- Surveillance
- Access Control (who can go where and when)
- Intrusion Detection
Identification categories, from least to most secure:
- object ID - key, card - can be stolen, lost
- data - password, keycode - can be forgotten, give to unauthorized parties
- personal attribute - retinal scan, fingerprints - difficult to fake
- a combination of 2 or all of the above
EAC online system - can be reprogrammed centrally. Generic example:
- lock (elec. strike)
- ID reader
- door contact - determines if door is open or closed only. signals fault depending on reader/REX*
- REX - request to exit sensor. temporarily overrides door fault alarm for exiting
- access panel connected to the 4 devices above, processes request - wired to PC, which keeps records
*Priority 1 fault: contact is open w/o as successful scan
Priority 2 fault: door propped open. happens after a successful scan
EAC offline system - self-contained, no connection to PC. Must be reprogrammed locally.
notes from a presentation at HOLT by:
Ingersoll Rand
Stephen Pemberton