SlideShare ist ein Scribd-Unternehmen logo
1 von 43
Downloaden Sie, um offline zu lesen
Physical Security Integration &
Access Control
---
Part 1: Concepts & Components
Today’s
Moderator
David Martin
Physical Security
Technical Specialist
LENSEC
Webinar
Sponsor
Based in Houston, TX
Since 1998
IP Video Management
System Design
Installation
Project Management
LENSEC is committed to empowering our clients and partners to prevent or mitigate physical
security risks. We want to help protect people and assets as well as improve operations through
our evolutionary and intuitive technology. We can do this by providing expertise in security and
software development.
Our Mission
Webinar
Logistics
Q&A at the end
Questions for the panelist
Audio from attendees muted
Poll questions
Survey
Keith Harris
Marketing Manager
LENSEC
Today’s
Panelist
Expertise in Photography & Video Production
Experience in Physical Security Market
Trainer for Surveillance & Physical Security Techniques
Training
Goal
Physical Security Integration & Access Control
Part 1: Concepts & Components
Topics for Webinar:
Access Control Deployment
Building & Fire Codes
Security Integration
Choosing Components
Preventive Control – keeps undesirable events from happening
Detective Control – identifies undesirable events that have occurred
Corrective Control – corrects undesirable events that have occurred
Deterrent Control – discourages security violations from taking place
Recovery Control – restores resources & capabilities after an event
Access Control Categories & Concepts
Physical Security Integration & Access Control
Layers of Protection
Unifying Your Security Platform
Cross Functional
Basic Functions - YES
Advanced Features – Maybe Not
Security Integration
Physical Security Integration & Access Control
Interior
Entrance/Exit
Hallways
Offices
Access Control Environment
Physical Security Integration & Access Control
Exterior
Parking Lots
Perimeter
Warehouse
Access Control Environment
Physical Security Integration & Access Control
Poll
Question
Poll Question #1
What is the primary concern when
regulating access control?
Building & Fire Codes
Passive vs. Active
Security Systems
Primary Directive
Rules & Standards
Physical Security Integration & Access Control
Building & Fire Codes
NFPA – National Fire Protection
Association
NFPA101 – Life Safety Code
NFPA72 – Primarily Covers Fire
Alarms
IBC – International Building Code
Rules & Standards
Physical Security Integration & Access Control
National Fire Protection Assoc. Codes & Standards: http://www.nfpa.org/codes-and-standards/document-information-pages
International Building Code: http://www.iccsafe.org/codes-tech-support/codes/2015-i-codes/ibc/
AHJ – Authority Having
Jurisdiction
Rules & Standards
Physical Security Integration & Access Control
AHJ – Authority Having
Jurisdiction
Fire Marshal
Building Inspector
Health Department
Engineers/Architects
Senior Executives
Utility Companies
Insurance Companies
Rules & Standards
Physical Security Integration & Access Control
Legacy BOCA
Americans with Disabilities Act (ADA)
UL 294
Rules & Standards
Physical Security Integration & Access Control
Zero Downtime
High Availability
Five Nines
Rules & Standards
Physical Security Integration & Access Control
Nines Availability Downtime
1 90% 36.5 days/year
2 99% 3.65 days/year
3 99.9% 8.76 hours/year
4 99.99% 52 minutes/year
5 99.999% 5.25 minutes/year
Five Nines
Of High Availability

