Page 20 - Campus Security & Life Safety, March/April 2019
P. 20

“Choose security solutions which are scalable, integrated and can be managed under a single platform.”
After visitors successfully pass through x-ray and metal scans, an excellent addition- al layer of security is a turnstile. Schools can program turnstiles not to release unless a visitor successfully passes through both x-ray and metal scans. So, any other security layers which should be addressed?
Visitors. We’ve addressed how to restrict and record access for authorized users and deny access to unauthorized users. But what about authorized visitors? In the past, most companies receiving visitors would use a pen and paper sign-in sheet. But since pen and paper produces no irrefutable audit trail, many companies are now switching to elec- tronic visitor management systems (aka VMS). When visitors present their creden- tials, they are electronically entered into the receiving company’s VMS in which an audit trail is produced. However, relying on the visitor to produce their credentials is a risky proposition.
Imposters with phony ID credentials can gain unauthorized access to an office and perpetrate a crime. To prevent imposters from entering the premises, modern VMS systems now incorporate user authentica- tion. For instance, ZKTeco’s VAMS (Visitor Authentication & Management System) enables the meeting host to create a secret QR code which is forwarded to their visitor via a text message or e-mail. Upon arriving at the host’s office, the visitor simply displays the secret QR code on their phone to the host’s security personnel. Once the QR code is scanned and verified, the visitor is permit- ted access. Without a valid QR code, visitor access is denied.
Support Multi-Authentication
There is no silver bullet when it comes to security. Where there is a will there is a way. A determined bad guy can defeat any one layer of security. Therefore, its essential to layer your security. True, smart card technol- ogy is harder to hack than low-frequency RFID. But regardless the frequency or encryption, cards can be lost, stolen or for- gotten. Instead, invest in devices which sup- port multi-authentication (i.e. fingerprint and/or face and/or card and/or PIN readers).
Lastly, don’t stop at the door. Secure your parking facility and then look inwards towards your building’s main entry points. Consider affordable baggage X-ray scan- ners, walkthrough metal detectors, turn- stiles and visitor management systems (with user authentication). Choose security solu- tions which are scalable, integrated and can be managed under a single platform. Get educated on modern security technology and don’t fall for the fear, uncertainty and doubt (FUD).
Larry Reed is the CEO of ZKTeco.
biometrics
rity threat to schools?
The makers of high frequency 13.56 MHz
RFID technology would certainly have you believing low frequency RFID is a major security threat which needs to be addressed immediately. However, metal keys are far easier to copy yet they’ve been used for decades. Metal keys are used to secure doors in most every home in the world. So, are homeowners all over the world panicking that their metal keys will be copied by intruders planning on breaking into their homes? This is highly doubtful.
The makers of smart card technology are in the business of selling card access readers. In order to sell more card readers, they must create sufficient fear, uncertainty and doubt (FUD) so that customers will upgrade their low frequency RFID readers to smart card technology. If a school has sufficient budget to upgrade their low frequency RFID readers, then why not utilize the highest security tech- nology available today? Consider biometrics.
Biometric Access Control
High-frequency RFID is certainly more dif- ficult to hack than low-frequency RFID, but high-frequency RFID badges can still be lost, stolen, forgotten or misused by unauthorized parties. Conversely, a biometric credential can only be used by the actual person. A fin- ger, face, vein or retina-pattern is unique for every person on earth. Biometrics assures the person attempting door access is who they claim to be. Therefore, a biometric read- er is far superior to any badge reader, regard- less what frequency it transmits or how much encryption it utilizes. So, can security systems utilizing biometric be further improved upon?
Two-factor authentication. Any one single credential (i.e. password, PIN, badge, fingerprint, face, vein-pattern, iris pattern, etc.) can be compromised. So, what’s the best solution? Two-factor authentication. Most everyone today withdraws money from ATMs by using their bank debit card. So, what prevents a thief who steals some- one’s bank card (one credential) from accessing the person’s money? The thief doesn’t know the person’s PIN (second cre- dential). Banks secure their customers’ money by implementing a two-factor authentication money withdrawal system. This added security gives banking customers the confidence to deposit their money in the banks checking accounts.
Likewise, in schools, biometric readers which also have a keypad and/or RFID badge reader is advisable. The least expen-
sive option would be a fingerprint and key- pad-only reader. However, if the school is concerned PIN codes will be shared amongst unauthorized users, the school can use fingerprint readers with an integrated RFID badge reader. If the schools have no need for the available storage on high-fre- quency smart cards, the schools can save money by using a fingerprint reader with a low-frequency 125 kHz badge reader. So, what’s the next level of security which can be achieved?
Multi-factor authentication. It’s highly unlikely any unauthorized party can com- promise a fingerprint AND a PIN, or a fin- gerprint AND a badge. However, for those who are extremely concerned with security, today on the market you can purchase door access readers containing multiple biometric sensors. For instance, ZKTeco designs a sin- gle device containing both a fingerprint and a face reader, while also having a keypad and integrated RFID reader (i.e. up to four-factor authentication). For customers preferring convenience, the reader’s face recognition camera provides true hands-free door access control. So, does layering security end at the door? It doesn’t have to.
Layered Security Begins at
the Furthest Entry Point
Parking facility. In today’s world, intruders most often arrive by driving a vehicle. If your school has a parking facility, it makes sense first limiting access to your parking facility. License plate recognition (aka LPR) technol- ogy can associate a license plate with an authorized user. If the plate is recognized, the parking gate opens and the user’s access is recorded (i.e. audit trail). An alternative to LPR is UHF (ultra-high frequency) tags adhered to the car’s license plate or wind- shield. ZKTeco has UHF readers which can detect tags from up to 200 feet away.
Reception area. Before you enter an air- port terminal, your baggage must first pass through the x-ray scanner. Surprisingly, smaller affordable baggage x-ray scanners on now available on the commercial market for schools to consider installing. While scan- ning baggage, visitors should also be scanned. Surprisingly, affordable walk- through metal detectors are also now avail- able to the public, as well. Especially consid- ering all the public shootings taking place in schools and places of worship, the presence of walkthrough metal detectors can act as an excellent deterrent for anyone considering committing acts of violence by using danger- ous concealed metal objects.
20
campuslifesecurity.com | March/April 2019


































































































   18   19   20   21   22