Electronic Access Control ( 2 )

Publication series :2

Author: Norman   Thomas L.  

Publisher: Elsevier Science‎

Publication year: 2017

E-ISBN: 9780128093405

P-ISBN(Paperback): 9780128054659

Subject: TU89 safety equipment

Keyword: 社会科学理论与方法论

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Description

Electronic Access Control, Second Edition provides the latest advice on how to interface systems from multiple Electronic Access Control (EAC) manufacturers into a single cohesive system. The book shows how to provide integration, while also allowing building security managers to protect, control and manage their own users’ card data.

This second edition details advanced card data management and advanced system access level management. Readers will be better able to manage their systems to protect the privacy of their cardholders’ private information, while providing much improved control over the security of their buildings.

Like its highly regarded first edition, the book offers the complete picture on EAC for readers at any level of expertise. It provides comprehensive material on how to select, and interface to, the appropriate locking hardware, typically the most difficult responsibility for access control system designers, installers and end users.

  • Provides a comprehensive understanding of Electronic Access Control (EAC) Systems to readers at any level, novices and experts alike
  • Helps readers understand concepts for securing a facility, while providing transparent access to those who frequently, and legitimately, enter the facility
  • Includes expanded information on system configurations, including user data security, access levels, access clearances and groups, and system interfaces
  • Offers all new material on how

Chapter

Part II: how things work

Chapter 4

Chapter 5

Chapter 6

Chapter 7

Chapter 8

Chapter 9

Chapter 10

Chapter 11

Chapter 12

Chapter 13

Chapter 14

Chapter 15

Chapter 16

Chapter 17

Chapter 18

Part III: The things that make systems sing

Chapter 19

Chapter 20

Chapter 21

Chapter 22

Chapter 23

Chapter 24

Chapter 25

Chapter 26

Chapter 27

Chapter Summary

2 Foundational Security and Access Control Concepts

Chapter Overview

Understanding Risk

Types of organization assets

Types of users

Types of threat actors

Understanding criticalities and consequences

Understanding vulnerability

Understanding probability

What is risk?

