Logo


1. Introduction
  1. Risk Management

  2. Who Are You, and Why Are You Here?

  3. Finding a Solution

2. Problem Definition
  1. What Needs Protecting?

  2. Who is Allowed Where?

3. Methods of Identification
  1. Reliability vs. Cost

  2. Combining Methods to Increase Reliability

  3. Security System Management

4. Access Control
  1. What You Have

  2. What You Know

  3. Who You Are

5. Other Security Systems Elements

  1. Building Design

  2. Piggybacking and Tailgating: Mantraps

  3. Camera Surveillance

  4. Security Guards

  5. Sensors and Alarms

  6. Visitors

6. The Human Element
  1. People: The Weakest Link

  2. People: The Strongest Backup

7. Site Design
  1. Layers

  2. Components

  3. Tactics

8. Controlling Site Access
  1. Entry Control Facility

  2. Zones of an Entry Control Facility

  3. Utilities and Automatition

9. Chosing the Right Solution
  1. Risk Tolerance vs. Cost

  2. Security System Design Considerations

  3. Building Security Design Considerations

“Who You Are”

Biometric technology is developing fast, getting better and cheaper. High confidence affordable biometric verification — especially fingerprint recognition — is entering the mainstream of security solutions. Many vendors now supply a wide range of biometric devices, and when combined with traditional “what you have” and “what you know” methods, biometrics can complement existing security measures to become best practice for access control.

Biometric identification is typically used not to recognize identity by searching a database of users for a match, but rather to verify identity that is first established by a “what you have” or “what you know” method — for example, a card/PIN is first used, then a fingerprint scan verifies the result. As performance and confidence in biometric technology increase, it may eventually become a standalone method of recognizing identity, eliminating the need to carry a card or remember a password.

There are two types of failures in biometric identification:

  • False rejection — Failure to recognize a legitimate user. While it could be argued that this has the effect of keeping the protected area extra secure, it is an intolerable frustration to legitimate users who are refused access because the scanner doesn’t recognize them.

  • False acceptance — Erroneous recognition, either by confusing one user with another, or by accepting an imposter as a legitimate user.

Failure rates can be adjusted by changing the threshold (“how close is close enough”) for declaring a match, but decreasing one failure rate will increase the other.

Considerations in choosing a biometric capability are equipment cost, failure rates (both false rejection and false acceptance), and user acceptance, which means how intrusive, inconvenient, or even dangerous the procedure is perceived to be. For example, retinal scanners are generally considered to have low user acceptance because the eye has to be 1-2 inches from the scanner with an LED directed into the eye.

To receive your Physical Vulnerability Assessment, please submit your payment of $99.00
B E T T E R: Please submit your payment of $999.00 for a complete Physical Vulnerability Assessment or Design covering a single location.
Business Name:
Contact Information:
Email Address:
URL or IP address:
  

Other members of our business group:
Cloud-Security.us | US-scada.com

COPYRIGHT (C) 2000 - 2013 InfoSecPro.com ALL RIGHTS RESERVED