You are on page 1of 37

PRINCIPLES

OF PHYSICAL
SECURITY AND MANAGEMENT

2
Access Control
1
Facility Access Control Systems

2
RECAP-ULANGKAJI

1. Principles in Physical Security


The principles underlying Physical Security Management are
designed to create a comprehensive and layered approach to protect
against unauthorized access, theft, damage, and other potential
harms. Here are the key principles:
 Deterrence
 Detection
 Delay
 Response & Intervention
3
Defence-in-Depth

Defence in depth is about building multiple layers


of security that will protect the organization better
than one single layer.
Pertahanan secara mendalam adalah tentang membina
berbilang lapisan keselamatan yang akan melindungi
organisasi lebih baik daripada satu lapisan tunggal.
https://www.youtube.com/watch?v=j9MQMVn3FV4&t=86s&ab_channel=TomOlzak

4
Defence-in-Depth

Pertahanan
Berlapis

5
Video clip: Layered Security

6
Physical Security System

7
The purpose of a CCTV (Closed- A security control room, often referred to as a Access control refers to the
Circuit Television) system is to security operations center (SOC) or command practice of regulating and
capture, record, and monitor video center, is a centralized facility equipped with managing who has
footage in a designated area for technology and staffed by security personnel permission to access specific
various purposes such as security responsible for monitoring, managing, and resources, assets, areas, or
and crime deterrence, surveillance, responding to security-related events and information within an
visitor control etc …. incidents within an organization or a specific organization or physical
area. space.
A smart building, also
A Visitor Management Motion sensors, also Parking zones inside facilities are
known as an intelligent
System (VMS) serves known as motion often equipped with security features
building or a smart facility,
as a comprehensive detectors, serve the such as surveillance cameras,
is a structure that uses
solution to manage primary purpose of adequate lighting, and controlled
advanced technology and access points. This enhances the
and track visitors, detecting physical
integrated systems to
guests, and personnel movement or motion safety and security of vehicles and
enhance the building's
entering a facility or within a defined area. their occupants, reducing the risk of
overall functionality, theft, vandalism, and other security
premises.
efficiency, security, and concerns.
sustainability. A fire alarm system is a network of interconnected devices
Contrary to PSTN, an IP PBX (Internet Protocol and components designed to detect, notify, and respond to
Private Branch Exchange) system is a the presence of a fire or smoke in a building or area. The
telecommunication system that uses IP data networks primary purpose of a fire alarm system is to protect life and
(like the internet) to manage and route voice and video property by providing early warning of a fire, allowing
calls, in addition to other forms of communication such occupants to evacuate safely and alerting emergency
as instant messaging and conferencing. responders to the situation. 8
Access Control Systems
 Mechanical Locks and Keys
 Electronic Card Access Control
 Keypad Access Control
 Biometric Access Control
 Access Control Tokens
 Mobile Access Control
 Intercom Systems
 Turnstiles and Speed Gates
 Vehicle Access Control
 Wireless Access Control
 Cloud-Based Access Control
 Integrated Access Control
 Visitor Management System 9
Access control is the art and science
of regulating who can enter a specific
area, building, or facility and under
what conditions. It's the guardian at
the gate, ensuring that only
authorized individuals gain entry,
while keeping potential threats at bay.

In an era where security concerns are


ever-evolving, understanding the core
concepts of access control is not only
essential but also a cornerstone in
building a secure environment.
10
Kawalan akses ialah seni dan sains
mengawal selia orang yang boleh
memasuki kawasan, bangunan atau
kemudahan tertentu dan dalam keadaan
apa. Ia adalah penjaga di pintu pagar,
memastikan bahawa hanya individu yang
diberi kuasa boleh masuk, sambil
mengekalkan potensi ancaman.

Dalam era di mana kebimbangan


keselamatan sentiasa berkembang,
memahami konsep teras kawalan akses
bukan sahaja penting tetapi juga asas
dalam membina persekitaran yang
selamat.
11
Access control systems in physical security
encompass various methods and technologies to
regulate entry to a physical space. These systems can
be categorized into several types, including:

1.Mechanical Locks and Keys: Traditional locks and


keys are still widely used for securing doors and cabinets.
They provide a basic level of access control but lack the
advanced features and auditing capabilities of electronic
systems.
2.Electronic Card Access Control: This type of system
uses access cards (e.g., proximity cards, smart cards) to
grant or deny access. Users present their card to a reader,
which then verifies their credentials and then unlocks the
door when authorized.
12
Mechanical Locks and Keys

The primary purpose of mechanical


lock and key systems is to provide a
basic level of security and access
control by allowing authorized
individuals to lock and unlock specific
areas while preventing unauthorized
access. Mechanical locks and keys
have been used for centuries as a
fundamental means of securing doors,
cabinets, safes, and other physical
enclosures.

