There’s more to effective access control than just putting up some fences, cameras, and security lighting. As this article outlines, access control also encompasses determining which zones of a facility require protection and what level of protection each zone requires. Access to these protected zones almost always involves a method of identifying personnel, and there are many different ways of doing this. Here are two main categories.
Archive for the ‘Uncategorized’ Category
Eyeing Iris ID
One of the most promising developments in biometric identification has been iris recognition systems. As this article explains, this technology makes use of the unique pattern of specks in each person’s iris to verify the identity of that person. Iris scanning has been used on a limited, experimental basis in both the U.S. and Europe and offers many advantages.
Biometrics in action
The last few years have seen a much wider application of biometric technology to improve access control and security. This article cites several of these uses, which demonstrate the potential of biometric identification. Here are a few of these applications.
Biometric basics
Biometric identification, as this article describes, is being used more and more for security purposes. Privacy concerns hindered development prior to the Sept. 11 attacks, but some biometric technology such as fingerprinting and DNA identification made inroads. Now, there are a wide variety of biometric technologies available for access control and other security purposes.
Building on HSPD-12
Last month the Office of Management and Budget (OMB) and Department of Homeland Security (DHS) announced that they are working together on two memos regarding federal secure identity management cards. These are cards that were issued in accordance with HSPD-12, which we talked about in our last post. There’s not much info on what these memos will say, but this article offers some speculation about them.
Identifying criteria in HSPD 12
Another post-Sept. 11 security change was Homeland Security Presidential Directive 12 (HSPD 12). This directive created a standard form of identification to gain access to government facilities and mandated adoption of this standard by all government agencies. This Website provides more information on HSPD 12. Though the directive is directed at government agencies, like HSPD 3, the private sector can take some cues from it to enhance its security.
More on the Red Threat Condition
The final level in our look at the Department of Homeland Security’s Threat Advisory System is the final Severe (Red) Threat Condition. This Threat Condition indicates a severe risk of a terrorist attack and suggests a swift response. This response is usually not meant last long but until the severe threat passes. This Website has all the details, but here are a few key points.
More on the Orange Threat Condition
Continuing our look at the Department of Homeland Security’s Threat Advisory System, we’re highlighting the Orange (High) Threat Condition. This level indicates a high risk of a terrorist attack and is the first level to suggest organizations implement some (though not all) emergency plans.
More on the Yellow Threat Condition
Building on our last post on Green and Blue Threat Conditions, we’d like to continue with more information on the Yellow (Elevated) Threat Condition, which happens to be the current threat level. This level indicates a significant risk for a terrorist attack, and as this page details, suggests organizations take the following steps:
More on Green and Blue Threat Conditions
In our last post, we discussed Homeland Security Presidential Directive 3 (HSPD 3) that created the Homeland Security Advisory System. It’s an important topic that we’d like to focus on a little more by looking at each Threat Condition and what it entails. This week, we’ll combine and quickly review the first two conditions – Green (Low) and Blue (Guarded) – because they’ve yet to be used.