we explored access control options by looking at types of electric locks, specifically at the component which physically keeps the door locked. However, this is only half of what access control consists of. Each of these lock components need to be configured with a ‘systems operation device’, a mechanism which authorizes access and allows the lock on the door to be opened.
In this post, we will therefore provide an overview of the types of access control operation devices on the market and the points of consideration around them. Due to the recent and ongoing debate about using biometrics as a form of authorization, this article will include a particular focus on this form of technology.
Something you know
Authentication as ‘something you know’ is typically a password, PIN or code which, if entered correctly, will grant the user access. Often used in access control, this method of verification is also commonly adopted in banking and to verify access to accounts such as email or other online accounts.
Such verification is both easy and convenient to use although can pose issues or inconvenience if a password or PIN is forgotten.
The primary risk of breach of security with this method of authorization comes from a violated password. Passwords and PINs may be hacked or cracked, be shared (intentionally or not) or be leaked, any of which would give access to unauthorized personnel. To help avoid (but not eliminate) this problem, ideally passwords should be changed regularly. However, this can make remembering the correct password more of challenging.
This type of authentication is more often seen in access control solutions for private properties or smaller companies rather than in companies or organizations with a large number of employees and a large number of access control points. The reason for this is that this option can becomes increasingly complicated and impractical and even less secure if multiple passwords are used or the same password is used for multiple doors or personnel. There are therefore limitation in the scalability of the solution.
Something you have
Key cards are ideal for most corporate site solutions as they are scalable and easy to manage via an access control management platform in which employees can be added and removed. Moreover, the solution is flexible as access limited to certain levels or times for different employees.
Although this access via card readers presents a risk if the card lost or stolen, this risk may be significantly reduced or eliminated if reported immediately. If reported, access with that card can be removed through the management platform, essentially rendering the card useless.
.jpg)
Another more recent addition to this type of access authorization is using a mobile phone to gain access like a key card. Mobile contactless credentials act as ‘virtual keys’ which can be can be stored in a mobile handset and used to unlock doors by swiping the mobile like a key card. One of the major advantages of this option is that access can be instantly delivered to a person's handset remotely; no physical handover is required.
Something you are - biometrics
Biometrics describes a physical feature unique to a person which can therefore be used to identify that person. Types of biometric authentication include fingerprints, irises, facial recognition through contours and features, hand geometries, vein patterns, voice patterns and DNA information.
.jpg)
The risks
Biometrics appear to be an ideal solution for authorization verification as the physical traits used are unique to each person. However, biometrics are not exempt from risk.
Somebody's physical identity can too be compromised (basic kits to replicate and fake fingerprints can be bought online), and once such information has been compromised, it will always be compromised. Unlike a password or PIN, one's biometric identity cannot be changed. As early as 2006, Deloitte and Touche were ringing the alarm bells warning that faking biometrics was a real threat. In fact, soon after the release of Apple's iPhone 6, reports were published that the phone’s biometric identification can be faked. It’s not easy, but it is possible.
Risk associated with different forms of biometrics varies, some forms of biometric authorization are more secure than others:
Type of biometrics | Security | Cost | Size of device |
Fingerprint recognition | Medium | Low | Small |
Finger vein patterns | High | Medium | Small to medium |
Palm vein patterns | High | Medium | Medium |
Facial recognition | Low | Medium | Medium to large |
Iris recognition | High | Medium to high | Large |
The reality
A recent survey of security integrator companies by IPVM, an impartial third party in the security industry, found that the demand for biometric solutions in security is actually still quite low. The most popular type of biometrics opted for from the above was fingerprint recognition at 49%, but 44% of integrators chose to use no biometrics at all.
The possible reason for this apparent reluctance to implement biometrics in access control is because many professionals think that the technology is largely under-developed and needs further technological progress. Moreover, some companies hold back from adopting biometrics for fear of conflicting with local privacy restrictions or of infringing on the personal privacy of employees or personnel.
The ideal high security authentication solution
For example, at ICD we recommend that some companies or sites use a combination of key card access with a PIN code where an extra layer of security is required. This solution is convenient as it can be tailored to end user's needs by adjusting the settings in the management platform. For example, if such a device is installed at the main entrance of an office, the authentication can be set to card only during the day when the office has is busy with employees and there is constantly someone at the reception desk. With key card access only during these hours it is not only more convenient for employees, but in addition, the risk is not increased since an intruder will be noticed by any on-site staff. For after office hours or on weekends or holidays, the device can be set to require both a key card and a pin code to provide the extra layer of security necessary when no company personnel are on-site. Anyone who may have found or stolen the key card will therefore not be able to enter the site with the card alone.
An area of a site could also be equipped with a combination of key card and biometrics for higher security. This solution is common in areas where an extremely high level of security is required such as bank vaults, nuclear power plants and data centers. For an example of a project in which ICD implemented palm reading biometrics with a PIN code at such a location
0 comments:
Post a Comment