24/7 Operation
Alarm Monitoring System
Live Video Monitoring
Video Verification
Intrusion Detection & Fire Alarms
Access Control Equipment
Access Control System
Physical Security Integration & Access Control
Poll
Question
Poll Question #2
To which side of the door are
Fail Safe & Fail Secure relevant?
Access Control System
Physical Security Integration & Access Control
Fail Safe – Locks are Released
Fail Secure – Locks are Secured
Applies to Entry Control Only
Manual Egress Allowed
Mechanical Override Key
Stairwell Doors
Fire Doors
Door Types
Mounting Positions
Door Movement
Mounting Convenience
Access Control System
Physical Security Integration & Access Control
Choosing Locks
Cylindrical Lock
Mortise Lock
Surface Lock
Deadbolt Lock
Deadlatch Locks
Access Control Components
Physical Security Integration & Access Control
Cylindrical
Lock
Mortise
Lock
Surface LockDeadbolt LockDeadlatch Lock
Maglocks
Power
Fail Safe by Default
Bond Rating
Door Orientation
Out Swinging Door
In Swinging Door (Z bracket)
Double Door Maglocks
Access Control Components
Physical Security Integration & Access Control
Maglock
Armature
&
Magnet
Z Bracket
Double
Maglock
Door Strikes
Keeper
Fail Safe/Fail Secure Switch
Low Voltage: AC/DC
Mortise Strike
Surface Strike
Latch Protector
Access Control Components
Physical Security Integration & Access Control
Mortise Strike
Surface Strike
Latch Protector
Wireless Locks
Integrated Locks
Wireless Card Reader
Interface
Proprietary Wireless
Frequency
Wi-Fi Locks
Access Control Components
Physical Security Integration & Access Control
Other Lock Types
Electronic Lockset
Electronic Bolt
Access Control Components
Physical Security Integration & Access Control
Electronic
Lockset
Electronic
Bolt
Exit Devices
Request To Exit
Crash Bar
PIR-RTE
Push Button
Access Control Components
Physical Security Integration & Access Control
Credentials
Form
Badge, Fob, Etc.
Type
Prox
iClass
Protocol
HID Global
NXP Semiconductor
Access Control Components
Physical Security Integration & Access Control
Keyfob Badge Clamshell
Authorization Interface
Card Reader
Ingress/Egress
Access Control Components
Physical Security Integration & Access Control
Authorization Interface
Card Readers
Wiegand Protocol
OSDP Protocol
Credentials
Standard Proximity
Smartcards
Barcode/Magstripe
Gesture Sensitive
Access Control Components
Physical Security Integration & Access Control
Authorization Interface
Keypad
Oldest & Most Common
Diminished Security
Password Protection
Shoulder Surfing
Access Control Components
Physical Security Integration & Access Control
Authorization Interface
Biometrics
Fingerprint
Hand Geometry
Retinal Scan
Iris Scan
Facial Recognition
Access Control Components
Physical Security Integration & Access Control
Authorization Factors
Visual Verification
Multifactor Credentials
Possession: Something You Have
Knowledge: Something You Know
Characteristic: Something You Are
Trusted Verification: Someone Trusted
Verifies You
Access Control Concepts
Physical Security Integration & Access Control
Authorization Factors
Multifactor Credentials
2 Factors – Keyfob & PIN
3 Factors – Keyfob, PIN & Fingerprint
4 Factors – Keyfob, PIN, Fingerprint &
Manned Checkpoint
Access Control Concepts
Physical Security Integration & Access Control
Door Controllers
Bridge the Gap
CAN Controllers
Standalone Controllers
Integrated Controllers
Access Control Components
Physical Security Integration & Access Control
Transmission & Networks
IP-Based Transmission
Power over Ethernet (PoE)
802.3af – 15.4W power
802.3at – 25.5W power
Access Control Components
Physical Security Integration & Access Control
Physical Security Integration & Access Control
Transmission & Networks
Hardwired / Serial Connected Cable Systems
6 Conductor Cable
4 Conductor Cable / 8 Conductor Cable
2 Conductor Cable
Drain Wire
Access Control Components
Physical Security Integration & Access Control
Questions
Q&A
Contacts
David Martin
LENSEC
(512) 318-3829
dmartin@lensec.com
Keith Harris
LENSEC
(512) 913-3907
kharris@lensec.com
Thanks for Attending
Today’s Webinar
SIS5-16 Webinar – Physical Security Integration & Access Control
Part One: Concepts & Components
Questions & Answers
Poll Question #1
What is the primary concern when regulating access control?
1. Integrating many different building systems
2. Carefully reading the specifications
3. Life safety
4. Knowing who has jurisdiction for code enforcement
Poll Question #2
To which side of the door are Fail Safe & Fail Secure relevant?
1. The entry side of the door
2. The exit side of the door
3. Both sides of the door
4. Neither side of the door
Which version of the building and fire codes should I follow?
That is not always an easy answer. The right thing to do is follow the version of the code that the AHJ
follows. This could vary among entities. The most recent version of the NFPA 101 Life Safety Code is
2015, though many jurisdictions are still working off of 2012 rules or earlier. The AHJ has the authority
to adopt the code. So, when in doubt, check with the AHJ for clarification.
When using a Fail Safe lock, the door becomes unlocked when there is a power failure. How does
the owner prevent a security risk?
I’ve seen that as a concern before. You can’t auto lock the doors in those situations because that defeats
the purpose of life safety. You can provide a mechanical lock and have security or a designated person
go and manually lock the doors after an inspection of the building. However, the mechanical lock should
be used on a regular basis since free egress should be maintained. Fail Secure hardware locations might
require a Mechanical Override Key to manually lock doors for building security when the power is
down.
Proper use dictates that these keys are only used on an emergency basis and held by a limited number
of key holders.
How does access control work with building systems like the fire alarm?
A fire alarm pull is not an exit device, but it works like one – sort of. The fire alarm is configured to drop
lock power when the fire pull is activated. Maglocks and access control systems have contacts to tie into
the fire alarm. AHJs may require proof of successful access control override by the fire pulls.
When you’re choosing a wireless or WiFi lockset, do each have to be within range of the access
point?
Range is a consideration. Each location should be tested to make sure it is in range of the network
access point. Some of these locks are designed with a MIMO style network for lock communications.
This would require a system hub to located within range of every lock. A single system hub might
manage 12 or more doors within its range.
Are there other types of Request To Exit devices for uncommon installation circumstances?
A less common device is an RTE Pressure Pad placed in front of a door to break power when a person
stand on it. These work best when installed under carpets or flooring, though this might complicate
maintenance. Pressure Pads might be used in areas where hand contact with the door or PIRs are not
permitted, such as a clean room or explosive areas.

