Answer the Question
1) Controlling access into a building is emphasized in this chapter especially as imperative to the security of a business. Several methods of controlling traffic in and out a business complex are detailed in the chapter. Additionally, the author stipulates relevance of the methods to security by using practical examples.
2) The areas of emphasis in ascertaining security are commercial buildings as well as individual estates. He takes a stance that unregulated admittance in places with various valuables is the greatly attributes to robbery. Using argumentative discourse a correlation between lack of access control and insecurity is established. He describes various gadgets related to this security system and their efficiency.
3) The text proves educative to the public on decreasing insecurity within an individual’s building. Deviant and decisive methods of regulating passage within a building are discussed. This includes the use of employee badges and visitor passes. The author suggests success by use of various types of identity cards depending on the building’s system hardware. These cards include smart cards, Barium Ferrite, proximity card, and wiegand. Hand or finger geometry can also apply in this system by use of hand shapes to verify one’s identity. Handwritten signatures can also be a mode of identity verification.
4) More approaches for identifying as well as confirming personnel within a building are discussed in the final sections of the chapter. For example, managers can purchase security systems that use a person’s face, voice, or eye pattern to confirm identities especially in zones where only certain employees can access.
5) It is vital for the reader to differentiate various security approaches in respect to relevance and effectiveness. Many identity cards provide different levels of access control. Proficient usage of security devices secures the building from intruders. These equipments should be able to regulate the employees and visitors accessing various areas of a building.
6) The author overlooks the possibility of the intruder destroying the security system or incapacitating it. They may use fake visitor passes or employee badges to access the building. Furthermore, most effective systems such as those that verify one’s identification by use of the face, fingers, or voice are expensive. For this reason, the access control concept is subject to serious limitations not included in the text.
7a) practical application of the security concepts conversed in the chapter guarantees a considerable measure of success. For instance, identification and keeping out of intruders increases safety in a premise. Additionally, businesses will be able to choose appropriate security concepts depending on levels of privacy or value in attached to various sections of a business premise. Ultimately, loss of property as well as information will be adversely reduced.
7b) Disregarding the security concepts discussed leaves the business vulnerable to loss of valuables as well as access to private information. The losses accrued from such occurrences are costly and threaten a business’ success.
Questions not Covered in the Chapter
Are there ways to prevent interference of the system by malicious individuals? Are there possible alterations as well as additions to improve the security concept? Will the dynamic nature of technology affect the effectiveness of visitor passes and employee badges?