StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Access Control System Design - Case Study Example

Cite this document
Summary
The study "Access Control System Design" focuses on the critical analysis of the major issues in the access control systems at the Port of Mina Al Fahal, to determine their efficacy in providing security to the occupants, equipment, and goods stored at the port…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.1% of users find it useful

Extract of sample "Access Control System Design"

Student Name: xxxx Tutor: xxxx Title: Access Control System Design Date: xxxx ©2016 Table of Contents List of Tables 1 List of Figures 1 Introduction 1 Background Information 2 Location 2 Layout 2 Risks and Considerations 4 Critical Infrastructures 7 Potential Threats to Facility 7 Access Control System Design 8 Implementation of Access Control Systems 11 1.WIN – PAK system 11 2.Lenel(TM) OnGuard Access Control 12 3.Video Surveillance Systems (CCTV) 12 4.In- Vehicle Monitoring Systems (IVMS) 14 Key Issues Related to Implementation 15 Work Cited: 16 List of Tables Table 1: Characteristics of F.B.I's Maritime Intelligence Products[FBI06] 8 Figure 1: Location of the Port of Mina Al Fahal (Google Maps) 2 Figure 2: Satellite Imagery of the Port of Mina Al Fahal (Google Maps) 3 Figure 3: Example of vehicle access control system 10 Figure 4: Dome CCTV camera 13 Figure 5: Outdoor CCTV camera 14 Introduction In the modern cut- throat market economy, there is need to maintain a high level of operational sustainability to ensure smooth transition of goods and services. There is therefore, need to identify the factors that could disrupt the continued operation of a facility, and measures to be taken to mitigate these factors. In the recent past, process and plant security has been a major concern for most facilities [App13]. Access control systems are used to limit the number of individuals who can access a specific area in a facility. Access control systems provide access privileges for each building user, monitoring and documenting of building access activities, and locking and unlocking of doors and other access routes [Uni15]. This is important in the provision of security to the building’s occupants and equipment. The Port of Mina Al Fahal is the only sea port servicing the Muscat Governorate in the Middle Eastern Sultanate of Oman. It handles the movement of all exports from and imports to the region, the key export being petroleum, to the Eastern region and parts of Europe. Any disruption in the operation of the port would result in the provision of crucial goods and services to the populace being curtailed [The14]. The port has a high risk of being susceptible to sabotage against tankers and tanker operations, and as such, strict enforcement of security precautions is paramount. This report focusses on the access control systems at the Port of Mina Al Fahal, with an aim of determining their efficacy in providing security to the occupants, equipment and goods stored at the port. Background Information Location The Port is located in Mina Al Fahal, which is a coastal area in the northeast of Oman, located northwest of the country’ capital, Muscat. The area is key to the country’s petroleum operations, with Petroleum Development Oman (PDO) and Oman Refinery Company being based there. The port is run by PDO and provides the main avenue through which Oman’s petroleum is exported. The port’s location is as shown below; Figure 1: Location of the Port of Mina Al Fahal (Google Maps) Layout The Port of Mina Al Fahal has an elevation of 4m above sea level. The port has a block layout of buildings with a road passing through the facility for ease of transportation of cargo. The layout of the facility is as shown below; Figure 2: Satellite Imagery of the Port of Mina Al Fahal (Google Maps) Risks and Considerations The Port of Mina Al Fahal experiences a variety of risks that may affect its operational sustainability. Some of these include; 1. Security The Port mainly deals with the exportation of petroleum, which is regarded as a high value product. Furthermore, petroleum is highly flammable and groups with terrorist inclinations may be tempted to capture the facility or even blow up the cargo stored there to further their causes. Terror groups such as Al- Qaeda have identified oil infrastructure as ‘easy military targets’ with the benefits of the effect on international markets outweighing the cost of attacking [The14]. In order to safeguard it from parties that may want to acquire it maliciously, there is need for adequate control systems to be installed. 2. Safety Due to the large number of personnel employed at the Port facility, if an accident occurs, the number of casualties that could arise is significant. This is compounded by the presence of petroleum and its products which actively facilitate the spread of fire. In order to ensure the safety of the personnel and equipment being used in the facility, there is need for proper safety guidelines. These guidelines are enforced with the help of access control systems which prohibit free movement in high risk areas to reduce the losses incurred in the event of an accident. Furthermore, the Port is located close to the sea and provisions should be made to ensure that there is no damage to the facility by large sea waves. 3. Users The total population of Mina Al Fahal is over 100, 000 people, with a significant percentage of these working inside or in the vicinity of the port [Lat16]. Being an international port, there are people who access the port in order to transact their businesses. This means that at any one time, there are a large number of people at the facility, requiring efficient access control systems to ensure there is proper division. It also helps to ensure people are granted access only to areas they have authority to access. 