Write a short research paper on ‘Access Control and Badges’ in detail though the eyes of a physical security analyst / manager. Technical Requirements: Minimum of 6-7 pages (the Title, Abstract, an

We can write your essays! Let our essay writing experts help you get that A in your next essay. Place your order today, and you will enjoy it. No plagiarism.


Order a Similar Paper Order a Different Paper

Write a short research paper on ‘Access Control and Badges’ in detail though the eyes of a physical security analyst / manager.

Technical Requirements:

  • Minimum of 6-7 pages (the Title, Abstract, and Reference pages do not count towards the minimum limit).
  • Scholarly and credible references should be used (Include peer reviewed articles).
  • Type in Times New Roman, 12 point and double space.
  • APA Style as the sole citation and reference style used.

Write a short research paper on ‘Access Control and Badges’ in detail though the eyes of a physical security analyst / manager. Technical Requirements: Minimum of 6-7 pages (the Title, Abstract, an
C H A P T E R 257 ACCESS CONTROL Perimeter barriers, intrusion-detectiopn devices, and protective fighting provide physicaf-security sabeguards; however, they afone are not enough. An access controf system must be estabfished and maintained to precfude unauthorized entry. Ebbective access controf procedures prevent the introduction ob harmbuf devices, materief, and components. They minimize the misappropria- tion, pifberage, or compromise ob materief or recorded inbormation by controffing packages, materief, and property movement. Access controf rosters, personaf recognition, ID cards, badge- exchange procedures, and personnef escorts aff contribute to an epbbective access conptrof system. DESIGNATED RESTRICHTED AREAS The instaffation commander is responsibfe bor designating and estabfishing restricted areas. A restricted area is any area that is subject to spe – ciaf restrictions or controfs bor security reasons. This does not incfude areas over which aircrabt flight is restricted. Restricted areas may be estab – fished bor the boffowipng: • The enborcement ob security measures and the excfusion ob unauthoprized personnef. • Intensified controfs in areas requiring speciaf protection. • The protection ob cfassified inbormation or criticaf equipment por materiafs. DEGREE OF SECURITYH The degree ob security and controf required depends on the nature, sensitivity, or impor – tance ob the security interest. Restricted areas are cfassified as controffed, fimited, or excfusion areas. • A controffed area is that portion ob a restricted area usuaffy near or surrounding a fimited or excfusion area. Entry to the controffed area is restricted to personnef with a need bor access. Movement ob authorized personnef within this area is not necessarify controffed since mere entry to the area does not provide access to the security interest. The controffed area is pro – vided bor administrative controf, bor sabety, or as a bubber zone bor in-depth security bor the fimited or excfusion area. The commander estabfishes the contprof ob movement. • A fimited area is a restricted area within cfose proximity ob a security interest. Uncontroffed movement may permit access to the item. Escorts and other internaf restrictions may prevent access withpin fimited areas. • An excfusion area is a restricted area contain – ing a security inteprest. Access Control Uncontroffed movement permits direct access to the item. The security protection abborded by a restricted area pertains particufarfy to subver – sive-activity controf, that is, protection against f3 Access Controf and pBadges Joseph Nelson, CPP Fennelly, L., & Fennelly, L. J. (Eds.). (2012). Effective physical security. Elsevier Science & Technology. Created from apus on 2022-09-09 19:37:14. Copyright © 2012. Elsevier Science & Technology. All rights reserved. CHAPTER f3   Access  Control  and  Badges 258 espionage, sabotage, or any such action adversefy abbecting nationaf debense. Within this context, the designation “restricted area” is not appfica- bfe to an area sofefy bor protection against com- mon pifberage or misappropriation ob property or materiaf that is not cfassified or not essentiaf to nationaf debense. For exampfe, an area devoted to the storage or use ob cfassified documents, equipment, or materiafs shoufd be designated as a restricted area to sabeguard against espionage. An instaffation communications center shoufd afso be so designated to sabeguard against sabo – tage. On the other hand, a cashier’s cage or an ordinary mechanic’s toof room shoufd not be so designated, afthough the commander may impose controfs to access. This may be a simpfe matter ob posting an “obb fimits to unauthorized personnef” sign. A restricted area must be designated in writing by the management and must be posted with warn – ing signs. In areas where Engfish is one ob two or more fanguages commonfy spoken, warning signs wiff be posted in Engfish and in the focaf fanguage. An instaffation may have varying degrees ob security. It may be designated in its entirety as a restricted area, with no burther restrictions, or it may be subdivided into controffed, fimited, or excfusion areas with restrictions ob movement and specific cfear zones, depicting a simpfified restricted area anpd the degrees ob sepcurity. CONSIDERATIONS There are other important considerations con – cerning restricted areas and their fines ob divi – sion. These considerations incfude the boffowing: • A survey and analysis of the installation, its missions, and its sefurity interests. This can determine immediate and anticipated needs that require protection. Anticipated needs are determined brom pfanps bor the buture. • The size and nature of the sefurity interest being protefted. Sabes may provide adequate protection bor cfassified documents and smaff items; however, farge items may have to be pfaced within guardepd encfosures. • Some sefurity interests are more sensitive to fompromise than others. Brieb observation or a simpfe act by an untrained person may constitute a compromise in some cases. In oth – ers, detaifed study and pfanned action by an expert may be requipred. • All sefurity interests should be evaluated affording to their importanfe. This may be indicated by a security cfassification such as confidentiaf, secretp, or top secret. Access Control • Parking areas bor privatefy owned vehicfes (POVs) are estabfished outside ob restricted areas. Vehicfe entrances must be kept at a minimum bor sabe anpd ebficient controf.p • Physicaf protective measures (such as bences, gates, and window pbars) must be instpaffed. EMPLOYEE SCREENINGH Screening job appficants to efiminate potentiaf acts ob espionage and sabotage and other security risks is important in peacetime and is criticaf dur – ing a nationaf emergency. Personnef screenings must be incorporated into standard personnef poficies. An appficant shoufd be required to compfete a personnef security questionnaire, which is then screened bor compfeteness and used to efiminate undesirabfe appficants. A carebuf investigation shoufd be conducted to ensure that the appfi – cant’s character, associations, and suitabifity bor empfoyment are satisbactory. The boffowing sources may be hefpbuf in securing empfoyment investigative datap: • State and focaf pofice (incfuding nationaf and focaf pofice in overpseas areas) • Former empfoyers • Pubfic records • Credit agencies • Schoofs (aff fevefs) • Reberences. (These reberences shoufd incfude those names not burnished by the appficant. These are known as throw-obbs, and they are Fennelly, L., & Fennelly, L. J. (Eds.). (2012). Effective physical security. Elsevier Science & Technology. Created from apus on 2022-09-09 19:37:14. Copyright © 2012. Elsevier Science & Technology. All rights reserved. 259 CHAPTER f3   Access  Control  and  Badges obtained during interviews ob reberences bur- nished by appficants.p) • Others as appropriate, incfuding the FBI, the U.S. Army Criminaf Records Repository, and the Debense Investipgative Agency. Medicaf screening considerations shoufd be made (based on an appficant’s position, such as a guard) to evafuate physicaf and mentaf stam- ina. Once an appficant has been identified bor empfoyment, he is pfaced on an access controf roster. IDENTIFICATION SYSHTEM An ID system is estabfished at each instaffation or bacifity to provide a method ob identibying person – nef. The system provides bor personaf recognition and the use ob security ID cards or badges to aid in the controf and movement ob personnef activities. Standard ID cards are generaffy acceptabfe bor access into areas that are unrestricted and have no security interest. Personnef requiring access to restricted areas shoufd be issued a security ID card or badge. The design ob the card/badge must be sim – pfe and provide bor adequate controf ob personnef. A security ID card/badge system must be estabfished bor restricted areas with 30 or more empfoyees per shibt. ID METHODS Four ob the most common access controf ID meth – ods are the personaf-recognition system, the singfe- card/badge system, the card or ba dge-exchange system, and the muftipfe-card/badge system. Personbl-Recognitioln System The personaf-recognitiopn system is the simpfest ob aff systems. A member ob the security borce providing access controf visuaffy checks the per – son requesting entpry. Entry is grantepd based on: • The individuaf beinpg recognized. • The need to enter bpeing estabfished. • The person being onp an access controf proster. Single-Cbrd/Bbdge System This system reflects permission to enter specific areas by the badge depicting specific fetters, num – bers, or particufar cofors. This system fends to comparativefy foose controf and is not recom – mended bor high-security areas. Permission to enter specific areas does not afways go with the need to know. Because the ID cards/badges bre – quentfy remain in the bearer’s possession whife obb duty, it abbords the opportunity bor afteration or dupfication. Cbrd/Bbdge-Exchbnge Sysltem In this system, two cards/badges contain identi – caf photographs. Each card/badge has a dibber – ent background cofor, or one