Securing Access Control Installations Tutorial

By: Brian Rhodes, Published on Oct 17, 2019

The physical security of access control components is critical to ensuring that a facility is truly secure. Otherwise, the entire system can be circumvented or shut down by an adversary.

** **** *****, ** done *********, ****** ****** of ******** *** ********** access ********** **** ********** cost. **** *** ****'* 5 *********** ***** *** options:

  • ******* *********** ** ****** Side ** ********
  • **** ***** ******* & Server ***** ******
  • **** ********** & ******
  • *** ****** ******* & Alarms
  • ********* ************ *******

*******, *** **** ** the *** **** **** your *********.

Install *********** ** ****** **** ** ********

*** '****** **********' **** of *** ******* ** typically *** ****** **** unless ******* **** ******* or ***** ************ ***** one ** ****** ** lock ****** **.

**** * **** ** access **********, *** ****** is ** **** ***** unapproved ** ***** ** the '********* ****' ** occupants *** ****, **** called *** '*******' ****. While *** ***** ***** of ***** ***** *******, most ************ *** '****** the ****** ****' ** be *** ******* ****.

*** ***** **** ******* ***** ***************** *** ********** ** Secure ** ******* **** of *****:

******** ********* ******* ********* on *** ********* **** leaves ** * ****** to ***** ********** ** force *****.

******* *** ********* **** is *** **********, ***** should ** ***** ** mitigate *** **** ** exploiting ** ******** ****** control *******. * *********** step ** ** ******* as **** ** *** access ******* ******** (***********, power ********, *******) ** the **** ** ******* side.

***** **** *** **** to ** * *** of ****** *****, ** is ******** **********. **** this *******:

**** ***** ***** *** 'unsecured' **** ** *** door, **** *** ****** reader *** ******* **** facing ******* *** ****** door. *******, *** ********** has ******* *** ******** door ********** ** ***** sight ***** *** ******* on *** ****** ****.

*******, ******* ******** *** tampering ** ****** ********* by ******** ****** ******** on *** ******* **** of *** *******. ********* the ******** ** *** same **** *** **** expensive *** *********** ********** devices ** * ***** area.

**** ***** ***** ******* on *** ******* ****, mounting ******** ** * discrete ******** ** *******. Simply ******** ******* ** the **** ***** *** opening ***** ******* ***** puts ****** ******* ********* out ** *****, *** of *****,*** *** ** **** for ********* *******:

**** ** ***** ** access *******, *** **** of *** ******* *****/******* cabling ****** ** ******* during ******.

**** **** **** *********** or ********* ******* *** at ****. **** *** example ***** *****, ** a ******* ******** ** outside ******** ****:

** ***** ** ****** the ******* ********, **** the ******* ***** ***** to ** ***. ** note *** ****** ****** to *** ***** ***** in ********** ********* *****,***** ********** **** ******** need ** ******** *******.

Keep ***** ******* & ****** ***** ******

*********** ****** ******* ******* use ******* ***** ** servers ** ********** ********, and **** '****' ***** of ******* ********* *** centralized ******* *******.

** ** ******** ******** policy ********* ******** ***** locations ** **** ****** and ****** ** ****** few, ** *********, ***** doors *** ******** ********** by *** **** ****** system **** *** **********:

*** ***** *****, *** server *****, ***** ******* or ******* ** ************, despite ***** ******. **** and ***** *** ** shared, *** ******** ***, over **** ******* ***** areas ************ ** **** loosely *********.

********, ******* ***************** ******* ****** *** Schedules*** ***** ******* & Server ***** ***** ************ employees **** ******** ********* areas **** ****** ***** if **** ***** ******* a ****.

***** **** ***** ** not ********* *** **** of ****** **** ******* closets ** *** ******** access ******* ******, ******** that **** '*****' ******* should ** ****** ** well. **** *** **** or **** ** ****** access ******* ** **** to *******, * ****-******* system ** ********** ***** and ****, ** **** a '*****-*****' ********** **** keeps *** **** ** bay.

Lock *** ****** & **********

**** **** **** ****** locked *******, ***** ***** often *** ****** **** other ***** ** ********** systems **** ********, *******, or **** ********** *****. While ********** ** ****** may ** ****** **** for *** ******* ******, there *** ***** ** the **** ** ************ individuals ********* **** *******.

**** ********** ****** ******* include ******** **********, **** the **** ***** *****:

***** ********* '***' ******** a ***** **** ** kept ****** ** *** times. **** ***** **** ensures **** *********** ********* is *******, *** ****** keeping *********** ****** **** and ******* ******** *** keys ** * *******, low-cost ****.

Use ****** ******* & ******

**** ******* *** ****** include * '****** ******' that *********** ******* **** a ****** *** **** knocked *** * ******** point ** * ***** has **** ******. *************, these ******** *** ***** left *********** ** ************ to **** ******, ***** they ** *** ********* a **** ******* ** the ******.