Weitere ähnliche Inhalte

Was ist angesagt?

Managing your access control systems
Managing your access control systemsManaging your access control systems
Managing your access control systems
Walter Sinchak,
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
Samuel Kamuli
 

Was ist angesagt? (20)

Monitoring ICS Communications
Monitoring ICS CommunicationsMonitoring ICS Communications
Monitoring ICS Communications
 
Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443
 
Owasp Proactive Controls for Web developer
Owasp  Proactive Controls for Web developerOwasp  Proactive Controls for Web developer
Owasp Proactive Controls for Web developer
 
Internet Accessible ICS in Japan (English)
Internet Accessible ICS in Japan (English)Internet Accessible ICS in Japan (English)
Internet Accessible ICS in Japan (English)
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
 
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
 
Practical Approaches to Securely Integrating Business and Production
Practical Approaches to Securely Integrating Business and ProductionPractical Approaches to Securely Integrating Business and Production
Practical Approaches to Securely Integrating Business and Production
 
Compromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles AwayCompromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles Away
 
Accelerating OT - A Case Study
Accelerating OT - A Case StudyAccelerating OT - A Case Study
Accelerating OT - A Case Study
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT Approach
 
The journey to ICS - Extended
The journey to ICS - Extended The journey to ICS - Extended
The journey to ICS - Extended
 
CompTIA Security+ Guide
CompTIA Security+ GuideCompTIA Security+ Guide
CompTIA Security+ Guide
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
IBM Security QFlow & Vflow
IBM Security QFlow & VflowIBM Security QFlow & Vflow
IBM Security QFlow & Vflow
 
Defcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shopDefcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shop
 
DHS ICS Security Presentation
DHS ICS Security PresentationDHS ICS Security Presentation
DHS ICS Security Presentation
 
Managing your access control systems
Managing your access control systemsManaging your access control systems
Managing your access control systems
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 

Andere mochten auch

Children of North Korea
Children of North KoreaChildren of North Korea
Children of North Korea
maditabalnco
 
Secondary 2 History-Singapore Merging With Malaya
Secondary 2 History-Singapore Merging With MalayaSecondary 2 History-Singapore Merging With Malaya
Secondary 2 History-Singapore Merging With Malaya
MarioSonic54
 
FIRE AND SAFETY
FIRE AND SAFETYFIRE AND SAFETY
FIRE AND SAFETY
raees4all
 
Photos of North Korea
Photos of North KoreaPhotos of North Korea
Photos of North Korea
guimera
 

Andere mochten auch (15)

Step Into Security Webinar - Planning for Outdoor Video Surveillance Projects
Step Into Security Webinar - Planning for Outdoor Video Surveillance ProjectsStep Into Security Webinar - Planning for Outdoor Video Surveillance Projects
Step Into Security Webinar - Planning for Outdoor Video Surveillance Projects
 