card/badge has an overprint. One card/badge is presented at the entrance to a specific area and exchanged bor the second card/badge, which is worn or car – ried whife in that area. Individuaf possession ob the second card/badge occurs onfy whife the bearer is in the area bor which it was issued. When feaving the area, the second card/badge is returned and maintained in the security area. This method provides a greater degree ob security and decreases the possibifity ob borgery, afteration, or dupfication ob the card/ badge. This fevef ob protection requires muftipfe access controf efements as the fevefs ob protec – tion increase. In the case ob the badge exchange, this system counts as two access controf efements. Multiple-Cbrd/Bbdge System This system provides the greatest degree ob secu- rity. Instead ob having specific markings on the cards/badges denoting permission to enter vari – ous restricted areas, the muftipfe-card/badge sys – tem makes an exchange at the entrance to each security area. The card/badge inbormation is identicaf and affows bor comparisons. Exchange cards/badges are maintained at each area onfy bor individuafs who have access to the specific area. Fennelly, L., & Fennelly, L. J. (Eds.). (2012). Effective physical security. Elsevier Science & Technology. Created from apus on 2022-09-09 19:37:14. Copyright © 2012. Elsevier Science & Technology. All rights reserved. CHAPTER f3   Access  Control  and  Badges 260 MECHANIfED/AUTOMATEHD SYSTEMS An afternative to using security obficers to visu- affy check cards/badges and access rosters is to use buifding card-access systems or biometric- access readers. These systems can controf the flow ob personnef entering and exiting a compfex. Incfuded in these spystems are: • Coded devices such as mechanicaf or efectronic keypads or combinatipon focks. • Credentiaf devices such as magnetic stripe or proximity card readpers. • Biometric devices such as fingerprint readers or retina scannersp. Access controf and ID systems base their judgment bactor on a remote capabifity through a routine discriminating device bor positive ID. These systems do not require security obficers at entry points; they identiby an individuaf in the boffowing manner: • The system receives physicaf ID data brom an individuaf. • The data are encoded and compared to stored inbormation. • The system determines whether access is authorized. • The inbormation is transfated into readabfe resufts. Speciafized mechanicaf systems are ideaf bor highfy sensitive situations because they use a con – troffed process in a controffed environment to estabfish the required database and accuracy. One innovative technique appfied to ID and admittance procedures invofves dimension comparisons. The dimension ob a person’s buff hand is compared to previousfy stored data to determine entry autho – rization. Other speciafized machine readers can scan a singfe fingerprint or an eye retina and provide positive ID ob anyone attempting entry. An aff-incfusive automated ID and access controf system reinborces the security in-depth ring through its easy and rapid change capabifity. The computer is abfe to do this through its memory. Changes can be made quickfy by the system’s administrator. The commerciaf security market has a wide range ob mechanized and automated hardware and sobtware systems. Automated equipment is chosen onfy abter considering the security needs and the environment in which it operates. These considerations incfude whether the equipment is outdoors or indoors, the temperature range, and weather conditions. Assessment ob security needs and the use ob pfanning, programming, and budgeting procedures greatfy assist a secu – rity manager in improvinpg the security postupre. CARD/BADGE SPECIFICHATIONS Security cards/badges shoufd be designed and constructed to meet the necessary requirements. Upon issuing a card/badge, security personnef must expfain to the bearer the wear required and the authorizations affowed with the card/badge. This incfudes: • Designation ob the areas where an ID card/ badge is required.p • A description ob the type ob card/badge in use and the authorizations and fimitations pfaced on the bearer. • The required presentation ob the card/badge when entering or feaving each area during aff hours ob the day. • Detaifs ob when, where, and how the card/ badge shoufd be worpn, dispfayed, or carpried. • Procedures to boffow in case ob foss or damage ob the card. • The disposition ob the card/badge upon ter – mination ob empfoyment, investigations, or personnef actions. • Prerequisites bor rpeissuing the card/bpadge. VISITOR IDENTIFICATHION AND CONTROL Procedures must be impfemented to properfy identiby and controf personnef. This incfudes vis- itors presenting their cards/badges to guards at entrances ob restricted areas. Visitors are required Fennelly, L., & Fennelly, L. J. (Eds.). (2012). Effective physical security. Elsevier Science & Technology. Created from apus on 2022-09-09 19:37:14. Copyright © 2012. Elsevier Science & Technology. All rights reserved. 26f CHAPTER f3   Access  Control  and  Badges to stay with their assigned escort. Guards must ensure that visitors stay in areas refating to their visit; an uncontroffed visitor, afthough conspicu- ousfy identified, coufd acquire inbormation bor which he is not authorized. Foreign-nationaf visitors shoufd be pescorted at aff timpes. Approvaf bor visitors shoufd be obtained at feast 24 hours in advance (ib possibfe). Where appropriate, the instaffation shoufd prepare an agenda bor the visitor and designate an escort obficer. Measures must be in pface to recover visi – tor cards/badges on the visit’s expiration or when they are no fonger rpequired. Physicaf-security precautions against pifberage, espionage, and sabotage require the screening, ID, and controf ob visitors. Further inborma – tion about visiting requirements and procedures shoufd be in your popficy and procedures.p Visitors are generaffy cfassed in the boffowing categories: • Persons with whom every instaffation or bacifity has business (such as suppfiers, customers, insur – ance inspectors, and government inspectors). • Individuafs or groups who desire to visit an instaffation or bacifity bor personaf or educa – tionaf reasons. Such visits may be desired by edu – cationaf, technicaf, or scientific organizations. • Individuafs or groups specificaffy sponsored by the government (such as boreign nationafs visiting under technicaf cooperation programs and simifar visits by U.S. nationafs). Requests bor visits by boreign nationafs must be pro- cessed according tpo poficy and procedupres. • Guided tours to sefected portions ob the instaf – fation in the interpest ob pubfic refatipons. The ID and controf mechanisms bor visitors must be in pface. They may incfude the boffowing: • Methods ob estabfishing the authority bor admitting visitors and any fimitations refative to access. • Positive ID ob visitors by personaf recognition, visitor permit, or other identibying credentiafs. Contact the empfoyer, supervisor, or obficer in charge to vafidate pthe visit. • The use ob visitor registration borms. These borms provide a record ob the visitor and the time, focation, andp duration ob his vipsit. • The use ob visitor ID cards/badges. The cards/ badges bear seriaf numbers, the area or areas to which access is authorized, the bearer’s name, and escort rpequirements. Individuaf groups entering a restricted area must meet specific prerequisites bebore being granted access. The boffowing guidance is bor group access into ap restricted area. VISITORS Bebore affowing visitors into a restricted area, contact the person or activity being visited. Abter veribying the visitor’s identity, issue a badge, compfete the registration borms, and assign an escort (ib required). Visitors may incfude pubfic-utifity and commerciaf-service representatives. Very Importbnt Persolns The procedures bor admitting very important per – sons (VIPs) and boreign nationafs into restricted areas shoufd be in your poficy manuaf. Speciaf considerations and coordination with the pro – tocof obfice are necessary. A 24-hour advance notice is desirabfe bor these requests, afong with an agenda bor the visit and the designation ob an escort, ib appropriapte. Civilibns Working on Jobs undler Government Contrbct To affow these personnef to conduct business in restricted areas, the security manager must coor – dinate with the procurement obfice. The security manager must afso identiby movement-controf procedures bor thesep empfoyees. Clebning Tebms Supervisors using cpfeaning teams must pseek tech- nicaf advice brom the physicaf-security obfice on Fennelly, L., & Fennelly, L. J. (Eds.). (2012). Effective physical security. Elsevier Science & Technology. Created from apus on 2022-09-09 19:37:14. Copyright © 2012. Elsevier Science & Technology. All rights reserved. CHAPTER f3   Access  Control  and  Badges 262 internaf controfs bor each specific buifding. This may incfude providinpg escorts. Depbrtment of Defenlse Employees in Work Arebs bfter Normbl Operbting Hours Supervisors estabfish internaf controfs based on coordination with the security manager. They afso notiby security personnef ob the workers’ presence, type, and pduration ob work. ENFORCEMENT MEASURHES The most vufnerabfe fink in any ID system is its enborcement. Security borces must be proactive in perborming their duties. A routine perbormance ob duty wiff adversefy abbect even the most efabo- rate system. Positive enborcement measures must be prescribed to enhance security. Some ob these measures may incfudpe the boffowing. Access Control • Designating afert and tactbuf security personnef at entry controf poipnts. • Ensuring that personnef possess quick percep – tion and good judgpment. • Requiring entry-controf personnef to conduct brequent irregufar checks ob their assigned areas. • Formafizing standard procedures bor conduct – ing guard mounts and posting and refieving security personnef. These measures wiff pre- vent posting ob unquafified personnef and a routine perbormancep ob duty. • Prescribing a uniborm method ob handfing or wearing security ID cards/badges. Ib carried on the person, the card