1 / 7

Overview of Intrusion Detection and Access Control Systems

This chapter presents an overview of Intrusion Detection Systems (IDS) and Access Control Systems (ACS), focusing on their functions within electronic security systems (ESS). It covers the various components like Integrated Electronic Systems, Alarm Monitoring Systems, and Data Transmission Media, alongside policies and response times. The chapter also delves into the key factors for access control: possession, knowledge, and identity, exemplified by technologies such as biometrics and two-factor authentication.

korene
Télécharger la présentation

Overview of Intrusion Detection and Access Control Systems

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. EC4019 PAIntrusion & Access Control Technology (IACT) Chapter 1 Overview Prepared by: Sandy Tay TH

  2. Chapter 1 Overview of IDS and ACS Introduction and functions Prepared by: Sandy Tay TH

  3. What is Electronics Security System (ESS) ? Integrated electronic system • Access Control System (ACS) • Data Transmission Media (DTM) • Alarm monitoring systems • Policies, procedures, • response times CCTV Prepared by: Sandy Tay TH

  4. Physical Security System ESS is part of the Physical Security System Prepared by: Sandy Tay TH

  5. Intrusion Detection System to detect intruders and notify the appropriate parties Prepared by: Sandy Tay TH

  6. Access Control System • Means of identifying a person or a thing • 3 Common factors: • What you have? • What you know? • Who you are? • Examples: Biometrics, Keypad Card Access Password 2 factor authentication Prepared by: Sandy Tay TH

  7. Typical Access Control System Functional block More Prepared by: Sandy Tay TH

More Related