Preview

Access Control - Security Administration

Powerful Essays
Open Document
Open Document
1765 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Access Control - Security Administration
Security Administration SEC330

Access Control

By John McDowall

September 16, 2012
Thesis: The decisions that need to be made when determining the types of access control you will need, along with the types of access control systems that are available and how they are used.
Table of Contents

I. Introduction II. The decision making process. 1. Do we need access control and why. 2. Access Control Functions. III. Access control systems. 1. Types of systems. 2. Uses of different systems 3. Access control system components 4. Access control topology. IV. Security risks 1. What are the risks vs. benefits V. Conclusion. VI. References.

Introduction
Going back hundreds of years, we have always recognized the need to restrict access to our homes, businesses, or any place that does not welcome the public as a whole. In the very early times, people might have used something very simple and basic such as a large rock or other obstruction to block the entrance to their home. In more modern times we use things like doors, locks, fences, gates, or any other number of obstacles to prevent entry of those who are not welcome. In today 's world we consider access control as something that grants or denies entry to our homes and businesses using a system or device such as a key, access cards, security pins or even physical guards. Modern day systems can do much more than just restrict access to a given space, but their basic function is to do just that, restrict access.

The Decision making process
Do we need access control and why.
Think for a moment how many buildings or facilities that you know of that don’t have at least a lock on the door. In todays civilized society we unfortunately also have crime and lots of it. Because of this, we must have access control. The main reason for controlling access is to prevent someone from entering that may want to steal and damage property or cause harm to those



References: Finger key, hand key and hand reader Retrieved October 1st , 2012 from http://www.officesecuritypro.com/office-security-articles/access-control-security-system.php Access Control Retrieved October 1st , 2012 from http://en.wikipedia.org/wiki/Access_control Internal control systems, Retrieved October 5th, 2012 from http://internalcontrolsys.com/index.php?option=com_content&view=article&id=66:access-control-benefits-and-use-&catid=13:security-knowledge-base&Itemid=56

You May Also Find These Documents Helpful

  • Good Essays

    • Prepare a 5 to 10 minute PowerPoint assisted presentation on important access control infrastructure, and management aspects from each location.…

    • 991 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Week 8 Paper

    • 2205 Words
    • 6 Pages

    Limiting access control to NextGard’’s operating systems should be top priority. Attackers need a means to connect to a network to gain access to information, if their means to access the network it block then NextGard’s information and data is greater secured. Implementing a Access Control List is a set of specifies entries given to a trustee that tells an operating system which access rights each user has to a particular network system object such as a directory. The access control list is a secure measure used to limit the user’s ability to read, write, and make changes to files, and documents.…

    • 2205 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Relate how Windows Server 2008 R2 Active Directory and the configuration of access controls achieve CIA for departmental LANs, departmental folders, and data.…

    • 263 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Sanhu, R., & Samarati, P. (1996). Authentication, access control, and audit. ACM Computing Surveys (CSUR), 28(1), 241-243.…

    • 1465 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    The scope of this project is to develop an access control system on or before 31 December 2012, which is the final date for installation and testing of all components. The project shall include services and parts pertaining to design, installation, operation, maintenance, repair and support of a complete access control system. The general scope of work comprises three essential elements: 1) IDS and HSPD-12 PACS; 2) Project Management (PM), and 3) Operations and Maintenance (O&M).…

    • 366 Words
    • 2 Pages
    Good Essays
  • Good Essays

    One of the most important things that need security, whether you are single or a family, is as simple as a desk or wall locker. Almost everything we do each day can be found in one. We tend to put car keys, and house keys in a desk or locker. We also tend to keep important paper or receipts from wherever we went or did through the day. Or we may have small items like jewelry, and cash stored away. Without security measures in place, these items would be directly obtainable to anyone. Not only from those that want to take things from you. Not only…

    • 506 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Due to recent university campus violence it has become necessary for the before mention organization to develop an access control systems (ACS) to ensure student safety. As a member the security team I‘m the project manager for the ACS. This essay will look at the five phases and applicable subsets in the building of the ACS for resident facilities. The five phases that this essay will be addressing: Planning or identification of the scope of the project, Analysis- also known as whom, what, where and when, Design- also known as step by step, Implementation-installation and finally, Maintenance-monitoring of the system. The current system of cameras the photograph those who are entering and leaving the dorm will be integrated into the new ACS. A Gantt chart and diagram will accompany this essay.…

    • 1213 Words
    • 5 Pages
    Best Essays
  • Best Essays

    Social Issue, Burglary

    • 2346 Words
    • 10 Pages

    Although legislation is due to change in regards to your rights to protect your own home, there is no definitive date as to when this will actually be implemented. As such, it is advisable that we consider the means by which we can deter burglars from our property, and the methods available to protect not only our homes but our own safety and mental state as well.…

    • 2346 Words
    • 10 Pages
    Best Essays
  • Better Essays

    We use the term security in many ways in our daily lives. A security system protects our house, warning…

    • 1007 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Parity Generator

    • 2128 Words
    • 9 Pages

    Security is a prime concern in our day-today life. Everyone wants to be as much secure as possible. An access control for doors forms a vital link in a security chain. The microcontroller based digital lock for Doors is an access control system that allows only authorized persons to access a restricted area. The system is fully controlled by the 8 bit microcontroller AT89C2051 which has a 2Kbytes of ROM for the program memory. The password is stored in the EPROM so that we can change it at any time. The system has a Keypad by which the password can be entered through it. When the entered password equals with the password stored in the memory then the relay gets on and so that the door is opened. If we entered a wrong password for more than three times then the Alarm is switched on.…

    • 2128 Words
    • 9 Pages
    Better Essays
  • Powerful Essays

    A computer program system that is supposed to be used only by those authorized must attempt to detect and exclude the unauthorized. Access to it is therefore usually controlled by insisting on an authentication procedure to establish with some degree of confidence the identity of the user, thence granting those privileges as may be authorized to that identity. Common examples of access control involving authentication include:…

    • 1969 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Pharmacy MS

    • 405 Words
    • 1 Page

    To ensure that there exists a level of restricted access based on functionality and role.…

    • 405 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    One of the most important things that bother people is the issue of security. Although most governments have been making concerted efforts since time immemorial, it is not uncommon to see common people take bold steps towards securing their life as well as that of their family. Before, it used to be a bit difficult for individuals to secure their family against theft, burglary, etc. because of the sophisticated methods employed by criminal minds. However, in this age, technology has removed that difficulty. With the installation of an effective security system in your home, you can stop worrying about being victims to crime…

    • 1212 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    |Access Controls: Only have one unlocked door during business hours (none after hours), safe lock all |…

    • 2510 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    Hris

    • 3929 Words
    • 16 Pages

    The Administrator can authorize or restrict an end user, to see/use a certain set of screens/forms and set of reports. At the same time, the administrator can implement a full access security down to the field level by authorizing and/or restricting certain users from accessing (display, insert, update, delete, query) a certain field on an accessible screen.…

    • 3929 Words
    • 16 Pages
    Better Essays