Step Into Security Webinar - Improving Physical Security on Your Campus
Step Into Security Webinar - Improving Physical Security on Your Campus Step Into Security Webinar - Improving Physical Security on Your Campus
Step Into Security Webinar - Improving Physical Security on Your Campus
 
Step Into Security Webinar - Securing Your Facilities Using Technology
Step Into Security Webinar - Securing Your Facilities Using Technology Step Into Security Webinar - Securing Your Facilities Using Technology
Step Into Security Webinar - Securing Your Facilities Using Technology
 
Step Into Security Webinar - Surveillance Solutions in Special Education Clas...
Step Into Security Webinar - Surveillance Solutions in Special Education Clas...Step Into Security Webinar - Surveillance Solutions in Special Education Clas...
Step Into Security Webinar - Surveillance Solutions in Special Education Clas...
 
Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...
Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...
Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...
 
LENSEC Corporate Presentation 2017
LENSEC Corporate Presentation 2017LENSEC Corporate Presentation 2017
LENSEC Corporate Presentation 2017
 
The impact of cloud technologies on the video surveillance market
The impact of cloud technologies on the video surveillance market The impact of cloud technologies on the video surveillance market
The impact of cloud technologies on the video surveillance market
 
The Impact of proposed Baram dam on Women
The Impact of proposed Baram dam on WomenThe Impact of proposed Baram dam on Women
The Impact of proposed Baram dam on Women
 
Children of North Korea
Children of North KoreaChildren of North Korea
Children of North Korea
 
Secondary 2 History-Singapore Merging With Malaya
Secondary 2 History-Singapore Merging With MalayaSecondary 2 History-Singapore Merging With Malaya
Secondary 2 History-Singapore Merging With Malaya
 
FIRE AND SAFETY
FIRE AND SAFETYFIRE AND SAFETY
FIRE AND SAFETY
 
IP Video Surveillance
IP Video SurveillanceIP Video Surveillance
IP Video Surveillance
 
Photos of North Korea
Photos of North KoreaPhotos of North Korea
Photos of North Korea
 
Physical Security Management System
Physical Security Management SystemPhysical Security Management System
Physical Security Management System
 
Physical Security Domain
Physical Security DomainPhysical Security Domain
Physical Security Domain
 

Ähnlich wie Step Into Security Webinar - Physical Security Integration & Access Control - Part One - Concepts & Components

Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013
Niraj Kumar
 
CompTIA Security+ Objectives
CompTIA Security+ ObjectivesCompTIA Security+ Objectives
CompTIA Security+ Objectives
sombat nirund
 
Cisco Phy Sec Overview Netversant
Cisco Phy Sec Overview   NetversantCisco Phy Sec Overview   Netversant
Cisco Phy Sec Overview Netversant
JayCase
 

Ähnlich wie Step Into Security Webinar - Physical Security Integration & Access Control - Part One - Concepts & Components (20)

Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
 
AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011
 
02 ibm security for smart grids
02 ibm security for smart grids02 ibm security for smart grids
02 ibm security for smart grids
 
Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013
 
Securing control systems v0.4
Securing control systems v0.4Securing control systems v0.4
Securing control systems v0.4
 
CompTIA Security+ Objectives
CompTIA Security+ ObjectivesCompTIA Security+ Objectives
CompTIA Security+ Objectives
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solution
 
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint WebinarCisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
 
Company Profile
Company ProfileCompany Profile
Company Profile
 
Power System Cybersecurity: Barriers and Challenges
Power System Cybersecurity: Barriers and Challenges Power System Cybersecurity: Barriers and Challenges
Power System Cybersecurity: Barriers and Challenges
 
Hacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWHacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOW
 
Cyber securityppt
Cyber securitypptCyber securityppt
Cyber securityppt
 
Access-Control-101-Book.pdf
Access-Control-101-Book.pdfAccess-Control-101-Book.pdf
Access-Control-101-Book.pdf
 
PLN9 Surveillance
PLN9 SurveillancePLN9 Surveillance
PLN9 Surveillance
 
Endpoint Security for Mobile Devices
Endpoint Security for Mobile DevicesEndpoint Security for Mobile Devices
Endpoint Security for Mobile Devices
 
Cisco Phy Sec Overview Netversant
Cisco Phy Sec Overview   NetversantCisco Phy Sec Overview   Netversant
Cisco Phy Sec Overview Netversant
 
Yared Hankins Wireless Key
Yared Hankins Wireless KeyYared Hankins Wireless Key
Yared Hankins Wireless Key
 