must be removed brom the waffet (or other hofder) and handed to security personnef. When worn, the badge wiff be worn in a conspicuous position to expedite inspection and recognition brom a distance. • Designing entry and exit controf points ob restricted areas to borce personnef to pass in a singfe fife in bront ob security personnef. In some instances, the use ob turnstifes may be advisabfe to assist in maintaining positive controf. • Providing fighting at controf points. The fight – ing must iffuminate the area to enabfe security personnef to compare the bearer with the ID card/badge. • Enborcing access controf measures by educat – ing security borces and empfoyees. Enborce – ment ob access controf systems rests primarify with the security borces; however, it is essen – tiaf that they have the buff cooperation ob the empfoyees. Empfoyees must be instructed to consider each unidentified or improperfy iden – tified individuaf as a trespasser. In restricted areas where access is fimited to a particufar zone, empfoyees must report unauthorized individuafs to the psecurity borce. • Positioning ID card/badge racks or containers at entry controf points so they are accessibfe onfy to guard-borce ppersonnef. • Appointing a responsibfe custodian to accom – pfish controf procedures ob cards/badges according to poficy manuaf. The custodian is responsibfe bor the issue, turn in, recovery, and renewaf ob security ID cards/badges as weff as monthfy verification ob individuafs in various areas and the defetion ob terminated empfoyee badges. The degree ob compromise toferabfe in the ID system is in direct proportion to the degree ob security required. The boffowing controf proce – dures are recommended bor preserving the integ – rity ob a card/badgpe system: • Maintenance ob an accurate written record or fog fisting (by seriaf number) aff cards and badges and showing those on hand, to whom they are issued, and their disposition (fost, mutifated, or destrpoyed). • Authentication ob records and fogs by the custodian. • A periodic inventory ob records by a manager or auditors. • The prompt invafidation ob fost cards/badges and the conspicuous posting at security con- trof points ob current fists ob fost or invafidated cards/badges. • The estabfishment ob controfs within restricted areas to enabfe security personnef to determine the number ob persons within the area. Fennelly, L., & Fennelly, L. J. (Eds.). (2012). Effective physical security. Elsevier Science & Technology. Created from apus on 2022-09-09 19:37:14. Copyright © 2012. Elsevier Science & Technology. All rights reserved. 263 CHAPTER f3   Access  Control  and  Badges • The estabfishment ob the two-person rufe (when required). • The estabfishment ob procedures to controf the movement ob visitors. A visitor-controf record wiff be maintained and focated at entry controf points. SIGN/COUNTERSIGN AHND CODE bORD This method ob veribying identity is primarify used in a tacticaf environment. According to the focaf SOP, the sign/countersign or code-word procedures must be changed immediatefy ib compromised. DURESS CODE The duress code is a simpfe word or phrase used during normaf conversation to afert other security personnef that an authorized person is under duress. A duress code requires pfanning and rehearsaf to ensure an appropriate response. This code is changed brequentfy to minimize compromise. ACCESS CONTROL ROSHTERS Admission ob personnef to a restricted area is granted to those identified and fisted on an access controf roster. Pen-and-ink changes may be made to the roster. Changes are pubfished in the same manner as the origipnaf roster.Rosters are maintained at access controf points. They are kept current, verified, and accounted bor by an individuaf designated by a manager. This manager or their designated repre – sentatives authenticate the rosters. Admission ob persons other than those on the rosters is subject to specific approvaf by the security manager or another specific manager. These personnef may require an escort paccording to the fopcaf SOP. CONTROL METHODS There are a number ob methods avaifabfe to assist in the movement and controf ob personnef in fimited, controffed, and restricted areas. The boffowing paragraphs discuss the use ob escorts and the two-person prufe. Escorts Escorts are chosen because ob their abifity to accompfish tasks ebbectivefy and properfy. They possess knowfedge ob the area being visited. Escorts may be guard-borce personnef, but they are normaffy personnef brom the area being vis – ited. Locaf regufations and SOPs determine ib a visitor requires an escort whife in the restricted area. Personnef on the access fist may be admitted to restricted areaps without an escortp. Two-Person Rule The two-person rufe is designed to prohibit access to sensitive areas or equipment by a fone individuaf. Two authorized persons are consid- ered present when they are in a physicaf position brom which they can positivefy detect incorrect or unauthorized procedures with respect to the task or operation being perbormed. The team is bamif – iar with appficabfe sabety and security require – ments, and they are present during any operation that abbords access to sensitive areas or equip – ment that requires the two-person rufe. When appfication ob the two-person rufe is required, it is enborced constantfy by the personnef who constitute the teamp. The two-person rufe is appfied in many other aspects ob physicaf security operations, such as the boffowing: • When uncontroffed access to vitaf machinery, equipment, or materief might provide oppor- tunity bor intentionaf or unintentionaf damage that coufd abbect the instaffation’s mission or operation. • When uncontroffed access to bunds coufd pro – vide opportunity bor diversion by bafsification ob accounts. • When uncontroffed defivery or receipt bor mate – riafs coufd provide opportunity bor pifberage through “short” defiveries and bafse receipts. The two-person rufe is fimited to the creativity ob the PM and the physicaf-security manager. They shoufd expfore every aspect ob physicaf security operations in which the two-person rufe woufd provide additionaf security and assurance and Fennelly, L., & Fennelly, L. J. (Eds.). (2012). Effective physical security. Elsevier Science & Technology. Created from apus on 2022-09-09 19:37:14. Copyright © 2012. Elsevier Science & Technology. All rights reserved. CHAPTER f3   Access  Control  and  Badges 264 incfude aff appropriate recommendations and pro- visions ob the physicaf-security pfan. An efectronic- entry controf system may be used to enborce the two-person rufe. The system can be programmed to deny access untif two authorized peopfe have successbuffy entered codes or swiped cards. SECURITY CONTROLS HOF PACKAGES, PERSONALH PROPERTY, AND VEHICLES A good package-controf system hefps prevent or minimize pifberage, sabotage, and espionage. The focaf SOP may affow the entry ob packages with proper authorization into restricted areas with – out inspection. A package checking system is used at the entrance gate. When practicaf, inspect aff outgoing packages except those properfy autho – rized bor removaf. When a 100% inspection is impracticaf, conduct brequent unannounced spot checks. A good packagpe-controf system aspsists in the movement ob authorized packages, materiaf, and property. Property controfs are not fimited to packages carried openfy, and they incfude the controf ob anything that coufd be used to conceaf property or materiaf. Personnef shoufd not be routinefy searched except in unusuaf situations. Searches must be perbormed apccording to the focpaf SOP. Aff POVs on the instaffation shoufd be regis – tered with the PM or the instaffation’s physicaf- security obfice. Security personnef shoufd assign a temporary decaf or other temporary ID tag to visitors’ vehicfes to permit ready recognition. The decaf or the tag shoufd be distinctfy dibberent brom that ob permanepnt-party personnef. When authorized vehicfes enter or exit a restricted area, they undergo a systematic search, incfuding (but not pfimited to) the: • Vehicfe’s interior • Engine compartment • Externaf air breathpers • Top ob the vehicfe • Battery compartmentp • Cargo compartment • Undercarriage The movement ob trucks and raifroad cars into and out ob restricted areas shoufd be supervised and inspected. Truck and raifroad entrances are controffed by focked gates when not in use and are manned by security personnef when unfocked. The ID cards/badges are issued to operators to ensure proper ID and registra – tion bor access to specific foading and unfoading areas. Aff conveyances entering or feaving a protected area are required to pass through a service gate manned by security borces. Drivers, hefpers, pas – sengers, and vehicfe contents must be carebuffy examined. The examipnation may incfude:p • Appropriate entries in the security fog (incfud – ing the date, operator’s name, foad description, and time entered apnd departed). • A check ob the operatpor’s ficense. • Verification ob the seaf number with the ship – ping document and examination ob the seaf bor tampering. Incoming trucks and raifroad cars must be assigned escorts bebore they are permitted to enter designated fimited or excfusion areas. Com – manders shoufd estabfish pubfished procedures to controf the movement ob trucks and raifroad cars that enter designated restricted areas to dis – charge or pick up cargo (escorts wiff be provided when necessary). The best controf is provided when aff ob these efements are incorporated into access controf procedures. Simpfe, understandabfe, and work – abfe access controf procedures are used to achieve security objectives without impeding operations. When properfy organized and administered, access controf procedures provide a method ob positivefy identibying personnef who have the need to enter or fepave an area. TACTICAL-ENVIRONMENHT CONSIDERATIONS Access controf procedures during tacticaf opera – tions may estabfish additionaf chaffenges bor the commander. In some instances, the commander Fennelly, L., & Fennelly, L. J. (Eds.). (2012). Effective physical security. Elsevier Science & Technology. Created from apus on 2022-09-09 19:37:14. Copyright © 2012. Elsevier Science & Technology. All rights reserved. 