Securing Access Control Installations Tutorial

By: Brian Rhodes, Published on Oct 17, 2019

The physical security of access control components is critical to ensuring that a facility is truly secure. Otherwise, the entire system can be circumvented or shut down by an adversary.

** **** *****, ** done *********, ****** ****** of ******** *** ********** access ********** **** ********** cost. **** *** ****'* 5 *********** ***** *** options:

  • ******* *********** ** ****** Side ** ********
  • **** ***** ******* & Server ***** ******
  • **** ********** & ******
  • *** ****** ******* & Alarms
  • ********* ************ *******

*******, *** **** ** the *** **** **** your *********.

Install *********** ** ****** **** ** ********

*** '****** **********' **** of *** ******* ** typically *** ****** **** unless ******* **** ******* or ***** ************ ***** one ** ****** ** lock ****** **.

**** * **** ** access **********, *** ****** is ** **** ***** unapproved ** ***** ** the '********* ****' ** occupants *** ****, **** called *** '*******' ****. While *** ***** ***** of ***** ***** *******, most ************ *** '****** the ****** ****' ** be *** ******* ****.

*** ***** **** ******* ***** ***************** *** ********** ** Secure ** ******* **** of *****:

******** ********* ******* ********* on *** ********* **** leaves ** * ****** to ***** ********** ** force *****.

******* *** ********* **** is *** **********, ***** should ** ***** ** mitigate *** **** ** exploiting ** ******** ****** control *******. * *********** step ** ** ******* as **** ** *** access ******* ******** (***********, power ********, *******) ** the **** ** ******* side.

***** **** *** **** to ** * *** of ****** *****, ** is ******** **********. **** this *******:

**** ***** ***** *** 'unsecured' **** ** *** door, **** *** ****** reader *** ******* **** facing ******* *** ****** door. *******, *** ********** has ******* *** ******** door ********** ** ***** sight ***** *** ******* on *** ****** ****.

*******, ******* ******** *** tampering ** ****** ********* by ******** ****** ******** on *** ******* **** of *** *******. ********* the ******** ** *** same **** *** **** expensive *** *********** ********** devices ** * ***** area.

**** ***** ***** ******* on *** ******* ****, mounting ******** ** * discrete ******** ** *******. Simply ******** ******* ** the **** ***** *** opening ***** ******* ***** puts ****** ******* ********* out ** *****, *** of *****,*** *** ** **** for ********* *******:

**** ** ***** ** access *******, *** **** of *** ******* *****/******* cabling ****** ** ******* during ******.

**** **** **** *********** or ********* ******* *** at ****. **** *** example ***** *****, ** a ******* ******** ** outside ******** ****:

** ***** ** ****** the ******* ********, **** the ******* ***** ***** to ** ***. ** note *** ****** ****** to *** ***** ***** in ********** ********* *****,***** ********** **** ******** need ** ******** *******.

Keep ***** ******* & ****** ***** ******

*********** ****** ******* ******* use ******* ***** ** servers ** ********** ********, and **** '****' ***** of ******* ********* *** centralized ******* *******.

** ** ******** ******** policy ********* ******** ***** locations ** **** ****** and ****** ** ****** few, ** *********, ***** doors *** ******** ********** by *** **** ****** system **** *** **********:

*** ***** *****, *** server *****, ***** ******* or ******* ** ************, despite ***** ******. **** and ***** *** ** shared, *** ******** ***, over **** ******* ***** areas ************ ** **** loosely *********.

********, ******* ***************** ******* ****** *** Schedules*** ***** ******* & Server ***** ***** ************ employees **** ******** ********* areas **** ****** ***** if **** ***** ******* a ****.

***** **** ***** ** not ********* *** **** of ****** **** ******* closets ** *** ******** access ******* ******, ******** that **** '*****' ******* should ** ****** ** well. **** *** **** or **** ** ****** access ******* ** **** to *******, * ****-******* system ** ********** ***** and ****, ** **** a '*****-*****' ********** **** keeps *** **** ** bay.

Lock *** ****** & **********

**** **** **** ****** locked *******, ***** ***** often *** ****** **** other ***** ** ********** systems **** ********, *******, or **** ********** *****. While ********** ** ****** may ** ****** **** for *** ******* ******, there *** ***** ** the **** ** ************ individuals ********* **** *******.

**** ********** ****** ******* include ******** **********, **** the **** ***** *****:

***** ********* '***' ******** a ***** **** ** kept ****** ** *** times. **** ***** **** ensures **** *********** ********* is *******, *** ****** keeping *********** ****** **** and ******* ******** *** keys ** * *******, low-cost ****.

Use ****** ******* & ******

**** ******* *** ****** include * '****** ******' that *********** ******* **** a ****** *** **** knocked *** * ******** point ** * ***** has **** ******. *************, these ******** *** ***** left *********** ** ************ to **** ******, ***** they ** *** ********* a **** ******* ** the ******.

*******, *********** *** ******* locks *** ** ******* or *********** ******* *** the ****, ******* *****. Properly ********** ****** ******** can ****** *********** ** seconds **** ********* ******, rather **** ***** ********** hours ***** *** ****.