4. Cost Oman’s economy is highly dependent on oil production and export. The high demand for petroleum worldwide means that the country is able to develop significant revenue from the sector. Any disruption to the operations of the facility due to destruction or other factors for a relatively long time could have a major impact on the economy of the country. 5. Environmental Issues Petroleum and its products are major pollutants for the environment as they are not easily biodegradable. The ‘silent oil spill’ phenomenon has led to a decrease in the dissolved oxygen, and increased concentrations of petroleum- related trace metals in the sea, endangering marine lives [Sul16]. Proper procedures should be put in place to ensure that there are no adverse effects on the environment in the event of an accidental oil spillage at the facility. The government of Oman has placed strict procedures on environmental pollution control on land and around it sea ports. However, the coast guard has not been active to prevent cargo ships from dumping waste in the sea before docking at the ports [Vai13]. 6. Legislative Considerations The Government has sometimes halted the operations of the Port for various reasons, such as, weather phenomena or investigative reasons, in order to safeguard the personnel and equipment from danger, or to conduct inspections to determine if the operations of the facility are up to standard. Cyclone Phet halted the operations of the Port in 2010 as the loading of ships could not be done safely due to the rough seas at the facility. This shutting down of operations prevented any damage to the facilities [The102]. Critical Infrastructures The port facility is vulnerable to a variety of potential risks. However, specific infrastructures could be targeted due to the presence of critical and strategic resources, such as; Oil and gas specific segments – tanks, tanker ships, pipeline systems, oil refineries [Pap13] Buildings – administration and corporate offices, control and command rooms Equipment – cranes, storage facilities, generators, process equipment and associated control infrastructure; sewerage systems Support systems – energy resources such as electrical grid, natural gas pipelines, water supply and wastewater treatment facilities [Pap13] Transportation infrastructure – railcars and railroad lines, loading and unloading vehicles; water and sewage system pipelines Information technology and Cyber systems – personal computers, networks, remote sensors. These are generally susceptible to cyber-attack which aims at interfering with the automated systems in the facility [Gar08] Potential Threats to Facility The efficient movement of goods through the port affects the facility’s fiscal performance, and as such, security is a priority. Recent studies have shown that terrorist organizations are targeting softer targets which require less logistics to plan the attack, and offer flexibility on the choice of targets [FBI06]. Seaports are regarded as soft targets due to their open accessibility to the sea, and have a significant impact on the economy of the country. The Middle East has been a hotbed of terror due to the emergence of extremist groups, and the Port of Mina Al Fahal may be subject to these attacks. The table below shows the types of security breaches that occurred in U. S. A seaports for the period 2002 – 2005. Table 1: Characteristics of F.B.I's Maritime Intelligence Products[FBI06] Threat Intelligence Assessments IIR’s Intelligence Bulletins Total Divers 2 2 3 7 Infiltration 2 3 1 6 Improvised Explosive Devices (IEDs)/ Mines 2 1 1 4 Small boat attacks 1 1 2 4 Ferries 1 2 1 4 Group- specific 5 1 0 6 Weapons of Mass Destruction (WMDs) 0 6 0 6 Target of target- city specific 3 5 0 8 Data on trend analysis 2 0 0 2 Indicators 2 0 4 6 Requirements 2 0 0 2 Other 0 2 0 2 Access Control System Design The security of a port is highly dependent on the use of integrated access control technology systems. A weakness in this system translates to a weakness in the facility. The activation of the new International Ship and Port Facility Security (ISPS) code requires all ports to comply with the new prescriptions with regard to security and access to ports. The implementation of these control systems is done in the following steps; 1. Planning 
 The layout of the buildings in the facility should be done so as to minimize the risk of a breach in security. There should be proper design integration between public spaces and private land, maintaining a clear distinction between the two. To improve access control to the facility, a series of spatial layers of land plots with private use. The facility could be planned to have a series of zones with increasing access control from the outside. There should also be provision of a standoff distance to protect the buildings on the outside. 2. Site Selection 
 The selection of the location of a building in the facility will depend on the risk requirements of the contents and activities in that building. For example, storage of petroleum at the Port can be done at an isolated location to prevent unwarranted access, as well as, reduce the area of impact should an accident occur. This also minimizes the losses incurred in the case of an attack as the petroleum will be stored away from highly populated areas. The Port also requires a relatively large area to store the cargo to be transported. 3. Access and Circulation Routes 
 Different locations in the Port facility can only be accessed by authorized personnel. The use of biometric systems to access restricted areas identify the personnel prevents any breach of security. Therefore, there is need to provide adequate routes for movement of these people to such areas without having to access restricted areas. The facility could also be designed such that no through ways exist between structures so that the flow of people is controlled. The access control systems offer real time information about a person, tracking their movement across the facility and calculating the time of permanence in the facility for personnel with different access levels [Gar08]. This allows the system to detect any discrepancies in behavior which could be construed as malicious. 4. Vehicle Control 