13
Electronic Card Access Control The primary purpose of electronic card
access control is to enhance security,
provide convenience, and monitor access to
controlled areas. This technology uses
electronic cards or key fobs as access
credentials to regulate and manage entry
into secured areas, buildings, or digital
systems. These electronic cards typically
contain embedded data that is read by card
readers, allowing authorized individuals to
gain access while denying entry to
unauthorized users.

14
•Keypad Access Control: Access is granted based on a
numeric code entered into a keypad. This method is often used in
conjunction with electronic locks and is suitable for low-security
areas.
•Biometric Access Control: Biometric systems use unique
physical or behavioral traits, such as fingerprints, iris scans, facial
recognition, or hand geometry, to verify a person's identity and
grant access.
•Access Control Tokens: These are physical devices, like key
fobs or tokens, that users carry with them to gain access. They
are often used in conjunction with card readers or biometric
systems for additional security.
15
Keypad Access Control

The primary purpose of keypad access


control is to enhance security by requiring
individuals to enter a correct PIN (Personal
Identification Number) or code before
gaining entry. Keypad access control is a
security technology that uses a numerical
keypad as a means of granting or restricting
access to a physical location, building, room,
or digital system.

16
Biometric Access Control

The primary purpose of biometric


access control is to enhance
security, accuracy, and
convenience in various
environments. Biometric access
control is a security technology
that uses unique physiological or
behavioral characteristics of
individuals to verify their identity
and regulate access to physical
locations, digital systems, data, or
resources.

17
Access Control Tokens

The primary purpose of access control tokens is


to enhance security and manage access
permissions effectively. Access control tokens,
play a critical role in computer security and
authentication systems. These tokens are used
to confirm the identity and authorization of
users, devices, or applications attempting to
access resources, services, or data in a digital
environment.

18
•Mobile Access Control: With the increasing prevalence of
smartphones, mobile access control allows users to gain entry
using their mobile devices, often through Bluetooth or NFC
technology.
•Intercom Systems: Commonly used in residential or small
commercial settings, intercom systems require visitors to identify
themselves before granting access.
•Turnstiles and Speed Gates: These physical barriers control
access to a specific area by allowing only one person to pass at a
time. They are often used in high-security environments like
transportation hubs

19
Mobile Access Control

The primary purpose of mobile access control is


to enhance convenience, security, and flexibility
in various environments. Mobile access control
devices, such as smartphones and tablets are
used as means of gaining access to secured
areas, systems, or resources. This technology
allows individuals to use their mobile devices as
digital keys or access credentials, replacing
traditional physical keys, access cards, or PIN
codes.

20
Intercom Systems

The primary purpose of intercom systems is


to facilitate efficient and secure
communication for a variety of applications.
In residential buildings and gated
communities, intercoms are often used at
entry points (gates or building entrances) to
verify the identity of visitors before granting
them access. Residents can communicate
with visitors and remotely unlock doors or
gates if necessary.

21
Turnstiles and Speed Gates
The primary purpose of turnstiles is to
control the entry and exit of pedestrians into
or out of a secured area. They are often used
in settings where access needs to be
regulated, such as public transportation
hubs, stadiums, amusement parks, office
buildings, and more.
Speed gates are designed to provide rapid
and efficient pedestrian access control. They
are often used in settings where high
throughput of authorized individuals is
required, such as office buildings, airports,
corporate headquarters, and government
facilities 22
•Vehicle Access Control: Systems like automatic gates,
barriers, and license plate recognition are used to control
vehicular access to parking lots, garages, and restricted areas.
•Wireless Access Control: Utilizing wireless communication,
this type of access control system offers flexibility and scalability,
making it suitable for both small and large installations.
•Cloud-Based Access Control: Access control data and
management are hosted in the cloud, allowing for remote
monitoring and management of access points.

