary.

A key component of any security system is access control. The wide range of available products and software-driven systems makes it easy to tailor access control precisely to particular security needs.

The first step: Have a thorough security audit conducted by a security professional. If qualified in-house staff is not available, retain an outside consultant. Results of an audit should provide:

• Identification of all assets, including physical property, intellectual property and human resources.

• An objective, detailed delineation of all realistic threats related to each asset or asset group.

• An assessment of the value (i.e., level of protection) required for each asset.

• An assessment of the computer infrastructure on which the access system will ride.

• An overview of privacy issues affecting all building occupants.

• Fire-safety, employee monitoring, and building evacuation needs.

Once needs are assessed, current security procedures and systems should be analyzed as to adequacy, and a plan developed to enhance access control, fire-safety, and building monitoring. Here, new technologies should be actively investigated, since security technologies are evolving rapidly and the flexibility and effectiveness of new technologies and integrated systems are far-reaching. New technologies should be adopted, however, only when they make sense.

In the wake of September 11, it is important to make a realistic assessment of terrorist threats. Is there really a likelihood that a group of terrorists might storm the building? In some cases – for instance, for a biotechnology company holding virus stocks in its laboratory – the threat might be real. For the vast majority of facilities, however, where occupants conduct routine commerce, the threats today remain identical to those before September 11. Those are the threats the security system should be designed to counter.

Access control can be achieved using a hierarchy of technologies:

• Simple photo ID, compared to each individual by a security officer.

• A video unit monitored remotely by a security officer, who allows access only to individuals known to the officer.

• A key card (contact or non-contact) that operates an electronic lock.

• A “smart” card housing a small chip that stores an employee number or other identifying code, allowing tracking of employee movements within a facility.

• A biometric unit that scans an individual’s hand geometry, fingerprint, or iris and compares it to a template for that individual.

• A combination of smart card and PIN or biometric verification, to prevent unauthorized access using a lost or stolen card.

These technologies can also be used in conjunction, providing layers of security where needs and threat level justify redundancy. In addition, all access points can be monitored by live and recorded video.

For more information about access control systems and security in general, visit (www.securitygateway.com).

Richard Chace is executive director at the Security Industry Association (SIA), Alexandria, VA.


comments powered by Disqus
comments powered by Disqus

Related Products