Security awareness may be at the highest levels ever. Just about everyone shares concerns over national security, identity theft, school and public safety, protecting their property, or keeping their homes and workplaces safe. Logical access control addresses the issues associated with...
To access the remainder of this piece of premium content, you must be registered with Locksmith Ledger. Already have an account? Login
Register in seconds by connecting with your preferred Social Network.
Complete the registration form.
Security awareness may be at the highest levels ever. Just about everyone shares concerns over national security, identity theft, school and public safety, protecting their property, or keeping their homes and workplaces safe.
Logical access control addresses the issues associated with protecting electronic assets such as data and networks from unauthorized use, disruption or theft.
Physical access control endeavors to control access into premises by requiring persons to pass through a physical barrier in order to enter. Once someone gets through the physical security layer, they very well may also have to then negotiate a logical security layer, for example when they attempt to log on to their computer.
Biometric access is a hot topic these days, and this technology is used for both physical and logical access control and for both authentication and identification.
Authentication is the essential ingredient in all access control, determining if the individual is authorized to enter.
Factors used to authenticate an individual are:
• What you know (for example, a password)
• What you have (for example a ‘valid’ credential)
• Who you are (for example, your fingerprint, an example of Biometrics)
Electronic access control uses one of these factors for the purpose of identification of the person requesting access. For higher security, an additional factor is added to further authenticate the individual’s identity. The more authentication factors used, the more effective the access control.
Security started with a formidable physical barrier, which blocks entry until the person wishing to enter is visually identified. Once upon a time, the guards’ eyes did the authentication by recognizing the person. Maybe the guard would demand a document or a password as well.
In other cases a person needed a key to open a mechanical lock. Possession of the key was all that was required. Later mechanical keypad locks controlled access by requiring the entry of a pass code. All users were issued the same pass code.
Technology then began making quantum leaps. This is the time frame in which most Locksmith Ledger readers have been locksmiths. You probably participated in this era of technological transition in security.
So all our new technology is just a redeployment of traditional access control techniques, automating the processes and eliminating human intervention in the process.
THE DAWN OF BIOMETRICS
Biometrics are being used increasingly in access control for authentication (verification) or identification.
Biometric technologies make a template of some unchangeable characteristic of a person which can be used for a variety of purposes.
Biometric technologies can be used to authenticate that a credential is being used by the person to whom the credential was issued, or confirm that the biometric characteristic or trait (for example, a finger) being presented to the access control system matches the one stored in the system’s database.
Biometric Verification: When a biometric reader is used in conjunction with a smart card, the biometrics authenticates the identification of the cardholder by comparing the biometric characteristic presented to the reader with the template stored on the credential. By using the card with biometrics, you eliminate the possibility of a stolen credential.
Software determines whether the fingerprint being used is a live finger or a spoof