Managing Risk

Methods of managing risk

How security and access control programs help manage risk

Security program elements

The importance of a qualified risk analysis

The importance of security policies and procedures

Types of Countermeasures

Hi-tech

Lo-tech

No-tech

Mixing approaches

Layering security countermeasures

Access Control System Concepts

Types of users

Types of areas/groups

User schedules

Portal programming

Credential programming

Group and schedule programming

Chapter Summary

3 How Electronic Access Control Systems Work

Chapter Overview

First, a Little History

The Basics

Authorized Users, User Groups, Access Zones, Schedules, and Access Groups

Authorized users

User groups

Access zones

Schedules

Access groups

Portals

Types of portals

Credential readers

Electrified locks

Safety systems

Alarm monitoring

Request-to-exit sensors

Credentials and Credential Readers

Credential authorization

Locks, Alarms, and Exit Devices

Electrified locks

Alarms

Exit Devices

Data, Data Retention, and Reports

Chapter Summary

II. How Things Work

4 Access Control Credentials and Credential Readers

Chapter Overview

Access Credentialing Concepts

Keypads

Access Cards, Key Fobs, and Card Readers

Wiegand Wire Cards

125K Passive Proximity Cards

125KHz (Low Frequency) Active Proximity Cards

13.56MHz (High Frequency) Contactless Smart Cards

RFID Wireless Transmitter Systems

Multitechnology Cards

Mobile Phone Access Control

Capture Card Reader

Multitechnology Card Readers

Biometric Readers

Photo Identification

Chapter Summary

5 Types of Access Controlled Portals

Chapter Overview

Portal Passage Concepts

Card entry/free exit

Card entry/card exit

Tailgate detection

Positive access control

2-Man rule

Schedules

Antipassback

Pedestrian Portal Types

Standard doors

Automatic doors

Revolving doors

Turnstiles

Man-traps

Automated walls

Vehicle Portals

Standard barrier gates

Automated vehicle swing gates

Automated sliding vehicle gates

Automated roll-up vehicle gates

High-security barrier gates

Sally ports

Chapter Summary

6 Life Safety and Exit Devices

Chapter Overview

Life Safety First

Security Versus Life Safety

Understanding National and Local Access Control Codes and Standards

NFPA 101

International building code

NFPA 72

More on these codes

UL 294

Life Safety and Locks

Life Safety and Exit Devices

Life Safety and Fire Alarm System Interfaces

Chapter Summary

7 Door Types and Door Frames

Chapter Overview

Basics About Doors and Security

Standard Single-Leaf and Double-Leaf Swinging Doors

Hollow metal doors

Solid core wood doors

Framed glass doors

Unframed glass doors

Total doors

Pivoting doors

Balanced doors

Door Frames and Mountings

Hollow metal—high-use and high-impact

Aluminum—medium-use and medium-impact

Wood—light-use and light-impact

Door mounting methods

Overhead Doors

Roll-up doors

Paneled overhead doors

Revolving Doors

Sliding Panel Doors

Bifold and Fourfold Doors

Chapter Summary

8 Doors and Fire Ratings

Chapter Overview

What Are Fire Ratings?

Basic fire egress concept

How should this be done?

Exceptions

Fire Penetration Ratings

Hose stream test

Door Assembly Ratings

The three-fourths rule

Doors with glass

Temperature rise doors

Louvers

Fire Door Frames and Hardware

Latching devices

Fire exit hardware

Pairs of Doors

Latching hardware

Inactive leaf on pair of doors

Double egress pairs

Astragals

Smoke and draft control

“Path of Egress” Doors

Electrified Locks and Fire Ratings

Additional References

Chapter Summary

9 Electrified Locks—Overview

Chapter Overview

Why Electric Locks?

