1 / 20

Access Control ppt1

About accesss control

gadaan
Download Presentation

Access Control ppt1

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ACCESS CONTROL TECHNICAL TRAINING PRESENTATION Nov,2022

  2. AGENDA • Introduction • Trends of Access Control System • Working principle of Access Control • Applications of Access Control System • Summary

  3. Introduction • Access control systems are designed to protect systems from unauthorized access in order to preserve data integrity. • Access control system, also known as entrance exit control system. • It is the selective restriction of access to a place or other resource, while access management describes the process. • Permission to access a resource is called authorization.

  4. Cont… • Access Control (AC) • Who( Card,Face,Fingerprint,Password,QR code ) • When( weekend ,workday …) • Where( Maingate,Floor,Gym,Hotel…) • Access control basics • Access control protects against a wide variety of threats • Unauthorized access • Unapproved modification of data • Lack of data confidentiality

  5. Cont…. • There are three types (factors) of authenticating information: • Something the user knows, e.g. a password, pass-phrase or PIN • Something the user has, such as smart card or a key fob. • Something the user is, such as fingerprint, verified by biometric measurement Key fob Fingerprint Smart card

  6. Trends of Access Control System • Mechanical lock and key,unsafe and not easy to manage • IP based access control system,software management,more functions and easy to manage. • New Technology:- Fingerprint,Face recognition,Iris recognition… Iris recognition

  7. The Working Principle of Access Control System • The control panel receives the encrypted tag number from the reader, decodes the number, then compares the ID number to ID numbers already loaded onto the system. If the numbers match, and the user is authorized to access the door at that time, the door will unlock. This all happens in the matter of seconds.

  8. ACS Architecture

  9. Cont…

  10. Components of an access control system • Components of an access control system include: • Controller • Door • Turnstile • Parking gate • Elevator, or other physical barrier • Areader • Electric door strikes and Electromagnetic Locks • A magnetic door switch for monitoring door position

  11. Cont... Electromagnetic locks Reader Controller

  12. Four Scenarios of Access Control System • How to read card ? • How to transmit card information ? • How to identify permissions ? • How to open the door ?

  13. How to read card ? • RFID:Radio Frequency Identification • Passive tags collect energy from a nearby RFID’s readers interrogating radio waves; • Active tags have local power source such as battery. • Battery-assisted passive

  14. How to transmit card information ? RS 485 interface

  15. Wiegand Interface

  16. How to compare access control systems • Local vs. Cloud • Security • Easy to Manage and Use • Scalable • Future-Proof • Cost

  17. Access Control Advantages • The most significant benefits of access control systems are: • Increase ease of access for employees. • Get rid of traditional keys. • Save money and energy. • Keep track of who comes and goes. • Protect against unwanted visitors. • Give employees the freedom to work when they need to. • Prevent against data breaches.

  18. Access Control Applications • Hotels • Office building • Shopping mall • Factory • Industry building • Bank • Hospital • Train station

  19. Summary • Access control is a fundamental component of data security that dictates who’s allowed to access and use company information and resources. • Through authentication and authorization, access control policies make sure users are who they say they are and that they have appropriate access to company data. • Access control can also be applied to limit physical access to campuses, buildings, rooms, and datacenters. 

  20. “ For your ICT solution “

More Related