Custom Search
|
|
|
||
2.6.1.1 Personnel/Procedures-Intensive Elements. These elements are
primarily comprised of those approaches set forth in OPNAVINST 5530.14.
They involve the use of approved systems with increasing levels of control
as determined by security requirements which include:
a) Military and dependent identification cards.
b) Personal recognition by access control posts of those seeking
entry to protected areas.
c) Pass and badge systems implemented by activity, installation, or
major commands which use identification card-based access controls. Within
this category, specific protected areas may supplement this means of control
with access list systems (logging procedures) for positive personnel
identification, by badge exchange procedures, and/or via authorized escorts
to control visitor access. These systems often use entry/egress control at
primary entrance points to facility perimeters.
2.6.1.2 Machine-Intensive Elements. These elements electronically
perform the entry authorization/verification process utilizing a variety of
technologies and preestablished, mostly automated access criteria. These
systems range from small applications providing control over a very few
portals to large, distributed, computer-based networks which are capable of
performing multiple security functions. The elements which may be
configured with machine-intensive systems include:
a) Microprocessor to large mainframe-sized central control units
which incorporate various automated access criteria based upon area
authorization, time zoning, multi-man access rules, anti-passback
prohibitions, and other features. Where properly configured and programmed,
these control units can also be used as the annunciation control for
intrusion detection and assessment systems.
b) Card-based entry control devices which electronically read
preprogrammed data unique to each card and authorize or deny access attempts
at specific portals. Cards may also serve as identification badges. Reader
elements maybe employed on both entry and exit as stand-alone units or in
conjunction with positive personnel identification devices.
c) Positive personnel identification/verification elements are
being used increasingly in high security applications where more than one
(e.g., the card alone) access authorization criteria is required. These
elements may include coded keypads, CCTV for facial confirmation or
biometric readers to key upon the unique features of each authorized
individual, such as hand geometry, speech, fingerprints, signature, etc.
Barrier subsystems may be integrated into access control elements through
the configuration of turnstiles, sally ports, and structural components to
properly channel the
13.02-12
|
||