Types of Electrified Locks

How Electrified Locks Work

Electric strikes

Electrified mortise locks

Electrified panic hardware

Electrified cylinder locks

Magnetic locks

Electrified dead-bolts

Paddle-operated electromechanical dead-bolts

Lock Power Supplies

Electrified Lock Wiring Considerations

Voltage drop example

Electrified Lock Controls

Types of Locks Not Recommended

Chapter Summary

10 Free Egress Electrified Locks

Chapter Overview

Types of Free Egress Locks

Electrified Mortise Locks

Mortise latch only—no lock

Mortise locks with no dead-bolt

Mortise locks with dead-bolts

Door frame considerations

Additional lock switch fittings

Door handing

Electrified “Panic” Hardware

Rim exit devices

Mortise lock exit devices

Surface-mounted vertical rod exit devices

Concealed vertical rod exit devices

Three-point latching exit device

Exit device functions

Electrical options

Popular double door applications

Electric Strikes

Switches available for electric strikes

Electrified Cylinder Locks

Self-Contained Access Control Locks

Chapter Summary

11 Magnetic Locks

Chapter Overview

Standard Magnetic Locks

Standard magnetic lock applications

Magnetic Shear Locks

Magnetic shear lock applications

Magnetic Gate Locks

Cautions About Magnetic Locks

Egress assurance

Operational and maintenance warnings

Chapter Summary

12 Electrified Dead-Bolt Locks

Chapter Overview

Surface-Mounted Electrified Dead-Bolt Locks

Concealed Direct-Throw Mortise Dead-Bolt Lock

Dead-Bolt Equipped Electrified Mortise Lock

Top-Latch Release Bolt

Electrified Dead-Bolt Gate Locks

Electrified dead-bolt lock safety provisions

Chapter Summary

13 Specialty Electrified Locks

Chapter Overview

Electrified Dead-Bolt-Equipped Panic Hardware

Securitech Locks

Delayed Egress Locks

Specialize school locks to protect against active shooters

Hi-Tower Locks

CRL-Blumcraft Panic Hardware

Chapter Summary

14 Selecting the Right Lockset for a Door

Chapter Overview

Standard Application Rules

How to Select the Right Lock for Any Door

Description of door

Framed glass door

Herculite lobby doors

High-rise building stair-tower door

Rear-exit door on warehouse with hi-value equipment

Office suite door

Double-egress doors—hospital corridor

Inswinging office door

Revolving door—emergency egress side door

Chapter Summary

15 Specialized Portal Control Devices and Applications

Chapter Overview

Specialized Portals for Pedestrians

Automatic doors

Man-traps

Full-verification portals

Electronic turnstiles

Antitailgate alarm

Specialized Portals for Vehicles

High-security barrier gates

Sally ports

Chapter Summary

16 Industry History That can Predict the Future

Chapter Overview

A Little Background

First Generation

Second Generation

Third Generation

Fourth Generation

Stalled progress

Fifth Generation

Avoiding Obsolescence

Planned obsolescence

Unplanned obsolescence

What the future holds

Chapter Summary

17 Access Control Panels and Networks

Chapter Overview

Access Control Panel Attributes and Components

Communications Board

Power supply and battery

Central processing unit

Erasable programmable read-only memory

Random access memory

Input/output interfaces

Access Control Panel Form Factors

Access Control Panel Functions

Access Control Panel Locations

Local and Network Cabling

Networking Options

Redundancy and Reliability Factors

Good wiring and installation

Good design

Good power

Good data infrastructure

Redundancy

Chapter Summary

18 Access Control System Servers and Workstations

Chapter Overview

Server/Workstation Functions

Store system configurations

Store the system’s historical event data

Manage communications throughout the entire system

Serve workstations with real-time data and reports

Decision Processes

System Scalability

Unscalable Systems

Basic scalability

Multisite systems

System-wide card compatibility

Enterprise-wide system

Master host

Super-host/subhost

Access Control System Networking

The core network

The server network

The workstation network

The access control panel network

Integrated security system interfaces

VLANs

Multisite network interfaces

Integration to the business information technology network

Legacy Access Control Systems

Chapter Summary

III. The Things That Make Systems Sing

19 Security System Integration

Chapter Overview

Why Security Systems Should Be Integrated

Integration Concepts

Benefits of System Integration

Operational benefits

Cost benefits

Types of Integration

Dry contact integration

Wet contact integration

Serial Data Integration

TCP/IP Integration

Database Integration

System Integration Examples

Basic system integration

More advanced system integration

Advanced system integration

Chapter Summary

20 Integrated Alarm System Devices

Chapter Overview

Alarm Concepts

Detection and initiation

Filtering and alarm states

Communication and annunciation

Assessment

Response

Evidence

Types of Alarm Sensors

Outer perimeter detection systems

Building perimeter detection systems

Interior volumetric sensors

Interior point detection systems

Intelligent video analytics sensors

Complex alarm sensing

Beyond Alarm Detection

Trend analysis

Vulnerability analysis

Alarm analysis

Chapter Summary

21 Related Security Systems

Chapter Overview

Photo ID Systems

Visitor Management Systems

Security Video

Video history you need to know

Cameras and lenses

Lighting and light sources

Lighting levels

Lighting sources

Important facts about lighting for security video

What we see

Auto-white balance

Dynamic range

Display devices

Video recording devices

Video motion detectors

Video analytics

Video system interfaces

Security Communications

Two-way radio

Telephones

Security intercoms and bullhorns

Public address systems

Nextel phones

Voice loggers

Smart phones and tablets

Consolidated communication systems

Security Architecture Models for Campuses and Remote Sites

Command, Control, and Communications Consoles

Chapter Summary

22 The Merging of Physical and IT Security

Chapter Overview

There Is Only One Security Mission

IT Security and Physical Security Share the Same Mission

What Vulnerabilities Exist Between IT & Physical Security?

Sophisticated Threat Actors Are Exploiting Those Vulnerabilities

Learn How to Reduce and Mitigate Those Vulnerabilities

Chapter 21a—Chapter Summary

Chapter 21a Summary—The Merging of Physical and IT Security

23 Securing the Security System

Chapter Overview

Understand That the Organization Isn’t Secure If the Security System Isn’t Secure

What Kinds of Threats Present a Problem to Securing the System Data?