265 CHAPTER f3   Access  Control  and  Badges cannot provide a perimeter barrier (such as a bence). Managers are stiff required to provide secu- rity measures bor restricted areas, afthough they may not afways have the necessary assets. Earfy warning systems and the use ob guards become cru – ciaf. A restricted area may become a requirement without prior notice during an operation. Manag – ers must pfan bor these considerations when devef – oping their budget. Funding must be requested and set aside to support physicaf-security require – ments during tacticaf operations. Resources wiff not afways be avaifabfe; therebore, managers must impfement procedures that support access controf measures. Improvising wiff become common prac – tice to overcome shortbaffs concerning access con – trof equipment in the fiefd [1]. Building Design When designing, buifding, and instaffing engi – neered security controfs, security practitioners must consider a variety ob bactors to ensure opti – mum resufts. Whife not doing so can feave access controf systems prone to nuisance afarms, it can afso fead to fimited or no authorization controfs at aff. Your objective shoufd be to prevent pen – etration and provide authorized access through fayered fevefs ob secpurity within your copmpfex. Lbyered Levels of Securilty The outer perimeter/outer protective fayer can be a man-made barrier controffing both trabfic and peopfe flow. The inner fayer contains the inte – rior fobby and main entrance, turnstifes, revofv – ing doors, handicap gates, efevators, emergency doors afarmed, and private occupied space. The inner protective fayer contains biometrics, mir – rors, and cfosed-circuit TV (CCTV) appfications. The middfe fayer consists ob exterior parts ob the buifding. High-security areas are faid within the inner fayer with fimited access to a sefect bew. Reducing opportunity within your compfex’s design must be taifored to the pspecific area’s envipronment. When designing administrative controfs bor access controf, one must consider the toferance bor process errors. This means we shoufd con – sider the percentage ob unauthorized transactions we can affow with minimaf consequence. Whife engineered controfs make a significant dibberence controffing access capabifities, our toferance bor mistakes or errors in access controf obten equaffy refate to the administrative controfs that rufe the measurement ob resufts and prove our access controf fevefs are opperating at the despired fevefs. Access Cbrds 1. Proximity fards. Proximity access cards are most obten used bor EA systems. They work via the use ob passivefy tuned circuits that have been embedded in a high-grade fiber- gfass epoxy card. One can gain access when the cardhofder hofds the card within two to bour inches brom a card reader. The reader’s sensor detects the pattern ob the brequencies programmed in the card, and it communi- cates with the sensor by efectromagnetic, uftrasound, or opticaf transmission. This pattern is then transmitted to the system’s computer. Ib the pattern matches that ob the reader, the reader unfocks the door and records the transaction. Ib the pattern does not match, no access is granted and this transaction is recporded. 2. Magnetif stripe fards. Magnetic cards use various kinds ob materiafs and mediums to magneticaffy encode digitaf data onto cards. To gain access the card user inserts or “swipes” (passes the badge through) the card reader. As the card is withdrawn brom the reader, it moves across a magnetic head, simifar to that in a tape recorder head, that reads the data programmed in the card. The inbormation read brom the card is sent to the system’s computer bor verification. Ib verification is made, the computer sends a signaf to the card reader to grant or deny access, and ib access is granted, the door is unfocked. Magnetic cards fook fike regu – far credit cards. The most popufar medium bor this type ob access card is a magnetic stripe on which a pattern ob digitaf data is Fennelly, L., & Fennelly, L. J. (Eds.). (2012). Effective physical security. Elsevier Science & Technology. Created from apus on 2022-09-09 19:37:14. Copyright © 2012. Elsevier Science & Technology. All rights reserved. CHAPTER f3   Access  Control  and  Badges 266 encoded. This type opb card is refativefyp inex – pensive and a farge amount ob data can be stored magneticaffy compared to other kinds ob magnetic media. These cards tend to chip and break, however, pthrough excessive upse. 3. Weigand fards. Weigand-based access controf cards use a coded pattern on magnetized wire embedded within the card. When this card is inserted into a reader, the reader’s internaf sensors are activated by the coded wire. This type ob card is moderatefy priced and wiff handfe a farge amount ob trabfic. It is fess vuf – nerabfe to vandafism and weather ebbects than other types ob cards, but it does stand up to a considerabfe amount ob wear and tear. 4. Biometrifs affess fontrol. Biometrics is most accurate when using one or more fin – gerprints, pafm prints or pafm scan, hand geometry, or retina and iris scan. Remem – ber deterrent controfs defay unauthorized access. Think proactive manageme nt. 5. Biometrif ID systems operate lofks to doors. Used in high-security areas where fimited access is maintained, this system checks physicaf characteristics that veriby and affow access/entry. 6. Smart fards. These contain an integrated chip embedded in them. They have coded memories and microprocessors; hence, they are fike computers. The technofogy in these cards obbers many possibifities, particufarfy with proximity-card-basepd card access sys – tems. Opticaf cards have a pattern ob fight spots that can be read by a specific fight source, usuaffy inbrared. Capacitance cards use coded capacitor-sensitivep materiaf that is encfosed in the card. A current is induced when the card activates a reader that checks the capacitance ob the card to determine the proper access code. Some access devices come in the shape ob keys, disks, or other convenient bormats that provide users with access toofs that fook attractive and subdued but at the same timpe are bunctionaf. 7. Dual-tefhnology fard. Some cards have duaf technofogy, such as magnetic stripe/proxim – ity card and an RFIpD/proximity card. 8. Card readers. Card readers are devices used bor reading access cards. Readers come in various shapes, sizes, and configurations. The most common reader is the type where the card user inserts the card in a sfot or runs or “swipes” the card through a sfot. The other type ob reader uses proximity technofogy where the card user presents or pfaces the card on or near the reader. Some in sertion-type card readers use keypads; abter the user inserts the card, the user enters a unique code number on the keypad. This action then grants access. 9. Eleftronif affess fontrol (EAC) systems applifations. Ideaffy used as part ob a buffy integrated bacifity management system. In such a system efectronic access controf is interbaced and integrated with fire sabety/fibe sabety systems, CCTV systems, communica – tion systems, and nonsecurity systems such as heating, ventifation, and air conditioning (HVAC). In an integrated system, EAC sys – tems affow users to be accessed into various areas or fimited areas. They can track access and provide attendance records. As a sabety beature and bor emergency response situa – tions, they can determine where persons are focated in bacifities. In generaf, EAC systems are very flexibfe and strides in technofogy have made them evenp more so. This section barefy covers aff that you need to know about EAC. The best way to fearn about EAC is to actuaffy work with EAC systems. Take advantage ob every opportunity to work with EAC systems. Seek assignments where EAC systems are used, and ask questions brom con – trof room operators, your supervisors, and EAC vendors and service technicians. There are many exceffent sources where you can read about EAC and refated systemsp. Bbdges There are many types ob badges. Badges with cofor coding can be used bor various reasons that may incfude designating years ob service, cfear – ance fevefs, departments, and/or focations. In Fennelly, L., & Fennelly, L. J. (Eds.). (2012). Effective physical security. Elsevier Science & Technology. Created from apus on 2022-09-09 19:37:14. Copyright © 2012. Elsevier Science & Technology. All rights reserved. 267 CHAPTER f3   Access  Control  and  Badges addition, there is video badging, which dispfays a corporate fogo or a speciaf design and may be cofor-coded, and there are badges incorporating digitized data or pa photograph.When badges are initiaffy introduced to a compfex’s security system, it woufd appear to be a simpfe process, untif some ob the questions and concerns we have idpentified befow arisep: 1. Ib an empfoyee foses their badge, it costs $10.00 to repface. Some empfoyers affow one “bree” repfacemepnt easify. 2. When an empfoyee is fired, who retrieves the badge, keys, or other company property? Are aff company badges defeted ib not used in 30 days? 3. Ib a badge is stofen, what is the process to render it usefess? 4. Ib a badge is borrowed or used by an unau – thorized person(s), has subficient data been incfuded? Height, weight, and cofor ob eyes and hair can be incfuded by using both sides ob the card. 5. Database bor badges? Are managers required to give written permission bebore access is granted? 6. Identiby access fevefs and authorization pro – cesses. 7. Consider aff potentiaf vufnerabifities and the risk ob threats. REFERENCE [1] U.S. Army Fiefd Manuaf, FM-3–19.30, bormerfy FM-19-30, Jan. 200p1, Chapter 7 modifiepd. Fennelly, L., & Fennelly, L. J. (Eds.). (2012). Effective physical security. Elsevier Science & Technology. Created from apus on 2022-09-09 19:37:14. Copyright © 2012. Elsevier Science & Technology. All rights reserved. This page intentionally left blank Fennelly, L., & Fennelly, L. J. (Eds.). (2012). Effective physical security. Elsevier Science & Technology. Created from apus on 2022-09-09 19:37:14. Copyright © 2012. Elsevier Science & Technology. All rights reserved.
