SlideShare a Scribd company logo
1
2
Access Control
2
Facility Access Control Systems
RECAP-ULANGKAJI
1. Principles in Physical Security
The principles underlying Physical Security Management are
designed to create a comprehensive and layered approach to
protect against unauthorized access, theft, damage, and other
potential harms. Here are the key principles:
 Deterrence
 Detection
 Delay
 Response & Intervention
3
Defence-in-Depth
Defence in depth is about building multiple layers
of security that will protect the organization better
than one single layer.
https://www.youtube.com/watch?v=j9MQMVn3FV4&t=86s&ab_channel=TomOlzak
4
Pertahanan secara mendalam adalah tentang membina
berbilang lapisan keselamatan yang akan melindungi
organisasi lebih baik daripada satu lapisan tunggal.
Defence-in-Depth
5
Pertahanan
Berlapis
6
Video clip: Layered Security
7
8
Contrary to PSTN, an IP PBX (Internet Protocol
Private Branch Exchange) system is a
telecommunication system that uses IP data
networks (like the internet) to manage and route
voice and video calls, in addition to other forms
of communication such as instant messaging and
A smart building, also
known as an intelligent
building or a smart
facility, is a structure that
uses advanced
technology and
integrated systems to
enhance the building's
overall functionality,
efficiency, security, and
sustainability.
The purpose of a CCTV
(Closed-Circuit Television)
system is to capture, record,
and monitor video footage in a
designated area for various
purposes such as security and
crime deterrence, surveillance,
visitor control etc ….
A Visitor
Management
System (VMS)
serves as a
comprehensive
solution to manage
and track visitors,
guests, and
personnel entering
a facility or
premises.
A security control room, often referred to
as a security operations center (SOC) or
command center, is a centralized facility
equipped with technology and staffed by
security personnel responsible for
monitoring, managing, and responding to
security-related events and incidents
within an organization or a specific area.
Access control refers to
the practice of regulating
and managing who has
permission to access
specific resources,
assets, areas, or
information within an
organization or physical
space.
Motion sensors,
also known as
motion detectors,
serve the primary
purpose of
detecting physical
movement or
motion within a
defined area.
A fire alarm system is a network of interconnected
devices and components designed to detect, notify,
and respond to the presence of a fire or smoke in a
building or area. The primary purpose of a fire alarm
system is to protect life and property by providing
early warning of a fire, allowing occupants to
evacuate safely and alerting emergency responders to
Parking zones inside facilities are
often equipped with security
features such as surveillance
cameras, adequate lighting, and
controlled access points. This
enhances the safety and security
of vehicles and their occupants,
reducing the risk of theft,
vandalism, and other security
concerns.
9
Access Control Systems
 Mechanical Locks and Keys
 Electronic Card Access Control
 Keypad Access Control
 Biometric Access Control
 Access Control Tokens
 Mobile Access Control
 Intercom Systems
 Turnstiles and Speed Gates
 Vehicle Access Control
 Wireless Access Control
 Cloud-Based Access Control
 Integrated Access Control
 Visitor Management System
10
Access control is the art and science
of regulating who can enter a specific
area, building, or facility and under
what conditions. It's the guardian at
the gate, ensuring that only
authorized individuals gain entry,
while keeping potential threats at bay.
In an era where security concerns are
ever-evolving, understanding the core
concepts of access control is not only
essential but also a cornerstone in
building a secure environment.
11
Kawalan akses ialah seni dan sains
mengawal selia orang yang boleh
memasuki kawasan, bangunan atau
kemudahan tertentu dan dalam keadaan
apa. Ia adalah penjaga di pintu pagar,
memastikan bahawa hanya individu yang
diberi kuasa boleh masuk, sambil
mengekalkan potensi ancaman.
Dalam era di mana kebimbangan
keselamatan sentiasa berkembang,
memahami konsep teras kawalan akses
bukan sahaja penting tetapi juga asas
dalam membina persekitaran yang
selamat.
12
Access control systems in physical security
encompass various methods and technologies to
regulate entry to a physical space. These systems can
be categorized into several types, including:
1.Mechanical Locks and Keys: Traditional locks and
keys are still widely used for securing doors and cabinets.
They provide a basic level of access control but lack the
advanced features and auditing capabilities of electronic
systems.
