Chapter
Part III: The things that make systems sing
2 Foundational Security and Access Control Concepts
Types of organization assets
Understanding criticalities and consequences
Understanding vulnerability
Understanding probability
How security and access control programs help manage risk
Security program elements
The importance of a qualified risk analysis
The importance of security policies and procedures
Layering security countermeasures
Access Control System Concepts
Group and schedule programming
3 How Electronic Access Control Systems Work
Authorized Users, User Groups, Access Zones, Schedules, and Access Groups
Credentials and Credential Readers
Locks, Alarms, and Exit Devices
Data, Data Retention, and Reports
4 Access Control Credentials and Credential Readers
Access Credentialing Concepts
Access Cards, Key Fobs, and Card Readers
125K Passive Proximity Cards
125KHz (Low Frequency) Active Proximity Cards
13.56MHz (High Frequency) Contactless Smart Cards
RFID Wireless Transmitter Systems
Mobile Phone Access Control
Multitechnology Card Readers
5 Types of Access Controlled Portals
Automated vehicle swing gates
Automated sliding vehicle gates
Automated roll-up vehicle gates
High-security barrier gates
6 Life Safety and Exit Devices
Security Versus Life Safety
Understanding National and Local Access Control Codes and Standards
International building code
Life Safety and Exit Devices
Life Safety and Fire Alarm System Interfaces
7 Door Types and Door Frames
Basics About Doors and Security
Standard Single-Leaf and Double-Leaf Swinging Doors
Door Frames and Mountings
Hollow metal—high-use and high-impact
Aluminum—medium-use and medium-impact
Wood—light-use and light-impact
Bifold and Fourfold Doors
Basic fire egress concept
Fire Door Frames and Hardware
Inactive leaf on pair of doors
Electrified Locks and Fire Ratings
9 Electrified Locks—Overview
Types of Electrified Locks
How Electrified Locks Work
Electrified mortise locks
Electrified panic hardware
Electrified cylinder locks
Paddle-operated electromechanical dead-bolts
Electrified Lock Wiring Considerations
Electrified Lock Controls
Types of Locks Not Recommended
10 Free Egress Electrified Locks
Types of Free Egress Locks
Electrified Mortise Locks
Mortise latch only—no lock
Mortise locks with no dead-bolt
Mortise locks with dead-bolts
Door frame considerations
Additional lock switch fittings
Electrified “Panic” Hardware
Mortise lock exit devices
Surface-mounted vertical rod exit devices
Concealed vertical rod exit devices
Three-point latching exit device
Popular double door applications
Switches available for electric strikes
Electrified Cylinder Locks
Self-Contained Access Control Locks
Standard magnetic lock applications
Magnetic shear lock applications
Cautions About Magnetic Locks
Operational and maintenance warnings
12 Electrified Dead-Bolt Locks
Surface-Mounted Electrified Dead-Bolt Locks
Concealed Direct-Throw Mortise Dead-Bolt Lock
Dead-Bolt Equipped Electrified Mortise Lock
Electrified Dead-Bolt Gate Locks
Electrified dead-bolt lock safety provisions
13 Specialty Electrified Locks
Electrified Dead-Bolt-Equipped Panic Hardware
Specialize school locks to protect against active shooters
CRL-Blumcraft Panic Hardware
14 Selecting the Right Lockset for a Door
Standard Application Rules
How to Select the Right Lock for Any Door
High-rise building stair-tower door
Rear-exit door on warehouse with hi-value equipment
Double-egress doors—hospital corridor
Revolving door—emergency egress side door
15 Specialized Portal Control Devices and Applications
Specialized Portals for Pedestrians
Full-verification portals
Specialized Portals for Vehicles
High-security barrier gates
16 Industry History That can Predict the Future
17 Access Control Panels and Networks
Access Control Panel Attributes and Components
Erasable programmable read-only memory
Access Control Panel Form Factors
Access Control Panel Functions
Access Control Panel Locations
Local and Network Cabling
Redundancy and Reliability Factors
Good wiring and installation
18 Access Control System Servers and Workstations
Server/Workstation Functions
Store system configurations