**** ******* ******* ******** tamper ******* ** ********, and *********** **** *** use ***** ******* - another ***********, *** ******** method ** ********** ****** integrity:

Integrate ************ *******

*******, ******* *** **** expensive ****** *** **** provide ******* ********** *** immediate ********: *********** ***** and ****** ********. **** cameras *** ******* **** access-controlled ********, ********* ********* or ************ ***** ******** are ****** ** ******.

********** **** *** ********'* surveillance ****** ** ******** monitored, ***** ******** *** stop ****** ** ********* before ** ******.

*******, ***** **** *********, the **** ** *********** the *** ******* ******** can ** ********** ********* (several ******* ******* *** door) *** ******* ********** cameras ** *** ******* installed. ** **** *****, the *********** ******* *** two ******* **** ** used *** **** **** just ********** ********* ** threats, *** ********* *** the ************ ** ***** passing ******* *** *****:

Use ****

***** *** * ******** security ************* **** ******* enclosures ** ****** ********, OSDP ******** *** ****** bus ** *********** *** connection ******* *** ********** and ********** ******.

****** *******, ***** ** unidirectional *** ****** **** from ****** ** ********** only, **** ** ************* and *** ***** ****** users ** ******* ********** separates *** ****** **** the ******.

*** **** ** ****, catch ******* ****** ******* *****.

Quiz ********

**** *********** ****** ******* *******.

Comments (10)

* ***** *** ** the ***** ****** ************** and **** **** ** to * ** ****** central *******. ***** ****** alarms **** **** ** the ****** ******* ** can ** ****** **********. If **** ** ** a ******* ******* *** will *** * ****** notification *** ******** *********.

** **** ******** ****** send ******* ******** *** can *** ****** */** to ******* *** ********* tamper ****** ** ******* an ********* ***** ****.

* ********* ****** */** because *** *** *** the ******* ****** ******* panel ** *** ***** panel *** *** *******. Also *** *** ***** the ******* *** *** one ***** ****. ** get ******* *** ***** use *** ****** ******* UI. **** **** **** hardware ***** *** ** you *** ********** *** you **** ** ** is *** *** ****** to *** ***** *** you *** ****.

(******....*** *** ****** */** are ******* *****....***** **** manufacturer...)

* ***** ****** *** all ****** ******** *** created *****. ** ** experience *** ***** *** tamper ***** **** **** a ***** ****** ****** do ** * ****** manufactured ****** ****** ** a ******* *** **** gets ****** **** ****.

* **** **** *** done ******** ** **, but ** *** ****/**** prox ******* *** ***********. That ** *** ********** that *** ** ******, duplicated, *** ****** ******. Use ** ***** ******.

*** *** ***** ** until ***’** **** ** the ****, *** **** will ***** ** **** and ********* ******* ***** are ** **** ********* living ** *** ****.

******* * **** ** in *** ****** ****. Perhaps ************* ****** ****** and ** *********** ** not ************ ** *** insecurities. **** ****** **** stopped ******* ** ****** ago ** ** ***** suggested ****** *** ******* after * ******* **** it **** ** ****** be ****/*********.

** ******** ** * part ** ********** * hospital *** * ***** company ******** ** **** knowledge ** ****** ******* by ******* *** ******** the ****** *** *** very ******* ** ** considering * **** ***** yet ** ***** *** access ******* ******. * don’t ***** ** ** an ****** ** *** access ******* *****. * just ****** ** ** able ** **** *** can ******** * ********** on ****.

* ******* *** **** thing ***** ************* ** longer ****** *** *** prox *********** *** **** you *** *** *** big **** ** **** but * ***'* ***** you ***** **** *** the ***** ***** **** in ***** *** **** on ****** ** **** go ****.

*** *** ***** ****** at **** ***** ** has ** ****.

** *** ***** ****** control ********* ***** **** programmed **** ***** ****** if * ****** **** was **** **** **** might **** ** ******** customers ** ***** ********* away *******. **** * card ** ****** ***** is ***** *********** *** onto *** ****. * know *** **** **** but *** **** ** others ** ** ***. Of ****** ***** *** also ** * *** for **** ** ** overcome **** *** ****** as ****.

**** ****.

***** ******* *****. *** note *** ***** ******* if *** **** *** the *********** ***** *** ceiling, ***** * ***'* like ** ** *** sometimes *** ***'* **** a ******, **** **** the ******** ******** ** somewhere *** **** ** able ** ******* *** equipment ** * ***** date. ******** ***** *** door **** ****** ***** for ******* *** ***** makes ** * **** as ****** **** ****** want ** **** ******* the ******* **** ** there ** * **** two **** ****.

**** ******* ******* ** the ********* ** ******* above *** ******* *** that ******** ***** ** though ******* **** **** be *** ***** *** equipment *** ******'* *** says ********* *** **** will *** ** **** 1000 ** ******** *** can't **** ** ****** the ******* **** *** then *** ***'* ***** your ********* ** *** desk ******* ** *** out.