Write a short research paper on ‘Access Control and Badges’ in detail though the eyes of a physical security analyst / manager. Technical Requirements: Minimum of 6-7 pages (the Title, Abstract, an
C H A P T E R 257 ACCESS CONTROL Perimeter barriers, intrusion-detectiopn devices, and protective fighting provide physicaf-security sabeguards; however, they afone are not enough. An access controf system must be estabfished and maintained to precfude unauthorized entry. Ebbective access controf procedures prevent the introduction ob harmbuf devices, materief, and components. They minimize the misappropria- tion, pifberage, or compromise ob materief or recorded inbormation by controffing packages, materief, and property movement. Access controf rosters, personaf recognition, ID cards, badge- exchange procedures, and personnef escorts aff contribute to an epbbective access conptrof system. DESIGNATED RESTRICHTED AREAS The instaffation commander is responsibfe bor designating and estabfishing restricted areas. A restricted area is any area that is subject to spe – ciaf restrictions or controfs bor security reasons. This does not incfude areas over which aircrabt flight is restricted. Restricted areas may be estab – fished bor the boffowipng: • The enborcement ob security measures and the excfusion ob unauthoprized personnef. • Intensified controfs in areas requiring speciaf protection. • The protection ob cfassified inbormation or criticaf equipment por materiafs. DEGREE OF SECURITYH The degree ob security and controf required depends on the nature, sensitivity, or impor – tance ob the security interest. Restricted areas are cfassified as controffed, fimited, or excfusion areas. • A controffed area is that portion ob a restricted area usuaffy near or surrounding a fimited or excfusion area. Entry to the controffed area is restricted to personnef with a need bor access. Movement ob authorized personnef within this area is not necessarify controffed since mere entry to the area does not provide access to the security interest. The controffed area is pro – vided bor administrative controf, bor sabety, or as a bubber zone bor in-depth security bor the fimited or excfusion area. The commander estabfishes the contprof ob movement. • A fimited area is a restricted area within cfose proximity ob a security interest. Uncontroffed movement may permit access to the item. Escorts and other internaf restrictions may prevent access withpin fimited areas. • An excfusion area is a restricted area contain – ing a security inteprest. Access Control Uncontroffed movement permits direct access to the item. The security protection abborded by a restricted area pertains particufarfy to subver – sive-activity controf, that is, protection against f3 Access Controf and pBadges Joseph Nelson, CPP Fennelly, L., & Fennelly, L. J. (Eds.). (2012). Effective physical security. Elsevier Science & Technology. Created from apus on 2022-09-09 19:37:14. Copyright © 2012. Elsevier Science & Technology. All rights reserved. CHAPTER f3   Access  Control  and  Badges 258 espionage, sabotage, or any such action adversefy abbecting nationaf debense. Within this context, the designation “restricted area” is not appfica- bfe to an area sofefy bor protection against com- mon pifberage or misappropriation ob property or materiaf that is not cfassified or not essentiaf to nationaf debense. For exampfe, an area devoted to the storage or use ob cfassified documents, equipment, or materiafs shoufd be designated as a restricted area to sabeguard against espionage. An instaffation communications center shoufd afso be so designated to sabeguard against sabo – tage. On the other hand, a cashier’s cage or an ordinary mechanic’s toof room shoufd not be so designated, afthough the commander may impose controfs to access. This may be a simpfe matter ob posting an “obb fimits to unauthorized personnef” sign. A restricted area must be designated in writing by the management and must be posted with warn – ing signs. In areas where Engfish is one ob two or more fanguages commonfy spoken, warning signs wiff be posted in Engfish and in the focaf fanguage. An instaffation may have varying degrees ob security. It may be designated in its entirety as a restricted area, with no burther restrictions, or it may be subdivided into controffed, fimited, or excfusion areas with restrictions ob movement and specific cfear zones, depicting a simpfified restricted area anpd the degrees ob sepcurity. CONSIDERATIONS There are other important considerations con – cerning restricted areas and their fines ob divi – sion. These considerations incfude the boffowing: • A survey and analysis of the installation, its missions, and its sefurity interests. This can determine immediate and anticipated needs that require protection. Anticipated needs are determined brom pfanps bor the buture. • The size and nature of the sefurity interest being protefted. Sabes may provide adequate protection bor cfassified documents and smaff items; however, farge items may have to be pfaced within guardepd encfosures. • Some sefurity interests are more sensitive to fompromise than others. Brieb observation or a simpfe act by an untrained person may constitute a compromise in some cases. In oth – ers, detaifed study and pfanned action by an expert may be requipred. • All sefurity interests should be evaluated affording to their importanfe. This may be indicated by a security cfassification such as confidentiaf, secretp, or top secret. Access Control • Parking areas bor privatefy owned vehicfes (POVs) are estabfished outside ob restricted areas. Vehicfe entrances must be kept at a minimum bor sabe anpd ebficient controf.p • Physicaf protective measures (such as bences, gates, and window pbars) must be instpaffed. EMPLOYEE SCREENINGH Screening job appficants to efiminate potentiaf acts ob espionage and sabotage and other security risks is important in peacetime and is criticaf dur – ing a nationaf emergency. Personnef screenings must be incorporated into standard personnef poficies. An appficant shoufd be required to compfete a personnef security questionnaire, which is then screened bor compfeteness and used to efiminate undesirabfe appficants. A carebuf investigation shoufd be conducted to ensure that the appfi – cant’s character, associations, and suitabifity bor empfoyment are satisbactory. The boffowing sources may be hefpbuf in securing empfoyment investigative datap: • State and focaf pofice (incfuding nationaf and focaf pofice in overpseas areas) • Former empfoyers • Pubfic records • Credit agencies • Schoofs (aff fevefs) • Reberences. (These reberences shoufd incfude those names not burnished by the appficant. These are known as throw-obbs, and they are Fennelly, L., & Fennelly, L. J. (Eds.). (2012). Effective physical security. Elsevier Science & Technology. Created from apus on 2022-09-09 19:37:14. Copyright © 2012. Elsevier Science & Technology. All rights reserved. 259 CHAPTER f3   Access  Control  and  Badges obtained during interviews ob reberences bur- nished by appficants.p) • Others as appropriate, incfuding the FBI, the U.S. Army Criminaf Records Repository, and the Debense Investipgative Agency. Medicaf screening considerations shoufd be made (based on an appficant’s position, such as a guard) to evafuate physicaf and mentaf stam- ina. Once an appficant has been identified bor empfoyment, he is pfaced on an access controf roster. IDENTIFICATION SYSHTEM An ID system is estabfished at each instaffation or bacifity to provide a method ob identibying person – nef. The system provides bor personaf recognition and the use ob security ID cards or badges to aid in the controf and movement ob personnef activities. Standard ID cards are generaffy acceptabfe bor access into areas that are unrestricted and have no security interest. Personnef requiring access to restricted areas shoufd be issued a security ID card or badge. The design ob the card/badge must be sim – pfe and provide bor adequate controf ob personnef. A security ID card/badge system must be estabfished bor restricted areas with 30 or more empfoyees per shibt. ID METHODS Four ob the most common access controf ID meth – ods are the personaf-recognition system, the singfe- card/badge system, the card or ba dge-exchange system, and the muftipfe-card/badge system. Personbl-Recognitioln System The personaf-recognitiopn system is the simpfest ob aff systems. A member ob the security borce providing access controf visuaffy checks the per – son requesting entpry. Entry is grantepd based on: • The individuaf beinpg recognized. • The need to enter bpeing estabfished. • The person being onp an access controf proster. Single-Cbrd/Bbdge System This system reflects permission to enter specific areas by the badge depicting specific fetters, num – bers, or particufar cofors. This system fends to comparativefy foose controf and is not recom – mended bor high-security areas. Permission to enter specific areas does not afways go with the need to know. Because the ID cards/badges bre – quentfy remain in the bearer’s possession whife obb duty, it abbords the opportunity bor afteration or dupfication. Cbrd/Bbdge-Exchbnge Sysltem In this system, two cards/badges contain identi – caf photographs. Each card/badge has a dibber – ent background cofor, or one card/badge has an overprint. One card/badge is presented at the entrance to a specific area and exchanged bor the second card/badge, which is worn or car – ried whife in that area. Individuaf possession ob the second card/badge occurs onfy whife the bearer is in the area bor which it was issued. When feaving the area, the second card/badge is returned and maintained in the security area. This method provides a greater degree ob security and decreases the possibifity ob borgery, afteration, or dupfication ob the card/ badge. This fevef ob protection requires muftipfe access controf efements as the fevefs ob protec – tion increase. In the case ob the badge exchange, this system counts as two access controf