 Terrorist groups have often used Vehicle- Borne Improvised Explosive Devices (VBIED) to cause maximum damage to their targets. Given the high value and flammability nature of petroleum, there is need to control the vehicles accessing the facility. Thorough checks should be done at the access points to ensure that only authorized vehicles are allowed access and no explosive devices are let into the facility. The real time information on the vehicle, such as tracking and permanence time are calculated using the access control systems. The systems also keeps a list of all undesired vehicles’ license plate to ensure they are not allowed access in subsequent visits [Gar08]. Direct access of vehicles to the building of interest should not be allowed. The vehicle routes should be oriented such that the speed of the vehicle is significantly reduced as it approached the building, to reduce the impact in the case of attack. Figure 3: Example of vehicle access control system 5. Pedestrian Control 
 The access control system should establish a hierarchy of pedestrian routes that the personnel at the site uses for movement about the facility. Segregation should however be avoided as it may lead to criminal acts and inappropriate behavior. The use of surveillance systems also helps to identify areas of conflict in the existing system, allowing the Port authorities to make necessary changes to avoid further conflict. The control systems should achieve a balance of access and connectivity to the buildings by the personnel, for smooth operation of the facility. Techniques such as Plot Boundary and Building Extremity can be employed to ensure only authorized personnel find access to the facility [ADU12]. 6. Service Control 
 Being an international port, the facility receives and dispatches goods and cargo frequently. Service control is concerned with the safe movement of these goods, as well as replenishment of onsite consumables. This is of importance as these are typically targeted by criminals due to their intrinsic value. They are also susceptible to VBIED’s as they are on the move and harder to keep isolated. The use of dedicated onsite delivery and reception areas will minimize the risk of loss in the port, as these are easier to protect. The port typically uses jetties and piers to load and unload cargo ships. These are protected from the sea by break walls. Land protection can be achieved through private land plot development. The disadvantage of dedicated sites is that a targeted attack may be catastrophic. 7. Parking Placement Vehicle parking areas pose a significant threat to the security of a building as militants with VBIED’s can easily access the facility. The parking should be located at a significant distance from any buildings, with adequate stand- off distance. In the case of underground parking, the superstructure should be independent of the parking to ensure any attack is confined only to the parking area. The parking structure can also be designed to withstand heavy impact loadings, so as to prevent complete destruction in the event of an attack. Adequate vehicle surveillance in the parking structure is also necessary to detect any suspicious behavior, providing an early warning system for the occupants. Implementation of Access Control Systems The port authorities have implemented several access control systems to improve the safety and security of the facility. These control systems include; 1. WIN – PAK system This is an integrated security software that manages cardholders across multiple sites. It is used in conjunction with badges that are issued to the personnel which allow them to access different areas. A card database is provided to store all the personnel information, with lookup capabilities. It provides quick start setup and configuration wizards, which means it can be configured to the behavioral inclinations of the organization. It offers real- time access event monitoring of personnel by; Control and response system, with acknowledge, clear and annotate capabilities Tracking and muster view/ report Guard tour by point or card read It allows for manual overrides of system functions and schedules in the event the automated system has malfunctioned. This is primarily for door modes, such as lockout or lockdown. Specific personnel are provided with the manual override codes (PIN) to ensure there is no unauthorized entry into specific areas. The codes entered may be matched with the individual’s card for access to be granted. The system has anti- pass-back processing capabilities to ensure that a single badge is not used by more than one person to access a specific area. Hard anti- pass-back requires the card to be used at an ‘In’ access point before being granted ‘Out’ access. This is applied for sensitive areas. Soft anti- pass-back provides access to the card at all times but creates an exception alarm when the sequence is out of order. This may be used for common places, such as the cafeteria [DSX11]. The system is also configured to allow the occupants to safely evacuate the building with the inclusion of prioritized alarm events. This allows for toggle lock functionalities outside of normal schedule to avoid personnel being trapped in an emergency. The system also has elevator call and control capabilities, which might come in handy in emergency situations. It is also used in the management of dynamic floor plans through control access devices and floor plan linking. 