2.Electronic Card Access Control: This type of system
uses access cards (e.g., proximity cards, smart cards) to
grant or deny access. Users present their card to a reader,
which then verifies their credentials and then unlocks the
door when authorized.
13
Mechanical Locks and Keys
The primary purpose of
mechanical lock and key systems
is to provide a basic level of
security and access control by
allowing authorized individuals to
lock and unlock specific areas
while preventing unauthorized
access. Mechanical locks and
keys have been used for centuries
as a fundamental means of
securing doors, cabinets, safes,
and other physical enclosures.
Electronic Card Access Control
14
The primary purpose of electronic card
access control is to enhance security,
provide convenience, and monitor
access to controlled areas. This
technology uses electronic cards or
key fobs as access credentials to
regulate and manage entry into
secured areas, buildings, or digital
systems. These electronic cards
typically contain embedded data that is
read by card readers, allowing
authorized individuals to gain access
while denying entry to unauthorized
users.
• Keypad Access Control: Access is granted based on a
numeric code entered into a keypad. This method is often used in
conjunction with electronic locks and is suitable for low-security
areas.
• Biometric Access Control: Biometric systems use unique
physical or behavioral traits, such as fingerprints, iris scans, facial
recognition, or hand geometry, to verify a person's identity and
grant access.
• Access Control Tokens: These are physical devices, like key
fobs or tokens, that users carry with them to gain access. They
are often used in conjunction with card readers or biometric
systems for additional security.
15
16
Keypad Access Control
The primary purpose of keypad access
control is to enhance security by
requiring individuals to enter a correct
PIN (Personal Identification Number) or
code before gaining entry. Keypad
access control is a security technology
that uses a numerical keypad as a
means of granting or restricting access
to a physical location, building, room, or
digital system.
17
Biometric Access Control
The primary purpose of
biometric access control is to
enhance security, accuracy,
and convenience in various
environments. Biometric
access control is a security
technology that uses unique
physiological or behavioral
characteristics of individuals to
verify their identity and
regulate access to physical
locations, digital systems, data,
or resources.
Access Control Tokens
18
The primary purpose of access control
tokens is to enhance security and manage
access permissions effectively. Access
control tokens, play a critical role in
computer security and authentication
systems. These tokens are used to
confirm the identity and authorization of
users, devices, or applications attempting
to access resources, services, or data in a
digital environment.
• Mobile Access Control: With the increasing prevalence of
smartphones, mobile access control allows users to gain entry
using their mobile devices, often through Bluetooth or NFC
technology.
• Intercom Systems: Commonly used in residential or small
commercial settings, intercom systems require visitors to identify
themselves before granting access.
• Turnstiles and Speed Gates: These physical barriers control
access to a specific area by allowing only one person to pass at a
time. They are often used in high-security environments like
transportation hubs
19
20
Mobile Access Control
The primary purpose of mobile access
control is to enhance convenience,
security, and flexibility in various
environments. Mobile access control
devices, such as smartphones and tablets
are used as means of gaining access to
secured areas, systems, or resources. This
technology allows individuals to use their
mobile devices as digital keys or access
credentials, replacing traditional physical
keys, access cards, or PIN codes.
21
Intercom Systems
The primary purpose of intercom
systems is to facilitate efficient and
secure communication for a variety of
applications. In residential buildings
and gated communities, intercoms are
often used at entry points (gates or
building entrances) to verify the identity
of visitors before granting them access.
Residents can communicate with
visitors and remotely unlock doors or
gates if necessary.
Turnstiles and Speed Gates
22
Speed gates are designed to provide
rapid and efficient pedestrian access
control. They are often used in settings
where high throughput of authorized
individuals is required, such as office
buildings, airports, corporate
headquarters, and government facilities
The primary purpose of turnstiles is to
control the entry and exit of pedestrians
into or out of a secured area. They are
often used in settings where access
needs to be regulated, such as public
transportation hubs, stadiums,
amusement parks, office buildings, and
more.
• Vehicle Access Control: Systems like automatic gates,
barriers, and license plate recognition are used to control
vehicular access to parking lots, garages, and restricted areas.
• Wireless Access Control: Utilizing wireless communication,
this type of access control system offers flexibility and scalability,
making it suitable for both small and large installations.
