Definition
Access controls are the mechanisms that monitor, prevent, and control access to essential resources, from buildings and garage doors to network data repositories.
Introduction
As technology becomes increasingly pervasive, access controls are everywhere. Examples of access controls include the use of access cards to gain entry into controlled areas, buildings and parking spaces, the use of biometric authentication to access cell phones, and the use of online credentials to access social media like Facebook and Twitter and credentials required to gain access to work computers.
Access controls are categorized into two types, logical and physical. Logical access controls feature connections using hardware, software, identification protocols, authentication, authorization, and accountability (audit), to allow access to a computer system and/or a network resource. Physical access controlsrefer to access to buildings, rooms, and control gates. These controls use key fobs, access...
References
Access controlled egress doors building code. (n.d.-a). Retrieve from 2018 International Building Code https://codes.iccsafe.org/public/document/IBC2018 and Chapter 10 - Means of Egress https://codes.iccsafe.org/public/document/IBC2018/chapter-10-means-of-egress
Araújo, L. C., Sucupira, L. H., Lizarraga, M. G., Ling, L. L., & Yabu-Uti, J. B. T. (2005). User authentication through typing biometrics features. IEEE Transactions on Signal Processing, 53(2), 851–855.
Bacco, E. M., Prinzivalli, D. P., & Collins, A. T. (2017). U.S. Patent No. 9552684B2. Washington, DC: U.S. Patent and Trademark Office.
Davis, F. D. (1986). A technology acceptance model for empirically testing new end-user information systems: Theory and results. Ph.D. dissertation. Massachusetts Institute of Technology, Boston.
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–340.
de Vries, M., Cross, N., & Grant, D. P. (Eds.). (1993). Design methodology and relationships with science. Dordrecht: Kluwer.
Encyclopedia Britannica, Lock Security. (n.d.). Retrieve from https://www.britannica.com/technology/lock-security
Gibson, D. (2009). CompTIA security+: Get certified get ahead SY0-201 study guide. Charleston: BookSurge Publishing.
Gordon, L. A., Loeb, M. P., Lucyshyn, W., & Richardson, R. (2005). 2005 CSI/FBI computer crime and security survey. Computer Security Journal, 21(3), 1.
HID White paper. (n.d.). Understanding Card Data Formats. Retrieve from https://www.hidglobal.com/sites/default/files/hid-understanding_card_data_formats-wp-en.pdf
International Organization for Standardization (ISO). (n.d.-b). Retrieve from https://www.iso.org/home.html
Life Safety Code, National Fire Protection Association (NFPA). (n.d.). Retrieve from http://www.nfpa.org/codes-and-standards/all-codes-and-standards/list-of-codes-and-standards/detail?code=101
Nemeth, C. P. (2017). Private security: An introduction to principles and practice. Boca Raton: CRC Press.
Norman, T. L. (2011). Electronic access control. Waltham: Elsevier.
Salto Systems. (n.d.). Antimicrobial Access Control Systems. Retrieve from https://www.biocote.com/partners/salto/
Srinivasan, S. (Ed.). (2014). Security, trust, and regulatory aspects of cloud computing in business environments. Hershey: IGI Global.
Stallings, W., & Brown, L. (2008). Computer security: Principles and practice. Saddle River: Pearson Education.
The International Electrotechnical Commission (IEC). (n.d.). Retrieve from http://www.iec.ch/.
The National Institute of Standards and Technology (NIST). (n.d.-a). Back to basics: Multi-factor authentication (MFA). Retrieve from https://www.nist.gov/itl/tig/back-basics-multi-factor-authentication.
The National Institute of Standards and Technology (NIST). (n.d.-b). Recommendation for the Use of PIV 25 Credentials in Physical Access Control Systems. Retrieve from https://csrc.nist.gov/csrc/media/publications/sp/800-116/rev-1/draft/documents/sp800_116_r1_draft.pdf.
The Sarbanes–Oxley Act. (2002). Pub. L. 107–204, 116 Stat. 745.
Further Reading
Bluetooth technology standards. Retrieve from https://www.bluetooth.com/.
Health Insurance Portability and Accountability Act. (1996). Pub. L. No. 104-191, § 264, 110 Stat.1936. Retrieve from https://www.hhs.gov/hipaa/index.html
Security Council standards (PCI). Retrieve from https://www.pcisecuritystandards.org/.
Security-conscious businesses (SOC2). Retrieve from https://www.aicpa.org/interestareas/frc/assuranceadvisoryservices/aicpasoc2report.html.
The Joint Commission. An independent, not-for-profit organization. Retrieve from https://www.jointcommission.org/.
Wi-Fi alliance. Retrieve from https://www.wi-fi.org/.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this entry
Cite this entry
Alexandrou, A. (2019). Physical Security: Interior Applications – Doors, Access Control. In: Shapiro, L., Maras, MH. (eds) Encyclopedia of Security and Emergency Management. Springer, Cham. https://doi.org/10.1007/978-3-319-69891-5_41-2
Download citation
DOI: https://doi.org/10.1007/978-3-319-69891-5_41-2
Received:
Accepted:
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-69891-5
Online ISBN: 978-3-319-69891-5
eBook Packages: Springer Reference Law and CriminologyReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences
Publish with us
Chapter history
-
Latest
Physical Security: Interior Applications – Doors, Access Control- Published:
- 14 November 2018
DOI: https://doi.org/10.1007/978-3-319-69891-5_41-2
-
Original
Physical Security: Interior Applications – Doors, Access Control- Published:
- 29 August 2018
DOI: https://doi.org/10.1007/978-3-319-69891-5_41-1