Mehr von Keith Harris

Mehr von Keith Harris (6)

Step Into Security Webinar - Threat Assessments for K-12 & University Campuses
Step Into Security Webinar - Threat Assessments for K-12 & University CampusesStep Into Security Webinar - Threat Assessments for K-12 & University Campuses
Step Into Security Webinar - Threat Assessments for K-12 & University Campuses
 
Step Into Security Webinar - Securing Campuses for the New School Year
Step Into Security Webinar - Securing Campuses for the New School Year Step Into Security Webinar - Securing Campuses for the New School Year
Step Into Security Webinar - Securing Campuses for the New School Year
 
Step Into Security Webinar - Threat Assessments in Schools
Step Into Security Webinar - Threat Assessments in SchoolsStep Into Security Webinar - Threat Assessments in Schools
Step Into Security Webinar - Threat Assessments in Schools
 
Step Into Security Webinar – Best Practices for Bomb Threat Response at Schools
Step Into Security Webinar – Best Practices for Bomb Threat Response at SchoolsStep Into Security Webinar – Best Practices for Bomb Threat Response at Schools
Step Into Security Webinar – Best Practices for Bomb Threat Response at Schools
 
Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus
Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus
Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus
 
Step Into Security Webinar - School Emergency Response Plans & The Active Sho...
Step Into Security Webinar - School Emergency Response Plans & The Active Sho...Step Into Security Webinar - School Emergency Response Plans & The Active Sho...
Step Into Security Webinar - School Emergency Response Plans & The Active Sho...
 

Kürzlich hochgeladen

Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...
Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...
Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...
amitlee9823
 
Kothanur Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bang...
Kothanur Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bang...Kothanur Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bang...
Kothanur Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bang...
amitlee9823
 
Escorts Service Arekere ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Arekere ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Arekere ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Arekere ☎ 7737669865☎ Book Your One night Stand (Bangalore)
amitlee9823
 
CHEAP Call Girls in Hauz Quazi (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Hauz Quazi  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Hauz Quazi  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Hauz Quazi (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
CHEAP Call Girls in Ashok Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Ashok Nagar  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Ashok Nagar  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Ashok Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
tufbav
 
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
ehyxf
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
CHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
drmarathore
 

Kürzlich hochgeladen (20)

Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...
Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...
Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...
 
Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...
Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...
Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...
 
Kothanur Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bang...
Kothanur Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bang...Kothanur Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bang...
Kothanur Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bang...
 
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Th...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Th...Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Th...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Th...
 
Escorts Service Arekere ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Arekere ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Arekere ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Arekere ☎ 7737669865☎ Book Your One night Stand (Bangalore)
 
CHEAP Call Girls in Hauz Quazi (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Hauz Quazi  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Hauz Quazi  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Hauz Quazi (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Develop Keyboard Skill.pptx er power point
Develop Keyboard Skill.pptx er power pointDevelop Keyboard Skill.pptx er power point
Develop Keyboard Skill.pptx er power point
 
NO1 Verified Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi A...
NO1 Verified Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi A...NO1 Verified Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi A...
NO1 Verified Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi A...
 
Top Rated Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
 
CHEAP Call Girls in Ashok Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Ashok Nagar  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Ashok Nagar  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Ashok Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
 
Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...
Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...
Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...
 
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
 
Call Girls Pimple Saudagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Pimple Saudagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Pimple Saudagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Pimple Saudagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...
 
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝
 
(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)
(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)
(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)
 
CHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
 

Step Into Security Webinar - Physical Security Integration & Access Control - Part One - Concepts & Components