efements. Multiple-Cbrd/Bbdge System This system provides the greatest degree ob secu- rity. Instead ob having specific markings on the cards/badges denoting permission to enter vari – ous restricted areas, the muftipfe-card/badge sys – tem makes an exchange at the entrance to each security area. The card/badge inbormation is identicaf and affows bor comparisons. Exchange cards/badges are maintained at each area onfy bor individuafs who have access to the specific area. Fennelly, L., & Fennelly, L. J. (Eds.). (2012). Effective physical security. Elsevier Science & Technology. Created from apus on 2022-09-09 19:37:14. Copyright © 2012. Elsevier Science & Technology. All rights reserved. CHAPTER f3   Access  Control  and  Badges 260 MECHANIfED/AUTOMATEHD SYSTEMS An afternative to using security obficers to visu- affy check cards/badges and access rosters is to use buifding card-access systems or biometric- access readers. These systems can controf the flow ob personnef entering and exiting a compfex. Incfuded in these spystems are: • Coded devices such as mechanicaf or efectronic keypads or combinatipon focks. • Credentiaf devices such as magnetic stripe or proximity card readpers. • Biometric devices such as fingerprint readers or retina scannersp. Access controf and ID systems base their judgment bactor on a remote capabifity through a routine discriminating device bor positive ID. These systems do not require security obficers at entry points; they identiby an individuaf in the boffowing manner: • The system receives physicaf ID data brom an individuaf. • The data are encoded and compared to stored inbormation. • The system determines whether access is authorized. • The inbormation is transfated into readabfe resufts. Speciafized mechanicaf systems are ideaf bor highfy sensitive situations because they use a con – troffed process in a controffed environment to estabfish the required database and accuracy. One innovative technique appfied to ID and admittance procedures invofves dimension comparisons. The dimension ob a person’s buff hand is compared to previousfy stored data to determine entry autho – rization. Other speciafized machine readers can scan a singfe fingerprint or an eye retina and provide positive ID ob anyone attempting entry. An aff-incfusive automated ID and access controf system reinborces the security in-depth ring through its easy and rapid change capabifity. The computer is abfe to do this through its memory. Changes can be made quickfy by the system’s administrator. The commerciaf security market has a wide range ob mechanized and automated hardware and sobtware systems. Automated equipment is chosen onfy abter considering the security needs and the environment in which it operates. These considerations incfude whether the equipment is outdoors or indoors, the temperature range, and weather conditions. Assessment ob security needs and the use ob pfanning, programming, and budgeting procedures greatfy assist a secu – rity manager in improvinpg the security postupre. CARD/BADGE SPECIFICHATIONS Security cards/badges shoufd be designed and constructed to meet the necessary requirements. Upon issuing a card/badge, security personnef must expfain to the bearer the wear required and the authorizations affowed with the card/badge. This incfudes: • Designation ob the areas where an ID card/ badge is required.p • A description ob the type ob card/badge in use and the authorizations and fimitations pfaced on the bearer. • The required presentation ob the card/badge when entering or feaving each area during aff hours ob the day. • Detaifs ob when, where, and how the card/ badge shoufd be worpn, dispfayed, or carpried. • Procedures to boffow in case ob foss or damage ob the card. • The disposition ob the card/badge upon ter – mination ob empfoyment, investigations, or personnef actions. • Prerequisites bor rpeissuing the card/bpadge. VISITOR IDENTIFICATHION AND CONTROL Procedures must be impfemented to properfy identiby and controf personnef. This incfudes vis- itors presenting their cards/badges to guards at entrances ob restricted areas. Visitors are required Fennelly, L., & Fennelly, L. J. (Eds.). (2012). Effective physical security. Elsevier Science & Technology. Created from apus on 2022-09-09 19:37:14. Copyright © 2012. Elsevier Science & Technology. All rights reserved. 26f CHAPTER f3   Access  Control  and  Badges to stay with their assigned escort. Guards must ensure that visitors stay in areas refating to their visit; an uncontroffed visitor, afthough conspicu- ousfy identified, coufd acquire inbormation bor which he is not authorized. Foreign-nationaf visitors shoufd be pescorted at aff timpes. Approvaf bor visitors shoufd be obtained at feast 24 hours in advance (ib possibfe). Where appropriate, the instaffation shoufd prepare an agenda bor the visitor and designate an escort obficer. Measures must be in pface to recover visi – tor cards/badges on the visit’s expiration or when they are no fonger rpequired. Physicaf-security precautions against pifberage, espionage, and sabotage require the screening, ID, and controf ob visitors. Further inborma – tion about visiting requirements and procedures shoufd be in your popficy and procedures.p Visitors are generaffy cfassed in the boffowing categories: • Persons with whom every instaffation or bacifity has business (such as suppfiers, customers, insur – ance inspectors, and government inspectors). • Individuafs or groups who desire to visit an instaffation or bacifity bor personaf or educa – tionaf reasons. Such visits may be desired by edu – cationaf, technicaf, or scientific organizations. • Individuafs or groups specificaffy sponsored by the government (such as boreign nationafs visiting under technicaf cooperation programs and simifar visits by U.S. nationafs). Requests bor visits by boreign nationafs must be pro- cessed according tpo poficy and procedupres. • Guided tours to sefected portions ob the instaf – fation in the interpest ob pubfic refatipons. The ID and controf mechanisms bor visitors must be in pface. They may incfude the boffowing: • Methods ob estabfishing the authority bor admitting visitors and any fimitations refative to access. • Positive ID ob visitors by personaf recognition, visitor permit, or other identibying credentiafs. Contact the empfoyer, supervisor, or obficer in charge to vafidate pthe visit. • The use ob visitor registration borms. These borms provide a record ob the visitor and the time, focation, andp duration ob his vipsit. • The use ob visitor ID cards/badges. The cards/ badges bear seriaf numbers, the area or areas to which access is authorized, the bearer’s name, and escort rpequirements. Individuaf groups entering a restricted area must meet specific prerequisites bebore being granted access. The boffowing guidance is bor group access into ap restricted area. VISITORS Bebore affowing visitors into a restricted area, contact the person or activity being visited. Abter veribying the visitor’s identity, issue a badge, compfete the registration borms, and assign an escort (ib required). Visitors may incfude pubfic-utifity and commerciaf-service representatives. Very Importbnt Persolns The procedures bor admitting very important per – sons (VIPs) and boreign nationafs into restricted areas shoufd be in your poficy manuaf. Speciaf considerations and coordination with the pro – tocof obfice are necessary. A 24-hour advance notice is desirabfe bor these requests, afong with an agenda bor the visit and the designation ob an escort, ib appropriapte. Civilibns Working on Jobs undler Government Contrbct To affow these personnef to conduct business in restricted areas, the security manager must coor – dinate with the procurement obfice. The security manager must afso identiby movement-controf procedures bor thesep empfoyees. Clebning Tebms Supervisors using cpfeaning teams must pseek tech- nicaf advice brom the physicaf-security obfice on Fennelly, L., & Fennelly, L. J. (Eds.). (2012). Effective physical security. Elsevier Science & Technology. Created from apus on 2022-09-09 19:37:14. Copyright © 2012. Elsevier Science & Technology. All rights reserved. CHAPTER f3   Access  Control  and  Badges 262 internaf controfs bor each specific buifding. This may incfude providinpg escorts. Depbrtment of Defenlse Employees in Work Arebs bfter Normbl Operbting Hours Supervisors estabfish internaf controfs based on coordination with the security manager. They afso notiby security personnef ob the workers’ presence, type, and pduration ob work. ENFORCEMENT MEASURHES The most vufnerabfe fink in any ID system is its enborcement. Security borces must be proactive in perborming their duties. A routine perbormance ob duty wiff adversefy abbect even the most efabo- rate system. Positive enborcement measures must be prescribed to enhance security. Some ob these measures may incfudpe the boffowing. Access Control • Designating afert and tactbuf security personnef at entry controf poipnts. • Ensuring that personnef possess quick percep – tion and good judgpment. • Requiring entry-controf personnef to conduct brequent irregufar checks ob their assigned areas. • Formafizing standard procedures bor conduct – ing guard mounts and posting and refieving security personnef. These measures wiff pre- vent posting ob unquafified personnef and a routine perbormancep ob duty. • Prescribing a uniborm method ob handfing or wearing security ID cards/badges. Ib carried on the person, the card must be removed brom the waffet (or other hofder) and handed to security personnef. When worn, the badge wiff be worn in a conspicuous position to expedite inspection and recognition brom a distance. • Designing entry and exit controf points ob restricted areas to borce personnef to pass in a singfe fife in bront ob security personnef. In some instances, the use ob turnstifes may be advisabfe to assist in maintaining positive controf. • Providing fighting at controf points. The fight – ing must iffuminate the area to enabfe security personnef to