CHAPTER 2
Understanding Access-Control and Monitoring Systems
If you skipped reading the “Introduction,” you might wonder why there’s an entire Part I devoted to infrastructure security. However, as the “Introduction” pointed out, without physical security there is no security. Infrastructure security operation and management is based on three basic types of subsystems: access-control and monitoring systems (covered in this chapter), video surveillance systems (covered in Chapter 3), and intrusion-detection and reporting systems (covered Chapter 4). In this chapter, you’ll learn to:
- Understand the application of the following concepts of physical security: access control, physical barriers, and biometrics
- Differentiate between authentication and authorization
- Identify commonly used physical access-control systems/devices including keypads, card readers, biometric readers, proximity readers, electronic deadbolts, and magnetic locks