Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 8

Annotated Bibliography "Access Control and Badging (Managing Airports Today)." Research. Ed. Anna Stanley.

Cygnus Business Media Inc., Web. 28 Nov. 2012. http://www.highbeam.com/ In this article they discuss the concerns that companies (Airports) have surrounding employee access controls and badging. It discusses a security breach in which a contractor (temp agency) gave workers identity badges that were deactivated. It discusses vulnerabilities that are faced when corrective measures arent being utilized. "Access Control." Business Systems. Web. 28 Nov. 2012. http://www.voxcom.com/business-security/access-control.html This site discusses how to take control of your organization with the use of a fully integrated control panel, proximity cards and key tag technology to lock your business and record all activity. It assists in offering an extra layer of safety and security and the ability to restrict and control accessibility. "Benefits of Adding Magnetic Stripes to Your ID and Access Cards." Building Access Card. June 2012. Web 14 Oct. 2012. http://buildingaccesscard.com/ This site discusses a low cost method of providing security to your building access system. The use of a magnetic strip to your access cards will offer high compatibility, higher data capacity and more security. This gave me valuable information that I could offer my management since we are still in the process of seeking a new provider for our access control system. "Connect with Security Magazine." Access Control on Remote Control. Web. 03 Dec. 2012. http://www.securitymagazine.com/articles/81810-access-control-on-remote-control This journal article discusses access control remote monitoring. URS happens to monitor our access control systems remotely by my manager, Paige Greenaway, on weekends and

after hours. This article discusses the benefit of cost effectiveness. The similarity was that both this article and my own company use this platform to manage access control and intrusion alarms from a distance. The ability to use remote access can be utilized at colleges, hospitals and other facilities small and large scale. Management from a remote location requires the use of a VPN (Virtual Private Networking) device. Another similarity that I found was that it recommends using one terminal for the majority of access to security systems because the introduction of more workstations means that the task becomes more labor intensive. There would need to be a software installer and an individual with a familiarity with the program and malware issues to be aware of. Having one terminal allows the opportunity for collaboration and personnel efficiency. "Domain 5 Access Controls." The Official ISC2 CISSP CBK Review Seminar. Subury: Jones and Bartlett, MA. V-1--41. Print. The Certified Information Systems Security Professional (CISSP) is an independent information security certification and I recently studied to take the exam and they have a section on Access Controls and specific access control attacks. This is an important resource for any security personnel because it updates on how to grant permissions to databases, tables, and other objects within a database using role-based access control. This section of the study guide helps you with the understanding of access control attacks. It also discusses procedures to ensure access controls are granted and there are no vulnerabilities. It also discusses audits and reviews to ensure accounts are updated.

Fernandez, Eduardo B., Jose Ballesteros, Ana C. Desouza-Doucet, and Maria M. Larrondo-Petrie. "Security Patterns for Physical Access Control Systems." Springer Link. Web. 28 Nov. 2012. http://link.springer.com/ Ever since 9/11, physical security has become a major need for airports, government agencies, nuclear plants, schools and naval ports. Protection of these facilities are often an opportunity for physical security to be adjusted to meet the needs of the facility by securing access controls, alarm monitoring and relays. The unification of information and physical security ensure that your company is protected. "Honeywell Building Solutions." Honeywell Building Solutions. Honeywell, 21 Sept. 2012. Web 14 Oct. 2012. https://buildingsolutions.honeywell.com/Cultures/en-US/ The Honeywell site discusses installation, integration and maintenance of facilities security. The access control portion discusses the different methods of managing access control and the price to get the system that will best service your organization. It also provides a wealth of information about physical security. Pendergast, Mark. "Building Management -5 Reasons to Use Access Control Systems For Business & Government Security." Ezine Articles. Web. 14 Oct. 2012. http://ezinearticles.com/?Building-Management---5-Reasons-to-Use-Access-ControlSystems-For-Business-and-Government-Security&id=4633233 This journal article expresses the importance of building management where access controls are concerned. It discusses several different access control technologies available to government facilities. Your business need helps to determine the best method of access control but some that this article discusses are: Card readers, Biometric scanners, keypads, and proxy card readers. An access control security system is relatively

simple to monitor and maintain and can create peace of mind for building managers and tenants. "Physical Security." The Wall Street Journal. Web. 28 Nov. 2012. http://online.wsj.com/article/SB10000872396390444024204578046870079332476.htm l This journal article discusses a company located in Sweden called Axis Communications that won a physical security category for digital cameras to be able to capture detailed imaged in color and at night without the use of additional lighting. The company just started delivering these digital cameras last year. They come with a lot of advantages like high quality images and the ability to be sent over computer networks and viewed anywhere. URS doesnt use this service but sounds good if we had that type of vulnerability. Physical Security Risk Assessment Tool & Physical Security Vulnerability Assessment Tool. Web. 28 Nov. 2012. http://aegisbleu.com/software.asp
This site introduces a tool that is designed to assist government agencies in assessing facility vulnerabilities and generating comprehensive reports based on key security areas. The Vulnerability Assessment Security Survey Tool (VASST) is the first security risk self-assessment tool on the market. VASST is broken down into three primary parts; an interview, a survey, and a report. The tool is unique because it incorporates these three different instruments into one complete package. VASST utilizes physical Security Assessment File Exchange (SAFE), the most interchangeable and flexible security data file format available. SAFE provides the security and risk assessment industry with a standardized file format for the exchange of infrastructure security data. By utilizing the SAFE format, security professionals are leveraging information that can be easily used for company-wide vulnerability analysis.