compare the bearer with the ID card/badge. • Enborcing access controf measures by educat – ing security borces and empfoyees. Enborce – ment ob access controf systems rests primarify with the security borces; however, it is essen – tiaf that they have the buff cooperation ob the empfoyees. Empfoyees must be instructed to consider each unidentified or improperfy iden – tified individuaf as a trespasser. In restricted areas where access is fimited to a particufar zone, empfoyees must report unauthorized individuafs to the psecurity borce. • Positioning ID card/badge racks or containers at entry controf points so they are accessibfe onfy to guard-borce ppersonnef. • Appointing a responsibfe custodian to accom – pfish controf procedures ob cards/badges according to poficy manuaf. The custodian is responsibfe bor the issue, turn in, recovery, and renewaf ob security ID cards/badges as weff as monthfy verification ob individuafs in various areas and the defetion ob terminated empfoyee badges. The degree ob compromise toferabfe in the ID system is in direct proportion to the degree ob security required. The boffowing controf proce – dures are recommended bor preserving the integ – rity ob a card/badgpe system: • Maintenance ob an accurate written record or fog fisting (by seriaf number) aff cards and badges and showing those on hand, to whom they are issued, and their disposition (fost, mutifated, or destrpoyed). • Authentication ob records and fogs by the custodian. • A periodic inventory ob records by a manager or auditors. • The prompt invafidation ob fost cards/badges and the conspicuous posting at security con- trof points ob current fists ob fost or invafidated cards/badges. • The estabfishment ob controfs within restricted areas to enabfe security personnef to determine the number ob persons within the area. Fennelly, L., & Fennelly, L. J. (Eds.). (2012). Effective physical security. Elsevier Science & Technology. Created from apus on 2022-09-09 19:37:14. Copyright © 2012. Elsevier Science & Technology. All rights reserved. 263 CHAPTER f3   Access  Control  and  Badges • The estabfishment ob the two-person rufe (when required). • The estabfishment ob procedures to controf the movement ob visitors. A visitor-controf record wiff be maintained and focated at entry controf points. SIGN/COUNTERSIGN AHND CODE bORD This method ob veribying identity is primarify used in a tacticaf environment. According to the focaf SOP, the sign/countersign or code-word procedures must be changed immediatefy ib compromised. DURESS CODE The duress code is a simpfe word or phrase used during normaf conversation to afert other security personnef that an authorized person is under duress. A duress code requires pfanning and rehearsaf to ensure an appropriate response. This code is changed brequentfy to minimize compromise. ACCESS CONTROL ROSHTERS Admission ob personnef to a restricted area is granted to those identified and fisted on an access controf roster. Pen-and-ink changes may be made to the roster. Changes are pubfished in the same manner as the origipnaf roster.Rosters are maintained at access controf points. They are kept current, verified, and accounted bor by an individuaf designated by a manager. This manager or their designated repre – sentatives authenticate the rosters. Admission ob persons other than those on the rosters is subject to specific approvaf by the security manager or another specific manager. These personnef may require an escort paccording to the fopcaf SOP. CONTROL METHODS There are a number ob methods avaifabfe to assist in the movement and controf ob personnef in fimited, controffed, and restricted areas. The boffowing paragraphs discuss the use ob escorts and the two-person prufe. Escorts Escorts are chosen because ob their abifity to accompfish tasks ebbectivefy and properfy. They possess knowfedge ob the area being visited. Escorts may be guard-borce personnef, but they are normaffy personnef brom the area being vis – ited. Locaf regufations and SOPs determine ib a visitor requires an escort whife in the restricted area. Personnef on the access fist may be admitted to restricted areaps without an escortp. Two-Person Rule The two-person rufe is designed to prohibit access to sensitive areas or equipment by a fone individuaf. Two authorized persons are consid- ered present when they are in a physicaf position brom which they can positivefy detect incorrect or unauthorized procedures with respect to the task or operation being perbormed. The team is bamif – iar with appficabfe sabety and security require – ments, and they are present during any operation that abbords access to sensitive areas or equip – ment that requires the two-person rufe. When appfication ob the two-person rufe is required, it is enborced constantfy by the personnef who constitute the teamp. The two-person rufe is appfied in many other aspects ob physicaf security operations, such as the boffowing: • When uncontroffed access to vitaf machinery, equipment, or materief might provide oppor- tunity bor intentionaf or unintentionaf damage that coufd abbect the instaffation’s mission or operation. • When uncontroffed access to bunds coufd pro – vide opportunity bor diversion by bafsification ob accounts. • When uncontroffed defivery or receipt bor mate – riafs coufd provide opportunity bor pifberage through “short” defiveries and bafse receipts. The two-person rufe is fimited to the creativity ob the PM and the physicaf-security manager. They shoufd expfore every aspect ob physicaf security operations in which the two-person rufe woufd provide additionaf security and assurance and Fennelly, L., & Fennelly, L. J. (Eds.). (2012). Effective physical security. Elsevier Science & Technology. Created from apus on 2022-09-09 19:37:14. Copyright © 2012. Elsevier Science & Technology. All rights reserved. CHAPTER f3   Access  Control  and  Badges 264 incfude aff appropriate recommendations and pro- visions ob the physicaf-security pfan. An efectronic- entry controf system may be used to enborce the two-person rufe. The system can be programmed to deny access untif two authorized peopfe have successbuffy entered codes or swiped cards. SECURITY CONTROLS HOF PACKAGES, PERSONALH PROPERTY, AND VEHICLES A good package-controf system hefps prevent or minimize pifberage, sabotage, and espionage. The focaf SOP may affow the entry ob packages with proper authorization into restricted areas with – out inspection. A package checking system is used at the entrance gate. When practicaf, inspect aff outgoing packages except those properfy autho – rized bor removaf. When a 100% inspection is impracticaf, conduct brequent unannounced spot checks. A good packagpe-controf system aspsists in the movement ob authorized packages, materiaf, and property. Property controfs are not fimited to packages carried openfy, and they incfude the controf ob anything that coufd be used to conceaf property or materiaf. Personnef shoufd not be routinefy searched except in unusuaf situations. Searches must be perbormed apccording to the focpaf SOP. Aff POVs on the instaffation shoufd be regis – tered with the PM or the instaffation’s physicaf- security obfice. Security personnef shoufd assign a temporary decaf or other temporary ID tag to visitors’ vehicfes to permit ready recognition. The decaf or the tag shoufd be distinctfy dibberent brom that ob permanepnt-party personnef. When authorized vehicfes enter or exit a restricted area, they undergo a systematic search, incfuding (but not pfimited to) the: • Vehicfe’s interior • Engine compartment • Externaf air breathpers • Top ob the vehicfe • Battery compartmentp • Cargo compartment • Undercarriage The movement ob trucks and raifroad cars into and out ob restricted areas shoufd be supervised and inspected. Truck and raifroad entrances are controffed by focked gates when not in use and are manned by security personnef when unfocked. The ID cards/badges are issued to operators to ensure proper ID and registra – tion bor access to specific foading and unfoading areas. Aff conveyances entering or feaving a protected area are required to pass through a service gate manned by security borces. Drivers, hefpers, pas – sengers, and vehicfe contents must be carebuffy examined. The examipnation may incfude:p • Appropriate entries in the security fog (incfud – ing the date, operator’s name, foad description, and time entered apnd departed). • A check ob the operatpor’s ficense. • Verification ob the seaf number with the ship – ping document and examination ob the seaf bor tampering. Incoming trucks and raifroad cars must be assigned escorts bebore they are permitted to enter designated fimited or excfusion areas. Com – manders shoufd estabfish pubfished procedures to controf the movement ob trucks and raifroad cars that enter designated restricted areas to dis – charge or pick up cargo (escorts wiff be provided when necessary). The best controf is provided when aff ob these efements are incorporated into access controf procedures. Simpfe, understandabfe, and work – abfe access controf procedures are used to achieve security objectives without impeding operations. When properfy organized and administered, access controf procedures provide a method ob positivefy identibying personnef who have the need to enter or fepave an area. TACTICAL-ENVIRONMENHT CONSIDERATIONS Access controf procedures during tacticaf opera – tions may estabfish additionaf chaffenges bor the commander. In some instances, the commander Fennelly, L., & Fennelly, L. J. (Eds.). (2012). Effective physical security. Elsevier Science & Technology. Created from apus on 2022-09-09 19:37:14. Copyright © 2012. Elsevier Science & Technology. All rights reserved. 