Risk Analysis

Vendors

The risk analysis is done to determine the risk of the objective’s physical security  and precedes the implementation of the systems and the reduction measures for the organizational risks, technological and human security.

The physical securiy risk analysis must ensure the identification of vulnerabilities and risks, their estimation, and determining their level of exposure to the production of physical security incidents. It also needs to indicate the necessary safeguards for the analyzed objective.

Roel Systems performs physical security risk analysis in accordance with Government Decision no. 301 of 2012, of the instruction No. 9/2013 and the subsequent regulations that complement this, having qualified and accredited staff for this purpose.

After performing this expertise, according to internal and external context of the objective aimed by the risk analysis, we will provide proposals to deal with risks to physical security so that the cost / benefit ratio will be the best and for it t to meet the legal requirements.

The access control systems can be recommended and implemented following the report of physical security risk assessment, but may be requested by the customer as special applications. It is also used as an electronic timekeeping solution.


The components of an access control system

The access control station (or controller) is the central device that connects all field equipments ( card readers , buttons , electromagnets or bolts / electromagnetic locks , extension modules , keypads , sirens , etc.). Also the controller is the device that manages information from the readers (proximity , biometrics, barcode etc.) and commands the mechanical locking elements (electromagnets , locks / electromagnetic locks , turnstiles , gates etc.).

The readers ( of cards , biometrics,of barcodes etc.) are field elements that are accessed by users for them to be checked. They transmit data to the controller that will compare whether the user is registered in the database and can access the objective. If the controller decides that the user is registered in the database with access in that objective, that will activate the mechanical locking element ( electromagnet, locks / electromagnetic locks , turnstile, gate , etc.) , and access will be allowed.

Proximity card readers

are the most commonly used access readers used at this moment. The proximity reader is composed of an antenna and a control unit which converts the signals recieved from the proximity card into the specific communication protocol( Wiegand , RS232, RS485 etc.).

Advantages: the proximity readers are easy to use, the user is only required the proximity card. It provides high speed data transfer to the controller.
Disadvantages: the proximity readers can be easily fooled by a user who stole a valid card .

Biometric Readers - ( fingerprint, hand geometry , face recognition , iris recognition , etc.)

it recognizes the unique biological characteristics of users. The need to install a biometric reader in general appears to objectives that require a high degree of security

Advantages: it can not be fooled by unauthorized persons ( as can happen by finding a code or finding a proximity card ) .
Disadvantages: higher implementation costs compared to other technologies, longer time for verification and recognition.

The mechanic locking elements ( locks / electromagnetic locks , electromagnets , turnstiles , gates etc. ) - provides the mechanical blocking of access roads until thei receive the order of release from the controller after user authentication . The mechanical locking elements can be comanded to open the fire detection systems when it signals a fire alarm .

Electromagnets

They are " fail safe " locks that need fueling in order to produce the electromagnetic field and lock the door.

Turnstiles

Provides the mechanical blocking of access roads .

Emergency buttons are installed inside a controlled space and can be used during the time when the access control systems are not in service , or they have technical problems .

The buttons are mandatory installed on every controlled door .

Centralization and management equipments are personal computers / servers with access control softwares that manages the access control system, the users and the system functions .

Some programs have also a timekeeping software.