23
Vehicle Access Control kawalan akses kenderaan

Vehicle access control is a security system


that manages and regulates the entry and
exit of vehicles into a specific area or facility.
It is commonly used in various environments,
including commercial properties, residential
complexes, parking lots, industrial facilities,
and gated communities. The primary goal of
vehicle access control is to enhance security,
improve traffic management, and monitor
vehicle movements.
24
Wireless Access Control Kawalan Akses Tanpa Wayar

Wireless access control refers to a security


system that uses wireless technology to manage
and regulate access to physical spaces, such as
buildings, rooms, or restricted areas. This
technology eliminates the need for traditional
wired access control systems, which rely on
physical connections for communication.
Wireless access control offers greater flexibility,
scalability, and ease of installation, making it a
popular choice for many organizations

25
Cloud-Based Access Control Kawalan Akses Berasaskan Awan
1.Cloud Computing: Cloud computing involves
delivering computing services (such as servers,
storage, databases, networking, software, analytics,
and intelligence) over the internet. Cloud service
providers host and manage these services, allowing
organizations to leverage them without the need to
own or maintain physical infrastructure.
2.Access Control: Access control is the process of
regulating who can access specific resources, data, or
services within a system. It involves authentication
(verifying the identity of users or entities),
authorization (determining what actions or data
they are allowed to access), and auditing (tracking
and logging access activities).
26
•Integrated Access Control: This involves the integration
of access control systems with other security systems
like surveillance cameras, alarms, and intrusion detection
to create a comprehensive security solution.
•Visitor Management Systems: These systems are
designed to manage and track visitors, issuing temporary
access credentials and monitoring their movements
within a facility.
•Each of these access control systems has its own
advantages and limitations, and the choice of system
depends on factors such as the level of security required,
the size and complexity of the facility, and budget
considerations 27
Integrated Access Control Kawalan Akses Bersepadu
The primary purpose of an
integrated access control
system is to enhance security,
streamline access
management, and provide a
holistic approach to
safeguarding assets, data,
and personnel. An integrated
access control system serves
as a comprehensive and
centralized security solution
designed to regulate, monitor,
and manage access to
physical areas, digital
resources, and facilities. 28
Visitor Management Systems Sistem Pengurusan Pelawat
A visitor management
system (VMS) is a software-
based solution designed to
streamline and enhance the
process of managing visitors
to a facility or organization.
The primary purpose of a
visitor management system
is to improve security,
increase efficiency, and
create a positive and
controlled visitor experience.

29
Visitor
Management
System

30
Video Clip: VMS

31
The Purpose of VMS

1.Enhanced Security:
1. One of the primary purposes of a visitor management system
is to enhance security by accurately verifying the identity of
visitors before granting them access to a facility. It helps
ensure that only authorized individuals gain entry.
2.Visitor Registration:
1. VMS allows organizations to register and record visitor
information, including their name, contact details, purpose of
visit, and the person or department they are visiting. This data
is essential for security, safety, and compliance

32
3. Access Control:
1. VMS can be integrated with access control systems, allowing it
to issue temporary access credentials, such as visitor badges
or access cards. This ensures that visitors can only access
approved areas during their visit.
4. Improved Efficiency:
2. VMS streamlines the check-in process by automating visitor
registration. This reduces wait times and administrative
overhead, making the visitor experience more efficient and
pleasant.
5. Notification and Alerts:
3. VMS can automatically notify hosts or employees when their
expected visitors arrive. This ensures a warm welcome and
minimizes delays in meeting schedules.
33
6. Visitor Badges:
1. VMS can print visitor badges with important information, such
as the visitor's name, photo, date, and purpose of the visit.
These badges enhance security by clearly identifying visitors.
7. Emergency Response:
2. In case of emergencies or evacuations, VMS can provide an
accurate record of the individuals present in the facility,
including visitors, helping security personnel and emergency
responders account for everyone's safety.
8. Compliance and Reporting:
3. VMS generates detailed reports on visitor activity and
compliance with security policies. This documentation is
valuable for audits and regulatory compliance

34
9. Visitor Tracking:
1. VMS maintains a log of visitor arrivals, departures, and
movements within the facility. This information can be used for
security investigations or internal purposes.
10. Data Privacy :
2. VMS helps organizations comply with data privacy regulations by
securely storing visitor data, providing data access controls, and
enabling data removal when necessary.
11. Customization:
3. VMS can be customized to match the specific needs and
branding of an organization, creating a professional and
consistent visitor experience

35
Visitor management systems are commonly used in a wide
range of settings, including corporate offices, government
buildings, educational institutions, healthcare facilities,
manufacturing plants, and recreational venues. Their ability
to improve security, efficiency, and compliance while
providing a welcoming experience for visitors makes them
an essential tool in modern access control and security
strategies.

36
End of Session

37
3
7

You might also like