Chapter 11: Electronic Security Systems Flashcards
What are the components of a full-featured access control system?
A credential reader, communication cabling, distributed processor, central database, software, supplementary interfaces to external systems and applications for request to exit devices.
What is personnel access control?
the portion of an access control system used to authorize entry and to verify the authorization of personnel seeking entry to a controlled area.
What is single factor authentification?
When one identification is required for access authorization.
What is dual factor authorization?
When two forms of identification are required for access authorization.
What is it called when three forms of identification are required for access authorization?
Three factor Authorization.
What are some ways to defeat access control points?
- Deceit
- Direct Physical Attack
- Technical Attack
How can an adversary use deceit to defeat an access control point?
By using false pretenses to convince security personnel or an employee to permit entry.
What are some way that an adversary can use direct physical attack to defeat an access control point?
Through force and the use of tools.
How can an adversary defeat an access control point by using a technical attack?
forging a credential or guessing or obtaining pass codes or pins.