Access Control - Blue Book Chapter 8 Flashcards

1
Q

Why is mechanical access control considered the least secure form of access control?

A

Loss or illegitimate use of a key or combination compromises the entire security of whole locking scheme; keys can be lost or duplicated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can something as simple as a lost key cost a company a lot of money?

A

Multiple locks may need to be replaced or re-keyed; keys can be given out to thieves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How is electronic access control different from mechanical access control?

A

Limits access to an area, equipment or information based on an electronic credential and/or code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the main difference between the two control panel types?

A
  1. Stand alone process into locally.

2. Network - process into locally; shares data with other control units or with central processing units.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the two most common communication methods of networked control panels?

A

RS485 and Ethernet
4000’ RS485
295’ Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe the operation on a distributed intelligence system.

A

Multiple local control units connected to a central control unit; local control units store at least some user and transactional data, units make access decisions locally without assistance from central control units or PC; can run in standby mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Most card readers communicate with the control panel over what type cable?

A

5 - 8 conductor shielded cable; 500’ maximum run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Typically, what is the maximum length for a reader cable?

a. Mag Stripe
b. Proximity

A

a. Mag Stripe - 500 ft

b. Proximity - 500 ft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What card format is considered to be the industry standard and what are the two types of card/reader data formatting?

A

Wiegand 26 bit

  1. Pass through data reader
  2. Matched data reader
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are site codes?

A

A set of prefix number to a card’s data information (bit code)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the four methods for reading access control cards?

A
  1. Swipe - card is swiped
  2. Insertion - card is inserted into reader
  3. Touch - card placed on surface
  4. Proximity - card placed in “proximity” of reader.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do the following reader types work?

a. Barcode
b. Mag Strip
c. Proximity

A

a. Barcode - Most basic type, similar to barcodes in retail sales - printed on cared or adhesive label and is least secure. Light source shines on the card and passes the read head and reflects the light back to the light sensor, pulses of light reflected back to the read head are converted into data an sent to control unit.
b. Mag Strip - Commonly used - like credit card/ATM - magnetic material is encoded an the encoding is read when the card passes in front of the read head, duplicated by someone who has a mag strip reader, encoded on specific tracks used for card ID. Last four digits of card as # of owner. Dirt and humidity will shorten life of readers and cards.
c. Proximity - Timed circuit embedded in plastic card. Uses RF signals. Virtually impossible to duplicate and comparably priced. Very resistant to dirt and humidity.
d. Wiegand - Strips of special magnetic vicalloy wires embedded . Senses pulses from magnetic field of wires. High security virtually impossible to duplicate. Costs more. Dirt and humidity, being or bent or flexed will shorten life of reader..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the five basic forms of proximity media?

A
  1. Standard (clamshell) - most economical
  2. Keyfob/Keytag - Keyring
  3. ISO - Credit card sized optional ID
  4. Stick on - Self adhesive disks
  5. Powered - vehicle or long range apps
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the normal read range for a proximity reader?

A

1 to 8 inches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What card can be used to increase the range of a reader?

A

Powered card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why are proximity readers ideal for high traffic doors?

A

No contact; provides higher portal throughout (processes more users quickly)

17
Q

What makes a smart card different from other card types?

A

Card has electronic memory; critical information is stored and non-erasable.

18
Q

Where are contact type smart cards mainly used?

A

Credit or ATM cards, fuel cards, mobile phone SIMs, authorization cards for pay television

19
Q

What information can be stored on smart cards?

A

Access-related information, fingerprint templates, log access activity, personal financial information, college campus application photo, dorm room, meal plan, textbook debit, medical alert.

20
Q

What are hybrid/mixed cards?

A

Smart proximity tech and standard proximity on same card. (wiegand, magstrip, or barcode)

21
Q

How can you increase the security of a keypad?

A

you have this crossed off - maybe adjust the volume of the beep?

22
Q

What type of connection is needed when interfacing with the fire alarm panel?

A

Fail safe relay

23
Q

What is the purpose of an audit trail?

A

Detailed list of all transaction occurring on the system (records/monitors)

24
Q

What type of lock is always fail safe?

A

Mag lock