** * ****** *** to *** **********, **** imagine **** *** **** to **** **** *** service **** **** ***. You **** **** ********* this ********* ** ** as ******* **** ** possible.

* ***** ******* *** installing **** **** ***’* listed *** ****** *** in * ****** ******* above *** *****. **** though **’* *****, **** inspectors *** * ****** picky.

**** *****!

* ****** ***** ***** panels **** ***** *** tampers, *** * ****** quote **********, *****, *** tampers **** ******* **** expansion ******* **** *** easily *** **** * panel *********. *'* ****** surprised ** *** **** people ****** ***** ****.

**** ** ***** ** access *******, *** **** of *** ******* *****/******* cabling ****** ** ******* during ******.

**** ** *** **** true ** *** **** but **** ** *** data ******. ** **** times *'** **** **** plugged ** ** * nearby ****** ****** **** having *** ***** ****-**** piped **** *** *********. A ******* ****** ***** might **** ** **** case *** *** ***** can ***** ** *** (might ****** * ***).

Read this IPVM report for free.

This article is part of IPVM's 6,367 reports, 855 tests and is only available to members. To get a one-time preview of our work, enter your work email to access the full article.

Already a member? Login here | Join now

Related Reports

Breaking Into A Facility Using Canned Air Tested on Jan 28, 2020
Access control is supposed to make doors more secure, but a $5 can of compressed air may defeat it. With no special training, intruders can...
Propped Doors Access Control Tutorial on Jan 07, 2020
Doors should keep 'bad guys' out, but a common access control problem is people propping doors open, preventing them from being secure. Even...
Glass Doors and Access Control Tutorial on Nov 21, 2019
One of the biggest access challenges are locking and securing glass doors. Unlike wood or steel doors that can be modified to work with...
Fail Safe vs. Fail Secure Tutorial on Oct 02, 2019
Few terms carry greater importance in access control than 'fail safe' and 'fail secure'. Access control professionals must know how these...
ZK Teco Atlas Access Control Tested on Aug 20, 2019
Who needs access specialists? China-based ZKTeco claims its newest access panel 'makes it very easy for anyone to learn and install access control...
Access Control Request to Exit (RTE) Tutorial on May 13, 2019
For access controlled doors, especially those with maglocks, 'Request to Exit', or 'RTE' devices are required to override electrified locks to...
Locking Down Network Connections Guide on Apr 23, 2019
Accidents and inside attacks are risks when network connections are not locked down. Security and video surveillance systems should be protected...
Cybersecurity for IP Video Surveillance Guide on May 18, 2018
Keeping surveillance networks secure can be a daunting task, but there are several methods that can greatly reduce risk, especially when used in...
Forced Entry / Duress Access Tutorial on May 17, 2018
Even though access control normally keeps people safe, tragedies have revealed a significant issue. If users are forced to unlock doors for...
Safes And Vaults Alarm Sensors on Jul 07, 2017
Vaults and safes are designed to protect valuables by enclosing them in steel or concrete boxes with thick doors and strong locks. However, any...

Most Recent Industry Reports

Hikvision Illicitly Uses Back To The Future In Marketing on Jul 03, 2020
NBCUniversal told IPVM that Hikvision UK's ongoing coronavirus marketing campaign using NBCUniversal's assets was not allowed. Hikvision mass...
Verkada: "IPVM Should Never Be Your Source of News" on Jul 02, 2020
Verkada was unhappy with IPVM's recent coverage declaring that reading IPVM is 'not a good look' and that 'IPVM should never be your source of...
Vintra Presents FulcrumAI Face Recognition on Jul 02, 2020
Vintra presented its FulcrumAI face recognition and mask detection offering at the May 2020 IPVM Startups show. Inside this report: A...
Uniview Wrist Temperature Reader Tested on Jul 02, 2020
Uniview is promoting measuring wrist temperatures whereas most others are just offering forehead or inner canthus measurements. But how well does...
Dahua USA Admits Thermal Solutions "Qualify As Medical Devices" on Jul 02, 2020
Dahua USA has issued a press release admitting a controversial point in the industry but an obvious one to the US FDA, that the thermal temperature...
Access Control Online Show - July 2020 - With 40+ Manufacturers - Register Now on Jul 01, 2020
IPVM is excited to announce our July 2020 Access Control Show. With 40+ companies presenting across 4 days, this is a unique opportunity to hear...
Hanwha Face Mask Detection Tested on Jul 01, 2020
Face mask detection or, more specifically lack-of-face-mask detection, is an expanding offering in the midst of coronavirus. Hanwha in partnership...
UK Government Says Fever Cameras "Unsuitable" on Jul 01, 2020
The UK government's medical device regulator, MHRA, told IPVM that fever-seeking thermal cameras are "unsuitable for this purpose" and recommends...
Camera Course Summer 2020 on Jun 30, 2020
This is the only independent surveillance camera course, based on in-depth product and technology testing. Lots of manufacturer training...
Worst Over But Integrators Still Dealing With Coronavirus Problems (June Statistics) on Jun 30, 2020
While numbers of integrators very impacted by Coronavirus continue to drop, most are still moderately dealing with the pandemic's problems, June...