"Security and Access Control Badges." Access Control, Id Card Printer, Security Badge, Visiting Card. Web. 28 Nov. 2012. http://www.evolis.com/eng/Applications/Accesscontrol
This site introduces Evolis an access control company that assists large organizations to personalize security and access control.

"Security for Building Occupants and Assets." WBDG Secure/Safe Committee, 7 Sept. 2012. Web. 14 Oct. 2012. http://www.wbdg.org/design/provide_security.php This is a security plan and design of a high quality building is the implementation of appropriate countermeasures to deter, delay, detect, and deny attacks. However, government agencies, including the military services and private sector organizations have developed specific security design criteria. This site discusses the very real threats that
companies face today that have been heightened since the terrorist attacks. The vulnerabilities are there and it is up to the security department to ensure safety is maintained. It discusses riskbased assessments and procedures to integrate within your organization. It helps clarify facility specific security issues and how they can be addressed. There was no comparable procedure for commercial buildings that would be similar to federal procedures. However, URS would follow directives of the federal buildings. A vulnerability assessment or risk assessment can aid in ensuring the right level of protection. For total effect in security a design should be applied at the beginning of any job that would include cost.

"Seenex Building Access Control and Security Systems." Building Access Control. Seenex, Web. 14 Oct. 2012. http://seenex.com/ This website discusses the growing need for building security. Seenex provides a platform for building access control and not only designs but builds and services the systems. They offer visitor management and smart card readers. Seenex is not tied to

one particular technology, and is able to offer its clients the ability to build their solutions from the myriad of innovative security technologies and integrates, installs, maintains and updates the complete secure access solution for its customers. Its one-stop shopping. Smith, Stephanie. "The Interagency Security Committee and Security Standards for Federal Buildings." CRS Report for Congress. Congressional Research Service Library of Congress, July 2007. Web. 14 Oct. 2012. www.fas.org/sgp/crs/homesec/RS22121.pdf This is a report that discusses the federal guidelines for federal buildings and how to maintain physical security. Since the Alfred P. Murray incident in 1995, security measures have increased and physical security plans help ensure that companies strengthen potential vulnerabilities. Standards must be set up to ensure the perimeter is secure as well as all entrances and exits and related access procedures; the identification and admittance of employees and visitors; and the use of closed-circuit television monitoring. All URS facilities across the US have to ensure that they follow these federal guidelines. I often go on assessments at our other facilities to ensure they are following these guidelines are they can face infractions. Tulli, Tom. "Access Control& Security Systems." Access Control & Security Systems Dual Control. Web. 28 Nov. 2012. http://www.securitysolutions.com/cards_readers/dual_control_security_system/inde x.html This journal article discusses the importance of educational facilities as well as businesses of all types need to ensure they implement physical security by integrating identity management and access control systems. They add value to a organization and keeps criminal activity at a distance. Incidents can be prevented especially if you add

lock and key systems coupled with other types of surveillance. Employees can be assigned various levels of accessibilities. Turner, Elanie. "Sacramento Airport System Speeds up Security Badge Processing." Sacramento Business Journal. Web. 28 Nov. 2012. http://www.bizjournals.com/sacramento/news/2012/05/16/sac-airport-systemsecurity-badges.html This journal article talks about the access controls at Sacramento airport and how they were able to speed up the process of access creation by hiring two additional vendors it was interesting how this process helped them however with the economy that is not an option for my company. We can only utilize one company for access control and to be honest the use of more than one company would only create problems with database management. However, it was interesting to read how this helped them speed up processing. "URS Corporation." URS Corporation. URS, Web. 14 Oct. 2012. http://www.urscorp.com/
This website gives insight into URS Corporation, the leading provider of engineering, construction and technical services for public agencies and private sector companies around the world. Today, URS has more than 57,000 employees in a network of offices in nearly 50 countries. I am happy to say for the past ten years, I have been one of those employees and they were nice enough to extend me this intern opportunity.

"Volume 5, Issue 1 (2011)." Journal of Physical Security. 3 Nov. 2011. Web. 28 Nov. 2012. http://jps.anl.gov/v5iss1.shtml This article in the Journal of Physical Security discusses the balanced magnetic switch and how it provides a very high level of physical security. It is supposed to provide an

invulnerable device that can defeat any form of tampering. This would be a great consideration for the doors and providing security for them after hours and on weekends. "Vulnerability Assessment Team (VAT)." - Nuclear Engineering Division (Argonne). Web. 28 Nov. 2012. http://www.ne.anl.gov/capabilities/vat This article in the Journal of Physical Security discusses the Vulnerability Assessment Team and how they conducted vulnerability assessments on a thousand physical security devices, systems, and programs for many different private companies, and government organizations. They created design basis threats, surveys, and utilized software vulnerability assessment tools. The interesting fact was that although all of these methods were used is doesnt mean that there will be dramatic improvements to security. "WinPak Pro Manual Quick Reference Guide." Win Pak Pro 2005. Honeywell International, 14 Apr. 2006. Web. 14 Oct. 2012. http://aaasystems.com/docs_vids_imgs/User_Manuals/Access_Control/WinPak&ProQuic kReference.pdf WinPakPro is the access control software that URS uses and we are attempting to try an alternative software package. Security has looked at the updated version and is trying to see if the benefits of the new system outweigh those of another software product by Honeywell. Currently WinPakPro is compatible with our access control panels and are supportive to our video control system. However, at this time it is compatible with an older version of Windows and in order to update the Windows operating system the need arises for us to update this software as well.

You might also like