Access Control Paper

Access Control Paper - Access Control Systems & Technology...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Access Control Systems & Technology Paper 1 University of Phoenix SEC/420
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Access Control Systems & Technology Paper 2 Introduction This paper examines Physical Security from the perspective of perimeter such as gates/guards, building access controls, room access controls, enforcement options, auditing approaches, risk determination for physical attack vectors, etc. Physical Security describes measures that prevent and/or deter attackers from accessing a facility, resource, or information stored on physical media. It can be as simple as a locked door or as elaborate as multiple layers of armed guard posts. In the Global world, Physical Security is the most common mechanisms for access control on doors and security containers. They are found in the vast majority of residences, commercial businesses, educational institutions, and government facilities, and often serve as the primary protection against intrusion and theft. Access control systems were examined to determine if a network based system would be more reliable and beneficial. Two major systems were determined to be very beneficial to the company. In contrast, the systems would consume a great deal of resources in order to be put into full working order at all sites worldwide. Together these findings suggest that using a network based system can ultimately serve the company better and create a more secure environment for the research and the employees. Network Based Access Control Systems: What Are They?
Background image of page 2
3 Personal and confidential information can easily be accessed at sites if the access to the specific areas is not updated quickly enough. To secure and protect this data, technology must adapt to mitigate the threats and risks. Applications and services are becoming mobile across multiple resources, sometimes in a dynamically allocated way, necessitating the migration of sensitive and private data. I propose a network based access control system to address the inadequacies of current technological solutions in preserving the confidentiality and privacy of data, along with the safety and security of the site. Access control systems have become a basic way of life for many businesses, especially large businesses. There are many different variations of these systems that control a wide variety of features, depending on what the needs of the business are. An access control system can be defined as an electronic system that allows, restricts and tracks the movement of people through entry/exit points in a site through programmable electronic cards and various other devices. Some devices that would be considered in the access control system family are passwords, tokens, smart cards, biometrics, firewalls, intrusion detections systems, and keypads. However, there is much more we can do to better protect ourselves and utilize these systems to the best of their ability. Elements and design
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 09/09/2011 for the course SEC 420 taught by Professor Norma during the Fall '11 term at University of Phoenix.

Page1 / 11

Access Control Paper - Access Control Systems & Technology...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online