• Cloud-Based Access Control: Access control data and
management are hosted in the cloud, allowing for remote
monitoring and management of access points.
23
24
Vehicle Access Control
Vehicle access control is a security
system that manages and regulates the
entry and exit of vehicles into a specific
area or facility. It is commonly used in
various environments, including
commercial properties, residential
complexes, parking lots, industrial
facilities, and gated communities. The
primary goal of vehicle access control is
to enhance security, improve traffic
management, and monitor vehicle
kawalan akses kenderaan
Wireless Access Control
25
Wireless access control refers to a security
system that uses wireless technology to
manage and regulate access to physical
spaces, such as buildings, rooms, or
restricted areas. This technology
eliminates the need for traditional wired
access control systems, which rely on
physical connections for communication.
Wireless access control offers greater
flexibility, scalability, and ease of
installation, making it a popular choice for
many organizations
Kawalan Akses Tanpa Wayar
26
Cloud-Based Access Control
1.Cloud Computing: Cloud computing involves
delivering computing services (such as
servers, storage, databases, networking,
software, analytics, and intelligence) over the
internet. Cloud service providers host and
manage these services, allowing organizations
to leverage them without the need to own or
maintain physical infrastructure.
2.Access Control: Access control is the
process of regulating who can access specific
resources, data, or services within a system. It
involves authentication (verifying the identity
of users or entities), authorization (determining
what actions or data they are allowed to
access), and auditing (tracking and logging
access activities).
Kawalan Akses Berasaskan Awan
• Integrated Access Control: This involves the integration
of access control systems with other security systems
like surveillance cameras, alarms, and intrusion detection
to create a comprehensive security solution.
• Visitor Management Systems: These systems are
designed to manage and track visitors, issuing temporary
access credentials and monitoring their movements
within a facility.
• Each of these access control systems has its own
advantages and limitations, and the choice of system
depends on factors such as the level of security required,
the size and complexity of the facility, and budget
considerations 27
The primary purpose of an
integrated access control
system is to enhance security,
streamline access
management, and provide a
holistic approach to
safeguarding assets, data,
and personnel. An integrated
access control system serves
as a comprehensive and
centralized security solution
designed to regulate, monitor,
and manage access to
physical areas, digital
resources, and facilities. 28
Integrated Access Control Kawalan Akses Bersepadu
29
Visitor Management Systems Sistem Pengurusan Pelawat
A visitor management
system (VMS) is a software-
based solution designed to
streamline and enhance the
process of managing visitors
to a facility or organization.
The primary purpose of a
visitor management system
is to improve security,
increase efficiency, and
create a positive and
controlled visitor experience.
30
Visitor
Management
System
31
Video Clip: VMS
32
1.Enhanced Security:
1.One of the primary purposes of a visitor management system
is to enhance security by accurately verifying the identity of
visitors before granting them access to a facility. It helps
ensure that only authorized individuals gain entry.
2.Visitor Registration:
1.VMS allows organizations to register and record visitor
information, including their name, contact details, purpose of
visit, and the person or department they are visiting. This data
is essential for security, safety, and compliance
The Purpose of VMS
33
3. Access Control:
1.VMS can be integrated with access control systems, allowing it
to issue temporary access credentials, such as visitor badges
or access cards. This ensures that visitors can only access
approved areas during their visit.
4. Improved Efficiency:
1.VMS streamlines the check-in process by automating visitor
registration. This reduces wait times and administrative
overhead, making the visitor experience more efficient and
pleasant.
5. Notification and Alerts:
1.VMS can automatically notify hosts or employees when their
expected visitors arrive. This ensures a warm welcome and
minimizes delays in meeting schedules.
34
6. Visitor Badges:
1.VMS can print visitor badges with important information, such
as the visitor's name, photo, date, and purpose of the visit.
These badges enhance security by clearly identifying visitors.
7. Emergency Response:
1.In case of emergencies or evacuations, VMS can provide an
accurate record of the individuals present in the facility,
including visitors, helping security personnel and emergency
responders account for everyone's safety.
8. Compliance and Reporting:
1.VMS generates detailed reports on visitor activity and
compliance with security policies. This documentation is
valuable for audits and regulatory compliance
35
9. Visitor Tracking:
1.VMS maintains a log of visitor arrivals, departures, and
movements within the facility. This information can be used for
security investigations or internal purposes.