What Kinds of Vulnerabilities Can Exist in the Security System Itself?

What Can We Do To Secure the Security System?

A 9 Point Plan for Securing the Security System

Chapter Summary

Chapter 21b—Chapter Summary

24 Related Building/Facility Systems and REAPS Systems

Chapter Overview

Building/Facility Systems

Elevators

Stairwell pressurization

Lighting

Controlling and Automating Building Functions

Direct action interfaces

Proxy action interfaces

Feedback interfaces

REAPS Systems

Irrigation systems

Deluge fire sprinkler control

Acoustic weapons

High-voltage weaponry

Remotely operated weaponry

Appropriateness

Operationally

Safety systems

Chapter Summary

25 Cabling Considerations

Chapter Overview

Cable Types

Copper/fiber

Cable voltage and power classes

Wire gauge

Insulation types

Stranded versus solid core wires

Cable colors

Cable brands

Conduit or No Conduit

Why use conduit?

Types of conduit

Other wireways

Indoor conduit applications

Outdoor conduit applications

When you can forget about conduit

Conduit fill

Conduit bends

Conduit/cable fire protection

Cable Handling

Cable handling nightmares

Cable handling and system troubleshooting

Cable Dressing Practices

What is cable dressing?

Cable dressing nightmares

Cable dressing and system troubleshooting

The proper way to dress cables

Cable cross-dressing

Cable Documentation

What is cable documentation?

Who cares about cable documentation?

When should cable documentation begin?

What is the best way to document cabling?

What is the best way to present cable documentation?

Chapter Summary

26 Environmental Considerations

Chapter Overview

Electronic Circuitry Sensitivities

Environmental Factors in System Failures

Temperature extremes

Humidity or condensation

Vibrations

Dirt

Insects, birds, snakes, and other creatures

Lighting (at access control system portals)

Securing the IP network

Access control in the cloud

Security-systems as-a-service

Chapter Summary

27 Access Control Design

Chapter Overview

Design Versus Installation Versus Maintenance (The Knowledge Gap)

The Importance of Designing to Risk

The Importance of Designing for the Future

Design Elements

Drawings

Specifications

Interdiscipline coordination

Product selection

Project management

Client management

Designing Robust Portals—How Criminals Defeat Common Locks, Doors, and Frames

Unlocking the door from the outside

Double glass door exploit

Defeating electrified panic hardware

Defeating door frames

Application Concepts

Robust design

Redundancy

Expandable and flexible

Easy to use

Sustainable

Implementing Design Ideas to Paper

Creating access control zones

Door types

Alarm devices

Racks, consoles, and panels

Conduits and boxes

Physical details

Riser diagrams

Single-line diagrams

Wiring diagrams

Schedules

System Installation

Project planning

Project schedule

Shop and field drawings

Product acquisition

Permits

Coordination with other trades

Access coordination

Preliminary checks and testing

Final works

System Commissioning

Completing Punch List Items

System Acceptance

Chapter Summary

28 Access Control System Installation and Commissioning

Chapter Overview

Jobsite Considerations

Conduit Versus Open Cabling

Device Installation Considerations

The Importance of Documentation

Device Setup and Initial Testing

Alarm and Reader Device Database Setup

User Access Database Setup

Access Schedules and Areas

Chapter Summary

29 System Management, Maintenance, and Repair

Chapter Overview

Management

Governance, Risk Management and Compliance

Database management

Merging databases of different systems on a common corporate campus

Alarm management

Reports

Maintenance and Repair

System as-built drawings

Wire run sheets

System infant mortality

Maintenance versus repairs

Scheduled maintenance

Emergency repairs

Maintenance contracting options

In-house technician

Extended warranty

Annual maintenance agreement

On-call maintenance and repairs

Security System Integrity Monitoring

Chapter Summary

Index

Back Cover

The users who browse this book also browse


No browse record.