Professional Documents
Culture Documents
Ble 1213 Must (Session 2)
Ble 1213 Must (Session 2)
OF PHYSICAL
SECURITY AND MANAGEMENT
2
Access Control
1
Facility Access Control Systems
2
RECAP-ULANGKAJI
4
Defence-in-Depth
Pertahanan
Berlapis
5
Video clip: Layered Security
6
Physical Security System
7
The purpose of a CCTV (Closed- A security control room, often referred to as a Access control refers to the
Circuit Television) system is to security operations center (SOC) or command practice of regulating and
capture, record, and monitor video center, is a centralized facility equipped with managing who has
footage in a designated area for technology and staffed by security personnel permission to access specific
various purposes such as security responsible for monitoring, managing, and resources, assets, areas, or
and crime deterrence, surveillance, responding to security-related events and information within an
visitor control etc …. incidents within an organization or a specific organization or physical
area. space.
A smart building, also
A Visitor Management Motion sensors, also Parking zones inside facilities are
known as an intelligent
System (VMS) serves known as motion often equipped with security features
building or a smart facility,
as a comprehensive detectors, serve the such as surveillance cameras,
is a structure that uses
solution to manage primary purpose of adequate lighting, and controlled
advanced technology and access points. This enhances the
and track visitors, detecting physical
integrated systems to
guests, and personnel movement or motion safety and security of vehicles and
enhance the building's
entering a facility or within a defined area. their occupants, reducing the risk of
overall functionality, theft, vandalism, and other security
premises.
efficiency, security, and concerns.
sustainability. A fire alarm system is a network of interconnected devices
Contrary to PSTN, an IP PBX (Internet Protocol and components designed to detect, notify, and respond to
Private Branch Exchange) system is a the presence of a fire or smoke in a building or area. The
telecommunication system that uses IP data networks primary purpose of a fire alarm system is to protect life and
(like the internet) to manage and route voice and video property by providing early warning of a fire, allowing
calls, in addition to other forms of communication such occupants to evacuate safely and alerting emergency
as instant messaging and conferencing. responders to the situation. 8
Access Control Systems
Mechanical Locks and Keys
Electronic Card Access Control
Keypad Access Control
Biometric Access Control
Access Control Tokens
Mobile Access Control
Intercom Systems
Turnstiles and Speed Gates
Vehicle Access Control
Wireless Access Control
Cloud-Based Access Control
Integrated Access Control
Visitor Management System 9
Access control is the art and science
of regulating who can enter a specific
area, building, or facility and under
what conditions. It's the guardian at
the gate, ensuring that only
authorized individuals gain entry,
while keeping potential threats at bay.
13
Electronic Card Access Control The primary purpose of electronic card
access control is to enhance security,
provide convenience, and monitor access to
controlled areas. This technology uses
electronic cards or key fobs as access
credentials to regulate and manage entry
into secured areas, buildings, or digital
systems. These electronic cards typically
contain embedded data that is read by card
readers, allowing authorized individuals to
gain access while denying entry to
unauthorized users.
14
•Keypad Access Control: Access is granted based on a
numeric code entered into a keypad. This method is often used in
conjunction with electronic locks and is suitable for low-security
areas.
•Biometric Access Control: Biometric systems use unique
physical or behavioral traits, such as fingerprints, iris scans, facial
recognition, or hand geometry, to verify a person's identity and
grant access.
•Access Control Tokens: These are physical devices, like key
fobs or tokens, that users carry with them to gain access. They
are often used in conjunction with card readers or biometric
systems for additional security.
15
Keypad Access Control
16
Biometric Access Control
17
Access Control Tokens
18
•Mobile Access Control: With the increasing prevalence of
smartphones, mobile access control allows users to gain entry
using their mobile devices, often through Bluetooth or NFC
technology.
•Intercom Systems: Commonly used in residential or small
commercial settings, intercom systems require visitors to identify
themselves before granting access.
•Turnstiles and Speed Gates: These physical barriers control
access to a specific area by allowing only one person to pass at a
time. They are often used in high-security environments like
transportation hubs
19
Mobile Access Control
20
Intercom Systems
21
Turnstiles and Speed Gates
The primary purpose of turnstiles is to
control the entry and exit of pedestrians into
or out of a secured area. They are often used
in settings where access needs to be
regulated, such as public transportation
hubs, stadiums, amusement parks, office
buildings, and more.