10. Data Privacy :
1.VMS helps organizations comply with data privacy regulations by
securely storing visitor data, providing data access controls, and
enabling data removal when necessary.
11. Customization:
1.VMS can be customized to match the specific needs and
branding of an organization, creating a professional and
consistent visitor experience
36
Visitor management systems are commonly used in a wide
range of settings, including corporate offices, government
buildings, educational institutions, healthcare facilities,
manufacturing plants, and recreational venues. Their ability
to improve security, efficiency, and compliance while
providing a welcoming experience for visitors makes them
an essential tool in modern access control and security
strategies.
37
End of Session
37

More Related Content

PDF
PHYSICAL ACCESS CONTROL - AN UNDERSTANDING.pdf
PDF
access control systems.pdf Physical Security Domains
PPTX
Access Control Segment in Madrid 2022.pptx
PPT
Access control basics-2
PPTX
Physical access control
PPTX
Mit project
PPTX
Physical security primer - JURINNOV - Eric Vanderburg
PPTX
Microtech Systems
PHYSICAL ACCESS CONTROL - AN UNDERSTANDING.pdf
access control systems.pdf Physical Security Domains
Access Control Segment in Madrid 2022.pptx
Access control basics-2
Physical access control
Mit project
Physical security primer - JURINNOV - Eric Vanderburg
Microtech Systems

Similar to BLE 1213 MUST (SESSION 2).pptx-Student learning Guide (20)

PPTX
Access control systems
PDF
WP82 Physical Security in Mission Critical Facilities
PPTX
Example of access control
DOCX
To design low
PPTX
Access control by vinay
DOCX
Access control
PPTX
Access Control Systems
PPT
Access control at gates
PPTX
Digital physical security[present]
PPT
Chapter008
PPTX
Beyond the Cards The Future of Security Systems and Access Control Systems in...
PDF
The Ultimate Guide to Access Control Systems_ Enhancing Security and Efficien...
PDF
Choose the Best Quality Access Control System for Your Organization Safety
PPTX
informations_security_presentations.pptx
PDF
THE THREE DIMENSION-BASED PHYSICAL ACCESS CONTROL DETECTION SYSTEM, THE NATUR...
PPTX
it physical security for good educati.pptx
PPT
Matrix Security Solutions: COSEC - Access Control and Time-Attendance
PPTX
Security and management
PPTX
Information security
PPTX
Security Access Control Requirements Gathering Pack
Access control systems
WP82 Physical Security in Mission Critical Facilities
Example of access control
To design low
Access control by vinay
Access control
Access Control Systems
Access control at gates
Digital physical security[present]
Chapter008
Beyond the Cards The Future of Security Systems and Access Control Systems in...
The Ultimate Guide to Access Control Systems_ Enhancing Security and Efficien...
Choose the Best Quality Access Control System for Your Organization Safety
informations_security_presentations.pptx
THE THREE DIMENSION-BASED PHYSICAL ACCESS CONTROL DETECTION SYSTEM, THE NATUR...
it physical security for good educati.pptx
Matrix Security Solutions: COSEC - Access Control and Time-Attendance
Security and management
Information security
Security Access Control Requirements Gathering Pack
Ad

More from Major K. Subramaniam Kmaravehlu (20)

PPTX
PRISON Bincang (1)SUN.pptx. Prison Security measures
PPTX
BENTANG 1 -CDM APR 22 ahmad.pptx. Crisis and Disaster management presntation
PPTX
BENTANG 2 -CDM MAY 22.pptx Crisis and Disaster Management
PPTX
BENTANG 1 -PI APR 22.pptx- Private Investigation Services
PPTX
PRISON Bincang (2)SUN.pptx. Presentation and group Discussion .
PDF
Dhurkhesh Discussion_Prison_26.12.21.pdf
PPT
TRAINING PEDAGOGY.ppt Introduction to Understanding of Pedagogy.
PPTX
PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY
PPT
u2-lect-1-to-9-mtd-pvb-1801161758710.ppt
PPTX
BLE 1213 PSM (SESSION 5).pptx-key Concepts in PSM
PPTX
BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...