2. Lenel(TM) OnGuard Access Control The OnGuard Integrated Platform is used to support the most innovative and integrated security solutions in industry. Designed around open standards, the OnGuard software allows the Port Authority to better protect and manage the personnel, equipment and cargo in the facility. The system provides advance software and system controllers, as well as intelligent readers and input/output modules, allowing it to provide innovative, flexible and cost- effective access control for the port facility. The software also provides enhanced visitor and cardholder management functionality, and new video and access hardware devices. 3. Video Surveillance Systems (CCTV) The port Authorities can make use of various surveillance systems to monitor the activities in the facility effectively. Some of the systems in use are; a. Bullet CCTV camera – It is a sleek, thin cylindrical shaped camera that is wall – mounted or ceiling – mounted and intended for indoor use. The camera has limited functionalities, lacking pan, tilt and zoom controls. It is therefore mounted to capture images from a fixed area. This can be used at entrances to storage areas or command rooms. b. Dome CCTV camera – It is a camera in a dome- shaped housing, meant to make the camera unobtrusive. This can be used in open, common areas such as the cafeteria. Figure 4: Dome CCTV camera c. Infrared/ Night Vision CCTV camera – It has the ability to capture images in dark conditions using infrared LED’s. This may be used as security cameras at sensitive locations, at night when the port is not operational. d. Outdoor CCTV camera – It is used to capture images of visitors or intruders to the port facility. It has a housing impenetrable to moisture, insects, dust and other elements. This is used mainly for security purposes. Figure 5: Outdoor CCTV camera e. PTZ/ Speed Domes – These cameras have added capabilities of pan and tilt which allow the operator to view a wide area of the facility with just one camera. The zoom functionality allows for clarity when viewing objects that are far away. Automated cameras have a timed sequence which controls their movement. 4. In- Vehicle Monitoring Systems (IVMS) Motor vehicle crashes are the most common cause of fatality for workers in the oil and gas industry. Comprehensive motor vehicle safety programs can be implemented to prevent death of workers [IOG14]. The port facility has employed the vehicle IVMS with the following capabilities; a. Real time tracking of vehicle location – Vehicles ferrying goods to and from the port are tracked to ensure there is efficient and timely delivery. It is also used to deter any malicious activity and increase accountability as the authorities will be aware when the vehicle is stopped, and for how long. b. Journey replay – The IVMS can be used to depict the movement of the vehicle throughout the journey, indicating the distance covered in a specific time duration c. Route optimization – The IVMS can be used to select the route with the least cost, in terms of time, delays and fuel, in the case there are several alternatives to choose from d. Preparation of reports – The system can be used to prepare reports on various parameters of the vehicle such as compliant reports, stationary time and location reports, fleet summary reports, drier behavior reports, carbon emissions reports among others. This allows the port authorities to effectively manage their fleet. e. Alerts and pop-up screens – The system is integrated into the IT system to provide email alerts and pop- up screens with relevant information about the vehicles in service. This provides the port authorities with real time information on the location of the cargo. Key Issues Related to Implementation 1. Inertia The personnel working for the Port facility are accustomed to a specific way of doing things and may be resistant to changes proposed by the administration, despite the benefits accrued. As such, the implementation of these changes should follow the 80/ 20 rule, where 80% of the execution work must be invested in the management of problems of change and 20% invested in the technical matters relating to the expertise [Ebe13]. 2. Technology Challenges The use of electronic security techniques, such as biometric and card reader systems, is complicated. This presents major challenges in its implementation and operation. Damage to access devices, such as badges and cards, make access control difficult hindering smooth operation of the facility. The cost of educating the would-be user of the new system to be installed can be high, especially if the personnel were accustomed to simpler analogue access control procedures. New employees to the facility will also require training on how to use the system. Work Cited: App13: , (Appiah - Adu, 2013), Uni15: , (University of Washington, 2015), The14: , (The Institute of Gulf Affairs, 2014), Lat16: , (LatLong.net, 2016), Sul16: , (Sultan Qaboos University, 2016), Vai13: , (Vaidya, 2013), The102: , (The National, 2010), Pap13: , (Papavinasam, 2013), Gar08: , (Garzia, Sammarco, & Cusani, 2008), FBI06: , (F.B.I, 2006), FBI06: , (F.B.I, 2006), ADU12: , (ADUPC, 2012), DSX11: , (DSX Access Systems, Inc, 2011), IOG14: , (IOGP, 2014), Ebe13: , (Ebenhack & Martinez, 2013), Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Access Control System Design Case Study Example | Topics and Well Written Essays - 3250 words, n.d.)
Access Control System Design Case Study Example | Topics and Well Written Essays - 3250 words. https://studentshare.org/macro-microeconomics/2066898-access-control-system-design
(Access Control System Design Case Study Example | Topics and Well Written Essays - 3250 Words)
Access Control System Design Case Study Example | Topics and Well Written Essays - 3250 Words. https://studentshare.org/macro-microeconomics/2066898-access-control-system-design.
“Access Control System Design Case Study Example | Topics and Well Written Essays - 3250 Words”. https://studentshare.org/macro-microeconomics/2066898-access-control-system-design.
  • Cited: 0 times

