|
System Administration
Access control systems, including employee badges in all their forms,
require diligent system administration. System administration requires
being aware of all the features available in the system, even features
you have no intention of using. Access control system features that are
unused and unblocked often can be exploited by an attacker. Here are
some system features to be aware of:
- Enrollment. All entry-control systems
must provide a means of entering, updating, and deleting information
about authorized individuals. Usually this is accomplished with a dedicated
enrollment station that is connected directly to the central-processing
unit. When credential devices are used, all authorized users must be
provided with an appropriate credential. A means should also be provided
to unenroll a person quickly without having to retrieve the credential.
Biometric devices require additional equipment for enrollment.
- Entry control techniques. Some entry-control
techniques require additional hardware. Others just require software,
typically including a database. The database must be available to every
portal that is affected. Techniques include:
- Area zones
- Time zones
- Team zones
- Anti-pass back
- Anti-tailgate
- Guard tour
- Elevator control
- Alarms. Several types of alarms can be
used with an entry-control system. These alarms must produce alarms
that can be seen and heard in the security center.
- Entry denial. Most entry-control devices
are configured to permit the user three attempts to enter. If more
than three unsuccessful attempts are made within a specified period,
the device generates an alarm. An alarm also is generated if an invalid
(unenrolled or counterfeited) credential is used or if attempted entries
violate specified area, time, or team zoning requirements.
- Communication failure. This alarm is generated
when the system detects a loss of communication between the central
processor and local equipment.
- Portal open. If a portal door remains
open longer than a predefined time, an alarm is generated.
- Duress. This alarm is generated when a
special duress code is entered at a keypad.
- Guard overdue. This alarm is generated
when a security guard is overdue at a checkpoint during a predefined
guard tour.
- Software tampering. This type of alarm
is generated when unauthorized persons attempt to invoke certain system
commands or modify database files.
|