PPTX
BLE 1213 MUST (SESSION 3).pptx- basic principles of physical security
PPTX
AI GENERATIVE.pptx- Introduction to AI generative in Warfare
PPTX
AVI SAFETY CULTURE.pptx- maintenance engineers safety principles
PPTX
CTPAT PPTX Presentation.pptx - minimum security
PPTX
Phy Sy CTPAT.pptx-ctpat training for supply chain managers.
PPT
SECURITY PLANNING DESIGN (SESSION 3).ppt
PPT
Physical_Security_Historical_perspective.ppt
PPTX
BLE 1213 PSM-Rosaini Gp 2.pptx- GROUP DISCUSSION
PPTX
BLE 1213 PSM Fitri Gp 3.pptx- STUDENT GROUP PRESENTATION
PRISON Bincang (1)SUN.pptx. Prison Security measures
BENTANG 1 -CDM APR 22 ahmad.pptx. Crisis and Disaster management presntation
BENTANG 2 -CDM MAY 22.pptx Crisis and Disaster Management
BENTANG 1 -PI APR 22.pptx- Private Investigation Services
PRISON Bincang (2)SUN.pptx. Presentation and group Discussion .
Dhurkhesh Discussion_Prison_26.12.21.pdf
TRAINING PEDAGOGY.ppt Introduction to Understanding of Pedagogy.
PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY
u2-lect-1-to-9-mtd-pvb-1801161758710.ppt
BLE 1213 PSM (SESSION 5).pptx-key Concepts in PSM
BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...
BLE 1213 MUST (SESSION 3).pptx- basic principles of physical security
AI GENERATIVE.pptx- Introduction to AI generative in Warfare
AVI SAFETY CULTURE.pptx- maintenance engineers safety principles
CTPAT PPTX Presentation.pptx - minimum security
Phy Sy CTPAT.pptx-ctpat training for supply chain managers.
SECURITY PLANNING DESIGN (SESSION 3).ppt
Physical_Security_Historical_perspective.ppt
BLE 1213 PSM-Rosaini Gp 2.pptx- GROUP DISCUSSION
BLE 1213 PSM Fitri Gp 3.pptx- STUDENT GROUP PRESENTATION
Ad

Recently uploaded (20)

PDF
NewBase 12 August 2025 Energy News issue - 1812 by Khaled Al Awadi_compresse...
PDF
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
PPTX
2025 Product Deck V1.0.pptxCATALOGTCLCIA
DOCX
Business Management - unit 1 and 2
PDF
Nidhal Samdaie CV - International Business Consultant
PDF
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
PPTX
HR Introduction Slide (1).pptx on hr intro
PDF
How to Get Business Funding for Small Business Fast
PPTX
New Microsoft PowerPoint Presentation - Copy.pptx
PPTX
ICG2025_ICG 6th steering committee 30-8-24.pptx
PDF
Power and position in leadershipDOC-20250808-WA0011..pdf
PDF
Ôn tập tiếng anh trong kinh doanh nâng cao
DOCX
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
PDF
COST SHEET- Tender and Quotation unit 2.pdf
PDF
Digital Marketing & E-commerce Certificate Glossary.pdf.................
PDF
Deliverable file - Regulatory guideline analysis.pdf
PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
PDF
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
PPTX
svnfcksanfskjcsnvvjknsnvsdscnsncxasxa saccacxsax
PDF
Cours de Système d'information about ERP.pdf
NewBase 12 August 2025 Energy News issue - 1812 by Khaled Al Awadi_compresse...
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
2025 Product Deck V1.0.pptxCATALOGTCLCIA
Business Management - unit 1 and 2
Nidhal Samdaie CV - International Business Consultant
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
HR Introduction Slide (1).pptx on hr intro
How to Get Business Funding for Small Business Fast
New Microsoft PowerPoint Presentation - Copy.pptx
ICG2025_ICG 6th steering committee 30-8-24.pptx
Power and position in leadershipDOC-20250808-WA0011..pdf
Ôn tập tiếng anh trong kinh doanh nâng cao
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
COST SHEET- Tender and Quotation unit 2.pdf
Digital Marketing & E-commerce Certificate Glossary.pdf.................
