{"id":2284,"date":"2022-10-31T11:16:28","date_gmt":"2022-10-31T04:16:28","guid":{"rendered":"https:\/\/nawakara.com\/en\/?p=2284"},"modified":"2022-12-01T11:20:13","modified_gmt":"2022-12-01T04:20:13","slug":"access-control-increasing-safety-and-efficiency","status":"publish","type":"post","link":"https:\/\/nawakara.com\/en\/access-control-increasing-safety-and-efficiency\/","title":{"rendered":"Access Control: Increasing Safety and Efficiency"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Access control is one of the most important parts that needs to be considered in implementing a good security system.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Simply put, access control is a selective restriction of access (and in some cases, exits) into a space that could be both physical (such as a room in a building) or virtual (such as a folder in a computer).\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The main objective of implementing access control is to increase security by ensuring that only authorized personnel have access to those spaces. In this context, permission to access such spaces is called \u201cauthorization\u201d.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Though it might sound a little complicated, simple examples of access control implementations are found everywhere in our daily life. Things that\u2019s very likely you have done, or at the very least, seen.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For example, locking the door to your house means that you have restricted access to your house for anyone other than yourself or anyone that doesn\u2019t have your authorization (though in this case, anyone that has the key to your house is practically \u201cauthorized\u201d to enter. A limitation of only using keys and locks in implementing access control that will be discussed further in this article).\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Another example is using a password for your phone, that limits access to anything inside your phone for anyone without the password.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But those two examples are simple examples of access control implementation in a more private space. How about the implementation of access control in a more public space. Where there are lots of people with different kinds of authorization(s) to different kinds of places within the space.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This article will specifically discuss the implementation of access control in the physical space.\u00a0<\/span><\/p>\n<p><b>Physical Access Control<\/b><\/p>\n<p><span style=\"font-weight: 400;\">In the field of physical security, the objective of access control implementation is to restrict access to a physical space (such as office building, train station, etc.) only to people that have the authority.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Furthermore, these authorized people could only access these spaces through an established entry point. These entry points could be in the form of doors, turnstiles, or other things that are encircled by a wall or fence to avoid circumventing.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So, how does physical access control work?<\/span><\/p>\n<p><b>How Physical Access Control Work<\/b><\/p>\n<p><span style=\"font-weight: 400;\">As previously mentioned, the simplest way of implementing access control is the use of keys and locks. The use of keys and locks ensure the authorization of entry to a particular space through the established access point is only given to the person with the keys.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But this is where the problem starts. By using only keys and locks practically means anyone with the keys is \u201cauthorized\u201d to access anything it opens.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Keys can\u2019t \u201ctell\u201d who&#8217;s holding it or trying to open its lock. For example, people who\u2019s not actually authorized to open a door to your office room can still access it if they have the key. On the contrary, you, the one that have the actual authorization to access your office room, can\u2019t access it if you don\u2019t have the key.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Keys are easily lost, broken, and even duplicated. Using only keys and locks needs a further key management that\u2019s time consuming to ensure the correct implementation of access control. Hance, creating additional burden in securing your facilities.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is where technology comes in. The advancement of technology in security devices answers the limitations of using keys and locks to implement access control by using electronic devices. Hence, this method is better known as electronic access control.<\/span><\/p>\n<p><b>Electronic Access Control<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Unlike keys and locks, electronic access control needs to identify the person who\u2019s trying to access a particular access point.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Instead of a key, every person that\u2019s authorized to access the access point holds their own key. Commonly in the form of an access card. This access card stored their personal information that needed to be given for them to be granted access.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This information is given through a reader that was placed near the access point. In turn, this reader then forwards the information to a controller that checks it within a created database.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If the information in the key card matches the information in the database, then access is granted, and the person can enter through the access point. But if it doesn&#8217;t match, then obviously the person will not be granted access.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Whatever the results are, any attempt to access an access point using electronic devices will then be noted in the form of log.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But doesn\u2019t that mean electronic access control is just a \u201cfancier\u201d version of keys and locks.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The answer is yes and no.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While it is true that anyone who has the key card could access that access point, using electronic access control enables you to have additional security measures. A process known as two-factor authentication.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A two-factor authentication needs additional information of the key card holders for them to be granted access. Information that only the key card holder should know or have, such as:\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Password or PIN numbers<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">ID card<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Fingerprint or other biometric input<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Without having this additional information, the key card holder won\u2019t be granted access to that access point.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If that\u2019s not enough reason for you to consider using electronic access control. Here are some other reasons that might change your mind<\/span><\/p>\n<p><b>Advantages of Using Electronic Access Control<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Using electronic access control enables you to easily set up pre-determined parameters of every individual in an access control system. This will give you a lot more control on:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Who is given the authorization<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">What room(s) they are authorized to access<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">When they\u2019re able to access it<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">In what conditions they\u2019re able to access it<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">That you could change or update whenever you think is required.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Furthermore, by being noted in the form of log makes it easier for you to monitor any attempt of access. So, if any security incidents happened, you will easily determine whoever is involved in that incident.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Using electronic access control is by far the more effective and efficient way in implementing access control. Increasing the security of your facility.<\/span><\/p>\n<p><b>Increasing Your Company\u2019s Security and Efficiency with Nawakara<\/b><\/p>\n<p><span style=\"font-weight: 400;\">In Nawakara, we believe that everyone needs to feel safe. Having that peace of mind in doing their everyday activities. Access control is one of the elements in crime prevention through environmental design to increase your facility safety.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Crime prevention through environmental design itself is a part of our Integrated Security Solutions.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As a company that can offer you an integrated security solution, we will ensure that your access control system will work together with other security elements that are tailored to your security needs.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With the newest electronic security devices, we will also ensure that your access control system will work effectively.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Overall, increasing your company\u2019s security and efficiency.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For further information, feel free to contact us through <\/span><a href=\"https:\/\/nawakara.com\/en\/contact-us\/\"><span style=\"font-weight: 400;\">this link<\/span><\/a><b>.<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Access control is one of the most important parts that needs to be considered in implementing a good security system.\u00a0 Simply put, access control is a selective restriction of access (and in some cases, exits) into a space that could be both physical (such as a room in a building) or virtual (such as a [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2285,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[],"class_list":["post-2284","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-article"],"_links":{"self":[{"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/posts\/2284","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/comments?post=2284"}],"version-history":[{"count":3,"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/posts\/2284\/revisions"}],"predecessor-version":[{"id":2288,"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/posts\/2284\/revisions\/2288"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/media\/2285"}],"wp:attachment":[{"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/media?parent=2284"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/categories?post=2284"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/tags?post=2284"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}