Store the system’s historical event data
Manage communications throughout the entire system
Serve workstations with real-time data and reports
System-wide card compatibility
Access Control System Networking
The access control panel network
Integrated security system interfaces
Multisite network interfaces
Integration to the business information technology network
Legacy Access Control Systems
III. The Things That Make Systems Sing
19 Security System Integration
Why Security Systems Should Be Integrated
Benefits of System Integration
System Integration Examples
More advanced system integration
Advanced system integration
20 Integrated Alarm System Devices
Filtering and alarm states
Communication and annunciation
Outer perimeter detection systems
Building perimeter detection systems
Interior volumetric sensors
Interior point detection systems
Intelligent video analytics sensors
21 Related Security Systems
Visitor Management Systems
Video history you need to know
Lighting and light sources
Important facts about lighting for security video
Security intercoms and bullhorns
Consolidated communication systems
Security Architecture Models for Campuses and Remote Sites
Command, Control, and Communications Consoles
22 The Merging of Physical and IT Security
There Is Only One Security Mission
IT Security and Physical Security Share the Same Mission
What Vulnerabilities Exist Between IT & Physical Security?
Sophisticated Threat Actors Are Exploiting Those Vulnerabilities
Learn How to Reduce and Mitigate Those Vulnerabilities
Chapter 21a—Chapter Summary
Chapter 21a Summary—The Merging of Physical and IT Security
23 Securing the Security System
Understand That the Organization Isn’t Secure If the Security System Isn’t Secure
What Kinds of Threats Present a Problem to Securing the System Data?
What Kinds of Vulnerabilities Can Exist in the Security System Itself?
What Can We Do To Secure the Security System?
A 9 Point Plan for Securing the Security System
Chapter 21b—Chapter Summary
24 Related Building/Facility Systems and REAPS Systems
Building/Facility Systems
Controlling and Automating Building Functions
Deluge fire sprinkler control
Remotely operated weaponry
25 Cabling Considerations
Cable voltage and power classes
Stranded versus solid core wires
Indoor conduit applications
Outdoor conduit applications
When you can forget about conduit
Conduit/cable fire protection
Cable handling nightmares
Cable handling and system troubleshooting
Cable dressing nightmares
Cable dressing and system troubleshooting
The proper way to dress cables
What is cable documentation?
Who cares about cable documentation?
When should cable documentation begin?
What is the best way to document cabling?
What is the best way to present cable documentation?
26 Environmental Considerations
Electronic Circuitry Sensitivities
Environmental Factors in System Failures
Insects, birds, snakes, and other creatures
Lighting (at access control system portals)
Access control in the cloud
Security-systems as-a-service
Design Versus Installation Versus Maintenance (The Knowledge Gap)
The Importance of Designing to Risk
The Importance of Designing for the Future
Interdiscipline coordination
Designing Robust Portals—How Criminals Defeat Common Locks, Doors, and Frames
Unlocking the door from the outside
Double glass door exploit
Defeating electrified panic hardware
Implementing Design Ideas to Paper
Creating access control zones
Racks, consoles, and panels
Coordination with other trades
Preliminary checks and testing
Completing Punch List Items
28 Access Control System Installation and Commissioning
Conduit Versus Open Cabling
Device Installation Considerations
The Importance of Documentation
Device Setup and Initial Testing
Alarm and Reader Device Database Setup
User Access Database Setup
Access Schedules and Areas
29 System Management, Maintenance, and Repair
Governance, Risk Management and Compliance
Merging databases of different systems on a common corporate campus
Maintenance versus repairs
Maintenance contracting options
Annual maintenance agreement
On-call maintenance and repairs
Security System Integrity Monitoring