Deliverable file - Regulatory guideline analysis.pdf
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
svnfcksanfskjcsnvvjknsnvsdscnsncxasxa saccacxsax
Cours de Système d'information about ERP.pdf

BLE 1213 MUST (SESSION 2).pptx-Student learning Guide

  • 3. RECAP-ULANGKAJI 1. Principles in Physical Security The principles underlying Physical Security Management are designed to create a comprehensive and layered approach to protect against unauthorized access, theft, damage, and other potential harms. Here are the key principles:  Deterrence  Detection  Delay  Response & Intervention 3
  • 4. Defence-in-Depth Defence in depth is about building multiple layers of security that will protect the organization better than one single layer. https://www.youtube.com/watch?v=j9MQMVn3FV4&t=86s&ab_channel=TomOlzak 4 Pertahanan secara mendalam adalah tentang membina berbilang lapisan keselamatan yang akan melindungi organisasi lebih baik daripada satu lapisan tunggal.
  • 7. 7
  • 8. 8 Contrary to PSTN, an IP PBX (Internet Protocol Private Branch Exchange) system is a telecommunication system that uses IP data networks (like the internet) to manage and route voice and video calls, in addition to other forms of communication such as instant messaging and A smart building, also known as an intelligent building or a smart facility, is a structure that uses advanced technology and integrated systems to enhance the building's overall functionality, efficiency, security, and sustainability. The purpose of a CCTV (Closed-Circuit Television) system is to capture, record, and monitor video footage in a designated area for various purposes such as security and crime deterrence, surveillance, visitor control etc …. A Visitor Management System (VMS) serves as a comprehensive solution to manage and track visitors, guests, and personnel entering a facility or premises. A security control room, often referred to as a security operations center (SOC) or command center, is a centralized facility equipped with technology and staffed by security personnel responsible for monitoring, managing, and responding to security-related events and incidents within an organization or a specific area. Access control refers to the practice of regulating and managing who has permission to access specific resources, assets, areas, or information within an organization or physical space. Motion sensors, also known as motion detectors, serve the primary purpose of detecting physical movement or motion within a defined area. A fire alarm system is a network of interconnected devices and components designed to detect, notify, and respond to the presence of a fire or smoke in a building or area. The primary purpose of a fire alarm system is to protect life and property by providing early warning of a fire, allowing occupants to evacuate safely and alerting emergency responders to Parking zones inside facilities are often equipped with security features such as surveillance cameras, adequate lighting, and controlled access points. This enhances the safety and security of vehicles and their occupants, reducing the risk of theft, vandalism, and other security concerns.
  • 9. 9 Access Control Systems  Mechanical Locks and Keys  Electronic Card Access Control  Keypad Access Control  Biometric Access Control  Access Control Tokens  Mobile Access Control  Intercom Systems  Turnstiles and Speed Gates  Vehicle Access Control  Wireless Access Control  Cloud-Based Access Control  Integrated Access Control  Visitor Management System
  • 10. 10 Access control is the art and science of regulating who can enter a specific area, building, or facility and under what conditions. It's the guardian at the gate, ensuring that only authorized individuals gain entry, while keeping potential threats at bay. In an era where security concerns are ever-evolving, understanding the core concepts of access control is not only essential but also a cornerstone in building a secure environment.
  • 11. 11 Kawalan akses ialah seni dan sains mengawal selia orang yang boleh memasuki kawasan, bangunan atau kemudahan tertentu dan dalam keadaan apa. Ia adalah penjaga di pintu pagar, memastikan bahawa hanya individu yang diberi kuasa boleh masuk, sambil mengekalkan potensi ancaman. Dalam era di mana kebimbangan keselamatan sentiasa berkembang, memahami konsep teras kawalan akses bukan sahaja penting tetapi juga asas dalam membina persekitaran yang selamat.
  • 12. 12 Access control systems in physical security encompass various methods and technologies to regulate entry to a physical space. These systems can be categorized into several types, including: 1.Mechanical Locks and Keys: Traditional locks and keys are still widely used for securing doors and cabinets. They provide a basic level of access control but lack the advanced features and auditing capabilities of electronic systems. 2.Electronic Card Access Control: This type of system uses access cards (e.g., proximity cards, smart cards) to grant or deny access. Users present their card to a reader, which then verifies their credentials and then unlocks the door when authorized.
