Tuesday, February 12, 2008

Hints When Specifying Access Control Systems


Layered security – contactless smart cards – the perils of using CSN readers – Wiegand, RS485, F/2F and TCP/IP protocols – conduit-protected wiring – avoiding swap-out readers – use of security screws for readers – anti-pass back – tamper detection – real-time integrity monitoring – geographic monitoring – use of keypads – use of proprietary card formats – card holograms.....

These are all issues discussed in an excellent article written by HID's Michael L Davis, which can be found in December’s issue of the India Safe security magazine. To read this article, click here.
The basics of access control are covered in Security Management Stage 1, 31 March – 11 April 2008. Electronic access control systems are discussed in more technical detail during the Specifying Security Technology Course, 21-25 July 2008.

For details contact Janet.