  • 1. Physical Security Integration & Access Control --- Part 1: Concepts & Components
  • 3. Webinar Sponsor Based in Houston, TX Since 1998 IP Video Management System Design Installation Project Management LENSEC is committed to empowering our clients and partners to prevent or mitigate physical security risks. We want to help protect people and assets as well as improve operations through our evolutionary and intuitive technology. We can do this by providing expertise in security and software development. Our Mission
  • 4. Webinar Logistics Q&A at the end Questions for the panelist Audio from attendees muted Poll questions Survey
  • 5. Keith Harris Marketing Manager LENSEC Today’s Panelist Expertise in Photography & Video Production Experience in Physical Security Market Trainer for Surveillance & Physical Security Techniques
  • 6. Training Goal Physical Security Integration & Access Control Part 1: Concepts & Components Topics for Webinar: Access Control Deployment Building & Fire Codes Security Integration Choosing Components
  • 7. Preventive Control – keeps undesirable events from happening Detective Control – identifies undesirable events that have occurred Corrective Control – corrects undesirable events that have occurred Deterrent Control – discourages security violations from taking place Recovery Control – restores resources & capabilities after an event Access Control Categories & Concepts Physical Security Integration & Access Control
  • 8. Layers of Protection Unifying Your Security Platform Cross Functional Basic Functions - YES Advanced Features – Maybe Not Security Integration Physical Security Integration & Access Control
  • 10. Exterior Parking Lots Perimeter Warehouse Access Control Environment Physical Security Integration & Access Control
  • 11. Poll Question Poll Question #1 What is the primary concern when regulating access control?
  • 12. Building & Fire Codes Passive vs. Active Security Systems Primary Directive Rules & Standards Physical Security Integration & Access Control
  • 13. Building & Fire Codes NFPA – National Fire Protection Association NFPA101 – Life Safety Code NFPA72 – Primarily Covers Fire Alarms IBC – International Building Code Rules & Standards Physical Security Integration & Access Control National Fire Protection Assoc. Codes & Standards: http://www.nfpa.org/codes-and-standards/document-information-pages International Building Code: http://www.iccsafe.org/codes-tech-support/codes/2015-i-codes/ibc/
  • 14. AHJ – Authority Having Jurisdiction Rules & Standards Physical Security Integration & Access Control
  • 15. AHJ – Authority Having Jurisdiction Fire Marshal Building Inspector Health Department Engineers/Architects Senior Executives Utility Companies Insurance Companies Rules & Standards Physical Security Integration & Access Control
  • 16. Legacy BOCA Americans with Disabilities Act (ADA) UL 294 Rules & Standards Physical Security Integration & Access Control
  • 17. Zero Downtime High Availability Five Nines Rules & Standards Physical Security Integration & Access Control Nines Availability Downtime 1 90% 36.5 days/year 2 99% 3.65 days/year 3 99.9% 8.76 hours/year 4 99.99% 52 minutes/year 5 99.999% 5.25 minutes/year Five Nines Of High Availability 
  • 18. 24/7 Operation Alarm Monitoring System Live Video Monitoring Video Verification Intrusion Detection & Fire Alarms Access Control Equipment Access Control System Physical Security Integration & Access Control
  • 19. Poll Question Poll Question #2 To which side of the door are Fail Safe & Fail Secure relevant?
  • 20. Access Control System Physical Security Integration & Access Control Fail Safe – Locks are Released Fail Secure – Locks are Secured Applies to Entry Control Only Manual Egress Allowed Mechanical Override Key Stairwell Doors Fire Doors
  • 21. Door Types Mounting Positions Door Movement Mounting Convenience Access Control System Physical Security Integration & Access Control
  • 22. Choosing Locks Cylindrical Lock Mortise Lock Surface Lock Deadbolt Lock Deadlatch Locks Access Control Components Physical Security Integration & Access Control Cylindrical Lock Mortise Lock Surface LockDeadbolt LockDeadlatch Lock
  • 23. Maglocks Power Fail Safe by Default Bond Rating Door Orientation Out Swinging Door In Swinging Door (Z bracket) Double Door Maglocks Access Control Components Physical Security Integration & Access Control Maglock Armature & Magnet Z Bracket Double Maglock
  • 24. Door Strikes Keeper Fail Safe/Fail Secure Switch Low Voltage: AC/DC Mortise Strike Surface Strike Latch Protector Access Control Components Physical Security Integration & Access Control Mortise Strike Surface Strike Latch Protector
  • 25. Wireless Locks Integrated Locks Wireless Card Reader Interface Proprietary Wireless Frequency Wi-Fi Locks Access Control Components Physical Security Integration & Access Control
  • 26. Other Lock Types Electronic Lockset Electronic Bolt Access Control Components Physical Security Integration & Access Control Electronic Lockset Electronic Bolt
  • 27. Exit Devices Request To Exit Crash Bar PIR-RTE Push Button Access Control Components Physical Security Integration & Access Control