  • 13. 13 Mechanical Locks and Keys The primary purpose of mechanical lock and key systems is to provide a basic level of security and access control by allowing authorized individuals to lock and unlock specific areas while preventing unauthorized access. Mechanical locks and keys have been used for centuries as a fundamental means of securing doors, cabinets, safes, and other physical enclosures.
  • 14. Electronic Card Access Control 14 The primary purpose of electronic card access control is to enhance security, provide convenience, and monitor access to controlled areas. This technology uses electronic cards or key fobs as access credentials to regulate and manage entry into secured areas, buildings, or digital systems. These electronic cards typically contain embedded data that is read by card readers, allowing authorized individuals to gain access while denying entry to unauthorized users.
  • 15. • Keypad Access Control: Access is granted based on a numeric code entered into a keypad. This method is often used in conjunction with electronic locks and is suitable for low-security areas. • Biometric Access Control: Biometric systems use unique physical or behavioral traits, such as fingerprints, iris scans, facial recognition, or hand geometry, to verify a person's identity and grant access. • Access Control Tokens: These are physical devices, like key fobs or tokens, that users carry with them to gain access. They are often used in conjunction with card readers or biometric systems for additional security. 15
  • 16. 16 Keypad Access Control The primary purpose of keypad access control is to enhance security by requiring individuals to enter a correct PIN (Personal Identification Number) or code before gaining entry. Keypad access control is a security technology that uses a numerical keypad as a means of granting or restricting access to a physical location, building, room, or digital system.
  • 17. 17 Biometric Access Control The primary purpose of biometric access control is to enhance security, accuracy, and convenience in various environments. Biometric access control is a security technology that uses unique physiological or behavioral characteristics of individuals to verify their identity and regulate access to physical locations, digital systems, data, or resources.
  • 18. Access Control Tokens 18 The primary purpose of access control tokens is to enhance security and manage access permissions effectively. Access control tokens, play a critical role in computer security and authentication systems. These tokens are used to confirm the identity and authorization of users, devices, or applications attempting to access resources, services, or data in a digital environment.
  • 19. • Mobile Access Control: With the increasing prevalence of smartphones, mobile access control allows users to gain entry using their mobile devices, often through Bluetooth or NFC technology. • Intercom Systems: Commonly used in residential or small commercial settings, intercom systems require visitors to identify themselves before granting access. • Turnstiles and Speed Gates: These physical barriers control access to a specific area by allowing only one person to pass at a time. They are often used in high-security environments like transportation hubs 19
  • 20. 20 Mobile Access Control The primary purpose of mobile access control is to enhance convenience, security, and flexibility in various environments. Mobile access control devices, such as smartphones and tablets are used as means of gaining access to secured areas, systems, or resources. This technology allows individuals to use their mobile devices as digital keys or access credentials, replacing traditional physical keys, access cards, or PIN codes.
  • 21. 21 Intercom Systems The primary purpose of intercom systems is to facilitate efficient and secure communication for a variety of applications. In residential buildings and gated communities, intercoms are often used at entry points (gates or building entrances) to verify the identity of visitors before granting them access. Residents can communicate with visitors and remotely unlock doors or gates if necessary.
  • 22. Turnstiles and Speed Gates 22 Speed gates are designed to provide rapid and efficient pedestrian access control. They are often used in settings where high throughput of authorized individuals is required, such as office buildings, airports, corporate headquarters, and government facilities The primary purpose of turnstiles is to control the entry and exit of pedestrians into or out of a secured area. They are often used in settings where access needs to be regulated, such as public transportation hubs, stadiums, amusement parks, office buildings, and more.