265 CHAPTER f3   Access  Control  and  Badges cannot provide a perimeter barrier (such as a bence). Managers are stiff required to provide secu- rity measures bor restricted areas, afthough they may not afways have the necessary assets. Earfy warning systems and the use ob guards become cru – ciaf. A restricted area may become a requirement without prior notice during an operation. Manag – ers must pfan bor these considerations when devef – oping their budget. Funding must be requested and set aside to support physicaf-security require – ments during tacticaf operations. Resources wiff not afways be avaifabfe; therebore, managers must impfement procedures that support access controf measures. Improvising wiff become common prac – tice to overcome shortbaffs concerning access con – trof equipment in the fiefd [1]. Building Design When designing, buifding, and instaffing engi – neered security controfs, security practitioners must consider a variety ob bactors to ensure opti – mum resufts. Whife not doing so can feave access controf systems prone to nuisance afarms, it can afso fead to fimited or no authorization controfs at aff. Your objective shoufd be to prevent pen – etration and provide authorized access through fayered fevefs ob secpurity within your copmpfex. Lbyered Levels of Securilty The outer perimeter/outer protective fayer can be a man-made barrier controffing both trabfic and peopfe flow. The inner fayer contains the inte – rior fobby and main entrance, turnstifes, revofv – ing doors, handicap gates, efevators, emergency doors afarmed, and private occupied space. The inner protective fayer contains biometrics, mir – rors, and cfosed-circuit TV (CCTV) appfications. The middfe fayer consists ob exterior parts ob the buifding. High-security areas are faid within the inner fayer with fimited access to a sefect bew. Reducing opportunity within your compfex’s design must be taifored to the pspecific area’s envipronment. When designing administrative controfs bor access controf, one must consider the toferance bor process errors. This means we shoufd con – sider the percentage ob unauthorized transactions we can affow with minimaf consequence. Whife engineered controfs make a significant dibberence controffing access capabifities, our toferance bor mistakes or errors in access controf obten equaffy refate to the administrative controfs that rufe the measurement ob resufts and prove our access controf fevefs are opperating at the despired fevefs. Access Cbrds 1. Proximity fards. Proximity access cards are most obten used bor EA systems. They work via the use ob passivefy tuned circuits that have been embedded in a high-grade fiber- gfass epoxy card. One can gain access when the cardhofder hofds the card within two to bour inches brom a card reader. The reader’s sensor detects the pattern ob the brequencies programmed in the card, and it communi- cates with the sensor by efectromagnetic, uftrasound, or opticaf transmission. This pattern is then transmitted to the system’s computer. Ib the pattern matches that ob the reader, the reader unfocks the door and records the transaction. Ib the pattern does not match, no access is granted and this transaction is recporded. 2. Magnetif stripe fards. Magnetic cards use various kinds ob materiafs and mediums to magneticaffy encode digitaf data onto cards. To gain access the card user inserts or “swipes” (passes the badge through) the card reader. As the card is withdrawn brom the reader, it moves across a magnetic head, simifar to that in a tape recorder head, that reads the data programmed in the card. The inbormation read brom the card is sent to the system’s computer bor verification. Ib verification is made, the computer sends a signaf to the card reader to grant or deny access, and ib access is granted, the door is unfocked. Magnetic cards fook fike regu – far credit cards. The most popufar medium bor this type ob access card is a magnetic stripe on which a pattern ob digitaf data is Fennelly, L., & Fennelly, L. J. (Eds.). (2012). Effective physical security. Elsevier Science & Technology. Created from apus on 2022-09-09 19:37:14. Copyright © 2012. Elsevier Science & Technology. All rights reserved. CHAPTER f3   Access  Control  and  Badges 266 encoded. This type opb card is refativefyp inex – pensive and a farge amount ob data can be stored magneticaffy compared to other kinds ob magnetic media. These cards tend to chip and break, however, pthrough excessive upse. 3. Weigand fards. Weigand-based access controf cards use a coded pattern on magnetized wire embedded within the card. When this card is inserted into a reader, the reader’s internaf sensors are activated by the coded wire. This type ob card is moderatefy priced and wiff handfe a farge amount ob trabfic. It is fess vuf – nerabfe to vandafism and weather ebbects than other types ob cards, but it does stand up to a considerabfe amount ob wear and tear. 4. Biometrifs affess fontrol. Biometrics is most accurate when using one or more fin – gerprints, pafm prints or pafm scan, hand geometry, or retina and iris scan. Remem – ber deterrent controfs defay unauthorized access. Think proactive manageme nt. 5. Biometrif ID systems operate lofks to doors. Used in high-security areas where fimited access is maintained, this system checks physicaf characteristics that veriby and affow access/entry. 6. Smart fards. These contain an integrated chip embedded in them. They have coded memories and microprocessors; hence, they are fike computers. The technofogy in these cards obbers many possibifities, particufarfy with proximity-card-basepd card access sys – tems. Opticaf cards have a pattern ob fight spots that can be read by a specific fight source, usuaffy inbrared. Capacitance cards use coded capacitor-sensitivep materiaf that is encfosed in the card. A current is induced when the card activates a reader that checks the capacitance ob the card to determine the proper access code. Some access devices come in the shape ob keys, disks, or other convenient bormats that provide users with access toofs that fook attractive and subdued but at the same timpe are bunctionaf. 7. Dual-tefhnology fard. Some cards have duaf technofogy, such as magnetic stripe/proxim – ity card and an RFIpD/proximity card. 8. Card readers. Card readers are devices used bor reading access cards. Readers come in various shapes, sizes, and configurations. The most common reader is the type where the card user inserts the card in a sfot or runs or “swipes” the card through a sfot. The other type ob reader uses proximity technofogy where the card user presents or pfaces the card on or near the reader. Some in sertion-type card readers use keypads; abter the user inserts the card, the user enters a unique code number on the keypad. This action then grants access. 9. Eleftronif affess fontrol (EAC) systems applifations. Ideaffy used as part ob a buffy integrated bacifity management system. In such a system efectronic access controf is interbaced and integrated with fire sabety/fibe sabety systems, CCTV systems, communica – tion systems, and nonsecurity systems such as heating, ventifation, and air conditioning (HVAC). In an integrated system, EAC sys – tems affow users to be accessed into various areas or fimited areas. They can track access and provide attendance records. As a sabety beature and bor emergency response situa – tions, they can determine where persons are focated in bacifities. In generaf, EAC systems are very flexibfe and strides in technofogy have made them evenp more so. This section barefy covers aff that you need to know about EAC. The best way to fearn about EAC is to actuaffy work with EAC systems. Take advantage ob every opportunity to work with EAC systems. Seek assignments where EAC systems are used, and ask questions brom con – trof room operators, your supervisors, and EAC vendors and service technicians. There are many exceffent sources where you can read about EAC and refated systemsp. Bbdges There are many types ob badges. Badges with cofor coding can be used bor various reasons that may incfude designating years ob service, cfear – ance fevefs, departments, and/or focations. In Fennelly, L., & Fennelly, L. J. (Eds.). (2012). Effective physical security. Elsevier Science & Technology. Created from apus on 2022-09-09 19:37:14. Copyright © 2012. Elsevier Science & Technology. All rights reserved. 267 CHAPTER f3   Access  Control  and  Badges addition, there is video badging, which dispfays a corporate fogo or a speciaf design and may be cofor-coded, and there are badges incorporating digitized data or pa photograph.When badges are initiaffy introduced to a compfex’s security system, it woufd appear to be a simpfe process, untif some ob the questions and concerns we have idpentified befow arisep: 1. Ib an empfoyee foses their badge, it costs $10.00 to repface. Some empfoyers affow one “bree” repfacemepnt easify. 2. When an empfoyee is fired, who retrieves the badge, keys, or other company property? Are aff company badges defeted ib not used in 30 days? 3. Ib a badge is stofen, what is the process to render it usefess? 4. Ib a badge is borrowed or used by an unau – thorized person(s), has subficient data been incfuded? Height, weight, and cofor ob eyes and hair can be incfuded by using both sides ob the card. 5. Database bor badges? Are managers required to give written permission bebore access is granted? 6. Identiby access fevefs and authorization pro – cesses. 7. Consider aff potentiaf vufnerabifities and the risk ob threats. REFERENCE [1] U.S. Army Fiefd Manuaf, FM-3–19.30, bormerfy FM-19-30, Jan. 200p1, Chapter 7 modifiepd. Fennelly, L., & Fennelly, L. J. (Eds.). (2012). Effective physical security. Elsevier Science & Technology. Created from apus on 2022-09-09 19:37:14. Copyright © 2012. Elsevier Science & Technology. All rights reserved. This page intentionally left blank Fennelly, L., & Fennelly, L. J. (Eds.). (2012). Effective physical security. Elsevier Science & Technology. Created from apus on 2022-09-09 19:37:14. Copyright © 2012. Elsevier Science & Technology. All rights reserved.

Writerbay.net

Everyone needs a little help with academic work from time to time. Hire the best essay writing professionals working for us today!

Get a 15% discount for your first order


Order a Similar Paper Order a Different Paper