  • 28. Credentials Form Badge, Fob, Etc. Type Prox iClass Protocol HID Global NXP Semiconductor Access Control Components Physical Security Integration & Access Control Keyfob Badge Clamshell
  • 29. Authorization Interface Card Reader Ingress/Egress Access Control Components Physical Security Integration & Access Control
  • 30. Authorization Interface Card Readers Wiegand Protocol OSDP Protocol Credentials Standard Proximity Smartcards Barcode/Magstripe Gesture Sensitive Access Control Components Physical Security Integration & Access Control
  • 31. Authorization Interface Keypad Oldest & Most Common Diminished Security Password Protection Shoulder Surfing Access Control Components Physical Security Integration & Access Control
  • 32. Authorization Interface Biometrics Fingerprint Hand Geometry Retinal Scan Iris Scan Facial Recognition Access Control Components Physical Security Integration & Access Control
  • 33. Authorization Factors Visual Verification Multifactor Credentials Possession: Something You Have Knowledge: Something You Know Characteristic: Something You Are Trusted Verification: Someone Trusted Verifies You Access Control Concepts Physical Security Integration & Access Control
  • 34. Authorization Factors Multifactor Credentials 2 Factors – Keyfob & PIN 3 Factors – Keyfob, PIN & Fingerprint 4 Factors – Keyfob, PIN, Fingerprint & Manned Checkpoint Access Control Concepts Physical Security Integration & Access Control
  • 35. Door Controllers Bridge the Gap CAN Controllers Standalone Controllers Integrated Controllers Access Control Components Physical Security Integration & Access Control
  • 36. Transmission & Networks IP-Based Transmission Power over Ethernet (PoE) 802.3af – 15.4W power 802.3at – 25.5W power Access Control Components Physical Security Integration & Access Control
  • 37. Physical Security Integration & Access Control
  • 38. Transmission & Networks Hardwired / Serial Connected Cable Systems 6 Conductor Cable 4 Conductor Cable / 8 Conductor Cable 2 Conductor Cable Drain Wire Access Control Components Physical Security Integration & Access Control
  • 40. Contacts David Martin LENSEC (512) 318-3829 dmartin@lensec.com Keith Harris LENSEC (512) 913-3907 kharris@lensec.com
  • 42. SIS5-16 Webinar – Physical Security Integration & Access Control Part One: Concepts & Components Questions & Answers Poll Question #1 What is the primary concern when regulating access control? 1. Integrating many different building systems 2. Carefully reading the specifications 3. Life safety 4. Knowing who has jurisdiction for code enforcement Poll Question #2 To which side of the door are Fail Safe & Fail Secure relevant? 1. The entry side of the door 2. The exit side of the door 3. Both sides of the door 4. Neither side of the door Which version of the building and fire codes should I follow? That is not always an easy answer. The right thing to do is follow the version of the code that the AHJ follows. This could vary among entities. The most recent version of the NFPA 101 Life Safety Code is 2015, though many jurisdictions are still working off of 2012 rules or earlier. The AHJ has the authority to adopt the code. So, when in doubt, check with the AHJ for clarification. When using a Fail Safe lock, the door becomes unlocked when there is a power failure. How does the owner prevent a security risk? I’ve seen that as a concern before. You can’t auto lock the doors in those situations because that defeats the purpose of life safety. You can provide a mechanical lock and have security or a designated person go and manually lock the doors after an inspection of the building. However, the mechanical lock should be used on a regular basis since free egress should be maintained. Fail Secure hardware locations might require a Mechanical Override Key to manually lock doors for building security when the power is down. Proper use dictates that these keys are only used on an emergency basis and held by a limited number of key holders.
  • 43. How does access control work with building systems like the fire alarm? A fire alarm pull is not an exit device, but it works like one – sort of. The fire alarm is configured to drop lock power when the fire pull is activated. Maglocks and access control systems have contacts to tie into the fire alarm. AHJs may require proof of successful access control override by the fire pulls. When you’re choosing a wireless or WiFi lockset, do each have to be within range of the access point? Range is a consideration. Each location should be tested to make sure it is in range of the network access point. Some of these locks are designed with a MIMO style network for lock communications. This would require a system hub to located within range of every lock. A single system hub might manage 12 or more doors within its range. Are there other types of Request To Exit devices for uncommon installation circumstances? A less common device is an RTE Pressure Pad placed in front of a door to break power when a person stand on it. These work best when installed under carpets or flooring, though this might complicate maintenance. Pressure Pads might be used in areas where hand contact with the door or PIRs are not permitted, such as a clean room or explosive areas.