  • 23. • Vehicle Access Control: Systems like automatic gates, barriers, and license plate recognition are used to control vehicular access to parking lots, garages, and restricted areas. • Wireless Access Control: Utilizing wireless communication, this type of access control system offers flexibility and scalability, making it suitable for both small and large installations. • Cloud-Based Access Control: Access control data and management are hosted in the cloud, allowing for remote monitoring and management of access points. 23
  • 24. 24 Vehicle Access Control Vehicle access control is a security system that manages and regulates the entry and exit of vehicles into a specific area or facility. It is commonly used in various environments, including commercial properties, residential complexes, parking lots, industrial facilities, and gated communities. The primary goal of vehicle access control is to enhance security, improve traffic management, and monitor vehicle kawalan akses kenderaan
  • 25. Wireless Access Control 25 Wireless access control refers to a security system that uses wireless technology to manage and regulate access to physical spaces, such as buildings, rooms, or restricted areas. This technology eliminates the need for traditional wired access control systems, which rely on physical connections for communication. Wireless access control offers greater flexibility, scalability, and ease of installation, making it a popular choice for many organizations Kawalan Akses Tanpa Wayar
  • 26. 26 Cloud-Based Access Control 1.Cloud Computing: Cloud computing involves delivering computing services (such as servers, storage, databases, networking, software, analytics, and intelligence) over the internet. Cloud service providers host and manage these services, allowing organizations to leverage them without the need to own or maintain physical infrastructure. 2.Access Control: Access control is the process of regulating who can access specific resources, data, or services within a system. It involves authentication (verifying the identity of users or entities), authorization (determining what actions or data they are allowed to access), and auditing (tracking and logging access activities). Kawalan Akses Berasaskan Awan
  • 27. • Integrated Access Control: This involves the integration of access control systems with other security systems like surveillance cameras, alarms, and intrusion detection to create a comprehensive security solution. • Visitor Management Systems: These systems are designed to manage and track visitors, issuing temporary access credentials and monitoring their movements within a facility. • Each of these access control systems has its own advantages and limitations, and the choice of system depends on factors such as the level of security required, the size and complexity of the facility, and budget considerations 27
  • 28. The primary purpose of an integrated access control system is to enhance security, streamline access management, and provide a holistic approach to safeguarding assets, data, and personnel. An integrated access control system serves as a comprehensive and centralized security solution designed to regulate, monitor, and manage access to physical areas, digital resources, and facilities. 28 Integrated Access Control Kawalan Akses Bersepadu
  • 29. 29 Visitor Management Systems Sistem Pengurusan Pelawat A visitor management system (VMS) is a software- based solution designed to streamline and enhance the process of managing visitors to a facility or organization. The primary purpose of a visitor management system is to improve security, increase efficiency, and create a positive and controlled visitor experience.
  • 32. 32 1.Enhanced Security: 1.One of the primary purposes of a visitor management system is to enhance security by accurately verifying the identity of visitors before granting them access to a facility. It helps ensure that only authorized individuals gain entry. 2.Visitor Registration: 1.VMS allows organizations to register and record visitor information, including their name, contact details, purpose of visit, and the person or department they are visiting. This data is essential for security, safety, and compliance The Purpose of VMS
  • 33. 33 3. Access Control: 1.VMS can be integrated with access control systems, allowing it to issue temporary access credentials, such as visitor badges or access cards. This ensures that visitors can only access approved areas during their visit. 4. Improved Efficiency: 1.VMS streamlines the check-in process by automating visitor registration. This reduces wait times and administrative overhead, making the visitor experience more efficient and pleasant. 5. Notification and Alerts: 1.VMS can automatically notify hosts or employees when their expected visitors arrive. This ensures a warm welcome and minimizes delays in meeting schedules.
  • 34. 34 6. Visitor Badges: 1.VMS can print visitor badges with important information, such as the visitor's name, photo, date, and purpose of the visit. These badges enhance security by clearly identifying visitors. 7. Emergency Response: 1.In case of emergencies or evacuations, VMS can provide an accurate record of the individuals present in the facility, including visitors, helping security personnel and emergency responders account for everyone's safety. 8. Compliance and Reporting: 1.VMS generates detailed reports on visitor activity and compliance with security policies. This documentation is valuable for audits and regulatory compliance
  • 35. 35 9. Visitor Tracking: 1.VMS maintains a log of visitor arrivals, departures, and movements within the facility. This information can be used for security investigations or internal purposes. 10. Data Privacy : 1.VMS helps organizations comply with data privacy regulations by securely storing visitor data, providing data access controls, and enabling data removal when necessary. 11. Customization: 1.VMS can be customized to match the specific needs and branding of an organization, creating a professional and consistent visitor experience
  • 36. 36 Visitor management systems are commonly used in a wide range of settings, including corporate offices, government buildings, educational institutions, healthcare facilities, manufacturing plants, and recreational venues. Their ability to improve security, efficiency, and compliance while providing a welcoming experience for visitors makes them an essential tool in modern access control and security strategies.