*******, *********** *** ******* locks *** ** ******* or *********** ******* *** the ****, ******* *****. Properly ********** ****** ******** can ****** *********** ** seconds **** ********* ******, rather **** ***** ********** hours ***** *** ****.

**** ******* ******* ******** tamper ******* ** ********, and *********** **** *** use ***** ******* - another ***********, *** ******** method ** ********** ****** integrity:

Integrate ************ *******

*******, ******* *** **** expensive ****** *** **** provide ******* ********** *** immediate ********: *********** ***** and ****** ********. **** cameras *** ******* **** access-controlled ********, ********* ********* or ************ ***** ******** are ****** ** ******.

********** **** *** ********'* surveillance ****** ** ******** monitored, ***** ******** *** stop ****** ** ********* before ** ******.

*******, ***** **** *********, the **** ** *********** the *** ******* ******** can ** ********** ********* (several ******* ******* *** door) *** ******* ********** cameras ** *** ******* installed. ** **** *****, the *********** ******* *** two ******* **** ** used *** **** **** just ********** ********* ** threats, *** ********* *** the ************ ** ***** passing ******* *** *****:

Use ****

***** *** * ******** security ************* **** ******* enclosures ** ****** ********, OSDP ******** *** ****** bus ** *********** *** connection ******* *** ********** and ********** ******.

****** *******, ***** ** unidirectional *** ****** **** from ****** ** ********** only, **** ** ************* and *** ***** ****** users ** ******* ********** separates *** ****** **** the ******.

*** **** ** ****, catch ******* ****** ******* *****.

Quiz ********

**** *********** ****** ******* *******.

Comments (10)

* ***** *** ** the ***** ****** ************** and **** **** ** to * ** ****** central *******. ***** ****** alarms **** **** ** the ****** ******* ** can ** ****** **********. If **** ** ** a ******* ******* *** will *** * ****** notification *** ******** *********.

** **** ******** ****** send ******* ******** *** can *** ****** */** to ******* *** ********* tamper ****** ** ******* an ********* ***** ****.

* ********* ****** */** because *** *** *** the ******* ****** ******* panel ** *** ***** panel *** *** *******. Also *** *** ***** the ******* *** *** one ***** ****. ** get ******* *** ***** use *** ****** ******* UI. **** **** **** hardware ***** *** ** you *** ********** *** you **** ** ** is *** *** ****** to *** ***** *** you *** ****.

(******....*** *** ****** */** are ******* *****....***** **** manufacturer...)

* ***** ****** *** all ****** ******** *** created *****. ** ** experience *** ***** *** tamper ***** **** **** a ***** ****** ****** do ** * ****** manufactured ****** ****** ** a ******* *** **** gets ****** **** ****.

* **** **** *** done ******** ** **, but ** *** ****/**** prox ******* *** ***********. That ** *** ********** that *** ** ******, duplicated, *** ****** ******. Use ** ***** ******.

*** *** ***** ** until ***’** **** ** the ****, *** **** will ***** ** **** and ********* ******* ***** are ** **** ********* living ** *** ****.

******* * **** ** in *** ****** ****. Perhaps ************* ****** ****** and ** *********** ** not ************ ** *** insecurities. **** ****** **** stopped ******* ** ****** ago ** ** ***** suggested ****** *** ******* after * ******* **** it **** ** ****** be ****/*********.

** ******** ** * part ** ********** * hospital *** * ***** company ******** ** **** knowledge ** ****** ******* by ******* *** ******** the ****** *** *** very ******* ** ** considering * **** ***** yet ** ***** *** access ******* ******. * don’t ***** ** ** an ****** ** *** access ******* *****. * just ****** ** ** able ** **** *** can ******** * ********** on ****.

* ******* *** **** thing ***** ************* ** longer ****** *** *** prox *********** *** **** you *** *** *** big **** ** **** but * ***'* ***** you ***** **** *** the ***** ***** **** in ***** *** **** on ****** ** **** go ****.

*** *** ***** ****** at **** ***** ** has ** ****.

** *** ***** ****** control ********* ***** **** programmed **** ***** ****** if * ****** **** was **** **** **** might **** ** ******** customers ** ***** ********* away *******. **** * card ** ****** ***** is ***** *********** *** onto *** ****. * know *** **** **** but *** **** ** others ** ** ***. Of ****** ***** *** also ** * *** for **** ** ** overcome **** *** ****** as ****.

**** ****.

***** ******* *****. *** note *** ***** ******* if *** **** *** the *********** ***** *** ceiling, ***** * ***'* like ** ** *** sometimes *** ***'* **** a ******, **** **** the ******** ******** ** somewhere *** **** ** able ** ******* *** equipment ** * ***** date. ******** ***** *** door **** ****** ***** for ******* *** ***** makes ** * **** as ****** **** ****** want ** **** ******* the ******* **** ** there ** * **** two **** ****.

