Put simply access control is the ability to control access to a set of resources in a given area. It could be as basic as a lock on a door or as complex as a security monitoring system. The more complex forms of access control have systems in place that allow customized access for different personnel, through the creation of time zones and access levels. However, with all access control, it is important to first understand the architecture of the system.
Centralized or Distributed
In the case of a system failure access control levels can be compromised if you do not have a thorough understanding of your system's processing arrangement.
Centralized processing systems are dependent on a central computer. Information is collected at field panels, such as card readers at entry points, and sent back to the computer for validation.
The doorway will not open until it has received a command from the central computer to do so. These centralized systems can be vulnerable if communication is lost between field panels and the computer or if the computer crashes. Commercial Access Control Systems – Ryalex Security Pty Ltd provide installation, monitoring, and maintenance of all sorts of security systems including a wide range of access control systems.
One of the most basic tools in access control is the use of time zones. Allowing differentiation for start and finish times and different days of the week a systems operator can limit access at entry points for opening and closing hours, lunch breaks and holidays.
For example, the reception area may be accessible during opening hours and the break room may only be accessible 11:00 to 13:00. Taking this a step further we can look at pairing time zones with access levels. Issuing an employee an access card allows the system operator to assign to that card a group of access points as well as a group of timezones.
Access control areas can be monitored and can have multiple alarm inputs. For example, entry point card readers are installed with an alarm contact which monitors if the door was forced open or left open.
If the alarm had been activated because of an entry breach it can be 'shunted', bypassed, by a valid card read.
Areas with alarm monitoring need not only be limited to entry points, but they can also include motion detectors, panic alarms, temperature, and glass break sensors.