ec4019 pa intrusion & access control technology (iact) prepared by: sandy tay th 1 chapter...
TRANSCRIPT
![Page 1: EC4019 PA Intrusion & Access Control Technology (IACT) Prepared by: Sandy Tay TH 1 Chapter 1Overview](https://reader036.vdocument.in/reader036/viewer/2022062807/5697bfed1a28abf838cb8ff8/html5/thumbnails/1.jpg)
Prepared by: Sandy Tay TH 1
EC4019 PAIntrusion & Access Control Technology (IACT)
Chapter 1 Overview
![Page 2: EC4019 PA Intrusion & Access Control Technology (IACT) Prepared by: Sandy Tay TH 1 Chapter 1Overview](https://reader036.vdocument.in/reader036/viewer/2022062807/5697bfed1a28abf838cb8ff8/html5/thumbnails/2.jpg)
Prepared by: Sandy Tay TH 2
Electronics Security
System
Intrusion Detection System
Access Control Systems
Introduction andfunctions
Chapter 1 Overview of IDS and ACS
![Page 3: EC4019 PA Intrusion & Access Control Technology (IACT) Prepared by: Sandy Tay TH 1 Chapter 1Overview](https://reader036.vdocument.in/reader036/viewer/2022062807/5697bfed1a28abf838cb8ff8/html5/thumbnails/3.jpg)
Prepared by: Sandy Tay TH
3
What is Electronics Security System (ESS) ?
Integrated electronic system
Access Control System (ACS)
CCTV
Data Transmission Media (DTM)
• Alarm monitoring systems• Policies, procedures, response times
![Page 4: EC4019 PA Intrusion & Access Control Technology (IACT) Prepared by: Sandy Tay TH 1 Chapter 1Overview](https://reader036.vdocument.in/reader036/viewer/2022062807/5697bfed1a28abf838cb8ff8/html5/thumbnails/4.jpg)
Prepared by: Sandy Tay TH
4
Physical Security System
ESS is part of the Physical Security System
![Page 5: EC4019 PA Intrusion & Access Control Technology (IACT) Prepared by: Sandy Tay TH 1 Chapter 1Overview](https://reader036.vdocument.in/reader036/viewer/2022062807/5697bfed1a28abf838cb8ff8/html5/thumbnails/5.jpg)
Prepared by: Sandy Tay TH
5
Intrusion Detection System
to detect intruders and notify the appropriate parties
![Page 6: EC4019 PA Intrusion & Access Control Technology (IACT) Prepared by: Sandy Tay TH 1 Chapter 1Overview](https://reader036.vdocument.in/reader036/viewer/2022062807/5697bfed1a28abf838cb8ff8/html5/thumbnails/6.jpg)
Prepared by: Sandy Tay TH
6
Access Control System
Means of identifying a person or a thing3 Common factors:
What you have? What you know? Who you are?
Examples:
Card AccessBiometrics, Keypad Password 2 factor authentication
![Page 7: EC4019 PA Intrusion & Access Control Technology (IACT) Prepared by: Sandy Tay TH 1 Chapter 1Overview](https://reader036.vdocument.in/reader036/viewer/2022062807/5697bfed1a28abf838cb8ff8/html5/thumbnails/7.jpg)
Prepared by: Sandy Tay TH
7
Typical Access Control System
Functional block
More