**** ******* ******* ** the ********* ** ******* above *** ******* *** that ******** ***** ** though ******* **** **** be *** ***** *** equipment *** ******'* *** says ********* *** **** will *** ** **** 1000 ** ******** *** can't **** ** ****** the ******* **** *** then *** ***'* ***** your ********* ** *** desk ******* ** *** out.

** * ****** *** to *** **********, **** imagine **** *** **** to **** **** *** service **** **** ***. You **** **** ********* this ********* ** ** as ******* **** ** possible.

* ***** ******* *** installing **** **** ***’* listed *** ****** *** in * ****** ******* above *** *****. **** though **’* *****, **** inspectors *** * ****** picky.

**** *****!

* ****** ***** ***** panels **** ***** *** tampers, *** * ****** quote **********, *****, *** tampers **** ******* **** expansion ******* **** *** easily *** **** * panel *********. *'* ****** surprised ** *** **** people ****** ***** ****.

**** ** ***** ** access *******, *** **** of *** ******* *****/******* cabling ****** ** ******* during ******.

**** ** *** **** true ** *** **** but **** ** *** data ******. ** **** times *'** **** **** plugged ** ** * nearby ****** ****** **** having *** ***** ****-**** piped **** *** *********. A ******* ****** ***** might **** ** **** case *** *** ***** can ***** ** *** (might ****** * ***).

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Door Operators Access Control Tutorial on Apr 17, 2019
Doors equipped with door operators, specialty devices that automate opening and closing, tend to be quite complex. The mechanisms needed to...
Access Control Turnstiles Guide on Jan 28, 2019
Turnstiles control pedestrian access to secured areas, essentially becoming moving portions of fences, walls, or barricades for physically stop...
Designing Access Control Guide on Jan 30, 2019
Designing an access control solution requires decisions on 8 fundamental questions. This in-depth guide helps you understand the options and...
Access Control Mantraps Guide on Sep 26, 2019
One of access's primary goals is keeping people out of places they should not be, but slipping through open doors (ie: Tailgating) is often...
Access Control Mustering Guide on Sep 30, 2019
In emergencies, determining where employees are located can be critical for knowing whether they are in danger. Access systems can be used for...
Lock Status Monitoring Tutorial on Oct 28, 2019
Just because access doors are closed does not mean they are locked. Unless access systems are using lock status monitoring, the doors and areas...
Tailgating: Access Control Tutorial on Oct 31, 2019
Nearly all access control systems are vulnerable to an easy exploit called 'tailgating'. Indeed, a friendly gesture in holding doors for others...
Glass Doors and Access Control Tutorial on Nov 21, 2019
One of the biggest access challenges are locking and securing glass doors. Unlike wood or steel doors that can be modified to work with...
Propped Doors Access Control Tutorial on Jan 07, 2020
Doors should keep 'bad guys' out, but a common access control problem is people propping doors open, preventing them from being secure. Even...
Low-Tech Access Control: Master Keying Explained on Jan 09, 2020
Mechanical keys are one of the most fundamental forms of access control. 'Master Keying' can allow individually different credential keys to...

Most Recent Industry Reports

Favorite Video Analytic Manufacturers 2020 on Feb 25, 2020
Video analytics is now as hot as ever, driven by the excitement of advancing deep learning offers. But what are actually integrator's...
Latest London Police Facial Recognition Suffers Serious Issues on Feb 24, 2020
On February 20, IPVM visited another live face rec deployment by London police, but this time the system was thwarted by technical problems and...
Masks Cause Major Facial Recognition Problems on Feb 24, 2020
Coronavirus is spurring an increase in the use of medical masks, which new IPVM test results show cause major problems for facial recognition...
Every VMS Will Become a VSaaS on Feb 21, 2020
VMS is ending. Soon every VMS will be a VSaaS. Competitive dynamics will be redrawn. What does this mean? VMS Historically...
Video Surveillance 101 Course - Last Chance on Feb 20, 2020
This is the last chance to join IPVM's first Video Surveillance 101 course, designed to help those new to the industry to quickly understand the...
Vulnerability Directory For Access Credentials on Feb 20, 2020
Knowing which access credentials are insecure can be difficult to see, especially because most look and feel the same. Even insecure 125 kHz...
AI/Smart Camera Tutorial on Feb 20, 2020
Cameras with video analytics, sometimes called 'Smart' camera or 'AI' cameras, etc. are one of the most promising growth areas of video...
China Manufacturer Suffers Coronavirus Scare on Feb 20, 2020
Uniview suffered a significant health scare last week after one of its employees reported a fever and initially tested positive for coronavirus....
Cheap Camera Problems at Night on Feb 19, 2020
Cheap cameras generally have problems at night, despite the common perception that integrated IR makes cameras mostly the same, according to new...