Posted: September 1st, 2022
Access Control in Security Management
Access Control in Security Management
Describe how you would create a layered access control solution using IDS, ACS, CCTV and Biometrics. In addition, describe the five major forms of biometrics along with their strengths and weaknesses.
Access Control in Security Management
Access controls entail the defense system’s layering to secure the inside and outside perimeter of a facility, verify the identity of person authenticate, and processed to give entry to authorized personnel. Access control can be achieved through different methods. An access control system proactively monitors and secures entry and exit points in facilities to protect organizations from a security breach and ensure that only authorized personae access classified sections of a facility (Neto, 2016). This paper seeks to describe how access control is layered through intrusion detection systems, CCTV surveillance, and biometric while expounding on the strengths and weakness of forms of biometrics authentication systems.
Intrusion detection
This entails a system that detects unauthorized personnel using intrusion detection equipment—integrated into the electronic security system. The system detects, locates, and classifies any anomalous movements caused by physical activity, and in case an intrusion deploys an immediate alert to the responsible response team. It is also applicable to software, networks, and devices (Ghanavanth, 2018).
Closed-circuit television (CCTV)
The closed-circuit television entails the use of video cameral to monitor promise or a facility. This video surveillance an imperative in broadcasting real-time point to point feeds. This comes in handy as a form of layering security as the video analytics come in handy to help detect unauthorized personnel or intruders in a facility. Moreover, it works beyond in the moment security as all the video footage that can be used to solve crimes as they provide documentation and evidence to prosecute perpetrators (Ghanavanth, 2018).
Biometric authentication
This is one of the essential components of access controls and is rapidly gaining footholds globally as one of the best security systems. Biometric authentication entails the automated identification of individuals based on their unique behavioral or psychological characteristics to authenticate the identity and grant access to a facility, data, or devices (Jain, 2016). Biometric authentication provides a powerful layer of security that is difficult to surpass. There are several different forms of biometric that have been developed over time. Herein are the five major forms of biometric authentication and their strengths and weakness.
Fingerprint recognition
The fingerprint recognition system entails an authentication system that utilizes the specific line patterns on the finger’s surface, for essence, the finger’s ridges, which form a pattern. This type of biometric recognition system is relatively cheap and easy to use. It is unique as each fingerprint pattern varies from the next, thus non-transferable (Bharadwaj, 2014). However, t has its shortcomings given that it is a pattern on lines that can easily be replicated despite being encoded. This is possible through fingerprint spoofing technology. Additionally, fingerprint patterns can wear away over time, depending on the nature of jobs one is involved
Facial recognition
This system analyses different parts of the facial modalities’ position and shapes to create a unique match for each individual. The accuracy level of this technique is very high, therefore impossible to breach. This form of authentication can work even when the subject is not close to the security control system; therefore, it is convenient and comfortable to use (Neto, 2016). However, the system can be affected by poor lighting or objects that may blur a person’s face. Additionally, it is highly affected by variation in facial expression; therefore, a slight difference in the face posture affects the face recognition system’s functionality.
Iris recognition
This system used high-resolution images of the irises of a person’s eye. This technique’s main advantage is that it is impossible to replicate; therefore, it is ranked among the leading forms of biometric authentication systems. However, this technique’s main drawback is that many users are resistant to this technique, as infrared technology could lead to eye irritation. Additionally, iris scanning using shared equipment can become unhygienic. It is also associated with failure in enrollment rates and poor images (Bharadwaj, 2014).
Palm vein recognition
palm vein recognition is one of the most secure forms of biometric authentication. It entails the capturing of the vein patterns of individual near-infrared rays. The pattern is then stored in an encrypted format. Palm vein recognition is very accurate and secure and a less than a percentage error rate. However, it is a palm vein recognition expensive (Marattukalam, 2019).
Voice recognition
Voice recognition uses a voice prompt to initial authentication to grant access to a facility or device. It is a relatively cheap biometric authentication technology that is easy to set up. The downside of voice recognition is that it is easy to mimic, whereby clear recoding could defeat a voice recognition system making it highly susceptible to a system breach. Poor quality of voice samples; additionally, the background noises can make voice recognition (Bharadwaj, 2014).
References
Bharadwaj, S., Vatsa, M., & Singh, R. (2014). Biometric quality: a review of fingerprint, iris, and face. EURASIP Journal on Image and Video Processing, 2014(1), 34.
Ghanavanth, V., Bharadwaj, H., Uma, R., & Krishnamurthy, G. (2018, May). Smart CCTV Surveillance System for Intrusion Detection With Live Streaming. In 2018 3rd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT) (pp. 1030-1035). IEEE.
Jain, D., Ramkumar, D. P., & Sairam, D. K. (2016). IoT based Biometric Access Control System. International Journal of Innovative Research in Science, Engineering and Technology, 5, 555-559.
Marattukalam, F., & Abdulla, W. H. (2019, November). On Palm Vein as a Contactless Identification Technology. In 2019 Australian & New Zealand Control Conference (ANZCC) (pp. 270-275). IEEE.
Neto, A. L. M., Souza, A. L., Cunha, I., Nogueira, M., Nunes, I. O., Cotta, L., … & Oliveira, L. B. (2016, November). Aot: Authentication and access control for the entire iot device life-cycle. In Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD-ROM (pp. 1-15).
.
Order | Check Discount
Sample Homework Assignments & Research Topics
Tags:
Access Control in Security Management