Speed gates are designed to provide rapid
and efficient pedestrian access control. They
are often used in settings where high
throughput of authorized individuals is
required, such as office buildings, airports,
corporate headquarters, and government
facilities 22
•Vehicle Access Control: Systems like automatic gates,
barriers, and license plate recognition are used to control
vehicular access to parking lots, garages, and restricted areas.
•Wireless Access Control: Utilizing wireless communication,
this type of access control system offers flexibility and scalability,
making it suitable for both small and large installations.
•Cloud-Based Access Control: Access control data and
management are hosted in the cloud, allowing for remote
monitoring and management of access points.
23
Vehicle Access Control kawalan akses kenderaan
25
Cloud-Based Access Control Kawalan Akses Berasaskan Awan
1.Cloud Computing: Cloud computing involves
delivering computing services (such as servers,
storage, databases, networking, software, analytics,
and intelligence) over the internet. Cloud service
providers host and manage these services, allowing
organizations to leverage them without the need to
own or maintain physical infrastructure.
2.Access Control: Access control is the process of
regulating who can access specific resources, data, or
services within a system. It involves authentication
(verifying the identity of users or entities),
authorization (determining what actions or data
they are allowed to access), and auditing (tracking
and logging access activities).
26
•Integrated Access Control: This involves the integration
of access control systems with other security systems
like surveillance cameras, alarms, and intrusion detection
to create a comprehensive security solution.
•Visitor Management Systems: These systems are
designed to manage and track visitors, issuing temporary
access credentials and monitoring their movements
within a facility.
•Each of these access control systems has its own
advantages and limitations, and the choice of system
depends on factors such as the level of security required,
the size and complexity of the facility, and budget
considerations 27
Integrated Access Control Kawalan Akses Bersepadu
The primary purpose of an
integrated access control
system is to enhance security,
streamline access
management, and provide a
holistic approach to
safeguarding assets, data,
and personnel. An integrated
access control system serves
as a comprehensive and
centralized security solution
designed to regulate, monitor,
and manage access to
physical areas, digital
resources, and facilities. 28
Visitor Management Systems Sistem Pengurusan Pelawat
A visitor management
system (VMS) is a software-
based solution designed to
streamline and enhance the
process of managing visitors
to a facility or organization.
The primary purpose of a
visitor management system
is to improve security,
increase efficiency, and
create a positive and
controlled visitor experience.
29
Visitor
Management
System
30
Video Clip: VMS
31
The Purpose of VMS
1.Enhanced Security:
1. One of the primary purposes of a visitor management system
is to enhance security by accurately verifying the identity of
visitors before granting them access to a facility. It helps
ensure that only authorized individuals gain entry.
2.Visitor Registration:
1. VMS allows organizations to register and record visitor
information, including their name, contact details, purpose of
visit, and the person or department they are visiting. This data
is essential for security, safety, and compliance
32
3. Access Control:
1. VMS can be integrated with access control systems, allowing it
to issue temporary access credentials, such as visitor badges
or access cards. This ensures that visitors can only access
approved areas during their visit.
4. Improved Efficiency:
2. VMS streamlines the check-in process by automating visitor
registration. This reduces wait times and administrative
overhead, making the visitor experience more efficient and
pleasant.
5. Notification and Alerts:
3. VMS can automatically notify hosts or employees when their
expected visitors arrive. This ensures a warm welcome and
minimizes delays in meeting schedules.
33
6. Visitor Badges:
1. VMS can print visitor badges with important information, such
as the visitor's name, photo, date, and purpose of the visit.
These badges enhance security by clearly identifying visitors.
7. Emergency Response:
2. In case of emergencies or evacuations, VMS can provide an
accurate record of the individuals present in the facility,
including visitors, helping security personnel and emergency
responders account for everyone's safety.
8. Compliance and Reporting:
3. VMS generates detailed reports on visitor activity and
compliance with security policies. This documentation is
valuable for audits and regulatory compliance
34
9. Visitor Tracking:
1. VMS maintains a log of visitor arrivals, departures, and
movements within the facility. This information can be used for
security investigations or internal purposes.
10. Data Privacy :
2. VMS helps organizations comply with data privacy regulations by
securely storing visitor data, providing data access controls, and
enabling data removal when necessary.
11. Customization:
3. VMS can be customized to match the specific needs and
branding of an organization, creating a professional and
consistent visitor experience
35
Visitor management systems are commonly used in a wide
range of settings, including corporate offices, government
buildings, educational institutions, healthcare facilities,
manufacturing plants, and recreational venues. Their ability
to improve security, efficiency, and compliance while
providing a welcoming experience for visitors makes them
an essential tool in modern access control and security
strategies.
36
End of Session
37
3
7