Order For Similar Custom Papers & Assignment Help Services

Fill the order form details - writing instructions guides, and get your paper done.

Posted: September 1st, 2022

Access Control in Security Management

Access Control in Security Management
Describe how you would create a layered access control solution using IDS, ACS, CCTV and Biometrics. In addition, describe the five major forms of biometrics along with their strengths and weaknesses.

Access Control in Security Management
Access controls entail the defense system’s layering to secure the inside and outside perimeter of a facility, verify the identity of person authenticate, and processed to give entry to authorized personnel. Access control can be achieved through different methods. An access control system proactively monitors and secures entry and exit points in facilities to protect organizations from a security breach and ensure that only authorized personae access classified sections of a facility (Neto, 2016). This paper seeks to describe how access control is layered through intrusion detection systems, CCTV surveillance, and biometric while expounding on the strengths and weakness of forms of biometrics authentication systems.
Intrusion detection
This entails a system that detects unauthorized personnel using intrusion detection equipment—integrated into the electronic security system. The system detects, locates, and classifies any anomalous movements caused by physical activity, and in case an intrusion deploys an immediate alert to the responsible response team. It is also applicable to software, networks, and devices (Ghanavanth, 2018).
Closed-circuit television (CCTV)
The closed-circuit television entails the use of video cameral to monitor promise or a facility. This video surveillance an imperative in broadcasting real-time point to point feeds. This comes in handy as a form of layering security as the video analytics come in handy to help detect unauthorized personnel or intruders in a facility. Moreover, it works beyond in the moment security as all the video footage that can be used to solve crimes as they provide documentation and evidence to prosecute perpetrators (Ghanavanth, 2018).
Biometric authentication
This is one of the essential components of access controls and is rapidly gaining footholds globally as one of the best security systems. Biometric authentication entails the automated identification of individuals based on their unique behavioral or psychological characteristics to authenticate the identity and grant access to a facility, data, or devices (Jain, 2016). Biometric authentication provides a powerful layer of security that is difficult to surpass. There are several different forms of biometric that have been developed over time. Herein are the five major forms of biometric authentication and their strengths and weakness.

Fingerprint recognition
The fingerprint recognition system entails an authentication system that utilizes the specific line patterns on the finger’s surface, for essence, the finger’s ridges, which form a pattern. This type of biometric recognition system is relatively cheap and easy to use. It is unique as each fingerprint pattern varies from the next, thus non-transferable (Bharadwaj, 2014). However, t has its shortcomings given that it is a pattern on lines that can easily be replicated despite being encoded. This is possible through fingerprint spoofing technology. Additionally, fingerprint patterns can wear away over time, depending on the nature of jobs one is involved
Facial recognition
This system analyses different parts of the facial modalities’ position and shapes to create a unique match for each individual. The accuracy level of this technique is very high, therefore impossible to breach. This form of authentication can work even when the subject is not close to the security control system; therefore, it is convenient and comfortable to use (Neto, 2016). However, the system can be affected by poor lighting or objects that may blur a person’s face. Additionally, it is highly affected by variation in facial expression; therefore, a slight difference in the face posture affects the face recognition system’s functionality.
Iris recognition
This system used high-resolution images of the irises of a person’s eye. This technique’s main advantage is that it is impossible to replicate; therefore, it is ranked among the leading forms of biometric authentication systems. However, this technique’s main drawback is that many users are resistant to this technique, as infrared technology could lead to eye irritation. Additionally, iris scanning using shared equipment can become unhygienic. It is also associated with failure in enrollment rates and poor images (Bharadwaj, 2014).
Palm vein recognition
palm vein recognition is one of the most secure forms of biometric authentication. It entails the capturing of the vein patterns of individual near-infrared rays. The pattern is then stored in an encrypted format. Palm vein recognition is very accurate and secure and a less than a percentage error rate. However, it is a palm vein recognition expensive (Marattukalam, 2019).
Voice recognition
Voice recognition uses a voice prompt to initial authentication to grant access to a facility or device. It is a relatively cheap biometric authentication technology that is easy to set up. The downside of voice recognition is that it is easy to mimic, whereby clear recoding could defeat a voice recognition system making it highly susceptible to a system breach. Poor quality of voice samples; additionally, the background noises can make voice recognition (Bharadwaj, 2014).

References
Bharadwaj, S., Vatsa, M., & Singh, R. (2014). Biometric quality: a review of fingerprint, iris, and face. EURASIP Journal on Image and Video Processing, 2014(1), 34.
Ghanavanth, V., Bharadwaj, H., Uma, R., & Krishnamurthy, G. (2018, May). Smart CCTV Surveillance System for Intrusion Detection With Live Streaming. In 2018 3rd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT) (pp. 1030-1035). IEEE.
Jain, D., Ramkumar, D. P., & Sairam, D. K. (2016). IoT based Biometric Access Control System. International Journal of Innovative Research in Science, Engineering and Technology, 5, 555-559.
Marattukalam, F., & Abdulla, W. H. (2019, November). On Palm Vein as a Contactless Identification Technology. In 2019 Australian & New Zealand Control Conference (ANZCC) (pp. 270-275). IEEE.
Neto, A. L. M., Souza, A. L., Cunha, I., Nogueira, M., Nunes, I. O., Cotta, L., … & Oliveira, L. B. (2016, November). Aot: Authentication and access control for the entire iot device life-cycle. In Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD-ROM (pp. 1-15).

.

Order | Check Discount

Tags: Access Control in Security Management

Assignment Help For You!

Special Offer! Get 20-25% Off On your Order!

Why choose us

You Want Quality and That’s What We Deliver

Top Skilled Writers

To ensure professionalism, we carefully curate our team by handpicking highly skilled writers and editors, each possessing specialized knowledge in distinct subject areas and a strong background in academic writing. This selection process guarantees that our writers are well-equipped to write on a variety of topics with expertise. Whether it's help writing an essay in nursing, medical, healthcare, management, psychology, and other related subjects, we have the right expert for you. Our diverse team 24/7 ensures that we can meet the specific needs of students across the various learning instututions.

Affordable Prices

The Essay Bishops 'write my paper' online service strives to provide the best writers at the most competitive rates—student-friendly cost, ensuring affordability without compromising on quality. We understand the financial constraints students face and aim to offer exceptional value. Our pricing is both fair and reasonable to college/university students in comparison to other paper writing services in the academic market. This commitment to affordability sets us apart and makes our services accessible to a wider range of students.

100% Plagiarism-Free

Minimal Similarity Index Score on our content. Rest assured, you'll never receive a product with any traces of plagiarism, AI, GenAI, or ChatGPT, as our team is dedicated to ensuring the highest standards of originality. We rigorously scan each final draft before it's sent to you, guaranteeing originality and maintaining our commitment to delivering plagiarism-free content. Your satisfaction and trust are our top priorities.

How it works

When you decide to place an order with Dissertation App, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.