CHECK THESE SAMPLES OF Access Control System Design

Building an Access Control System

Using this study case, the system indentifies which individual can access or permission to access the In building the access control system, you must follow the four phases of developing the system.... o help implement the system, the structure system design can be used in representation of the system concept in terms of processes and data representation.... According to Techopedia (2012), the definition of structured system design is “ a set of standards for systems analysis and application design....
3 Pages (750 words) Essay

Authorization and Access Control

The paper "Authorization and access control" highlights that authorization is the best way of accessing, maintaining, and inserting data in a particular database in a secured manner or when database and resources are to be communicated then security is very necessary that is provided by authorization.... In computing, access control is a process that ascertains how users and systems are communicating or interacting with each other (Messaoud, 2006).... 'Entity' is a term used in access control to start or perform computational tasks....
9 Pages (2250 words) Essay

Building an Access Control System

The project scope will focus on the building of an access control system for the dormitories for a small college.... The operations of an access control system are aimed at being selective.... The microelectronic access control system allows access based on the permit presented on the cards.... Thus, for an access control system, there are a set of policies that are mandatory for configuration onto the system with an expertise and high level trusted the programmer to administrate the system....
4 Pages (1000 words) Case Study

Security Architecture & Design models

The security models are used to create several access control levels.... In the paper 'Security Architecture & design models' the author analyzes security of an information system, which is the assurance that an information system components are prevented from unauthorized entry, manipulation of data.... Security architecture, therefore, is a comprehensive security design that will ensure that a system has the correct authentication, authorizations and proper preventive measure against system attacks....
5 Pages (1250 words) Assignment

Designing of Access Control Systems

While developing an access control system, there are three control concepts that should be considered which include mechanisms, models, and policies.... This term paper "Designing of access control Systems" presents access control as a procedure of mediating each request to data and resources preserved by a system.... A number of vendors have created access control systems that integrate the newest methods of authentication such as biometrics and Radio Frequency Identification (RFID)....
8 Pages (2000 words) Term Paper

Distributed Software Control: A Distributed Computer System

This report "Distributed Software Control: A Distributed Computer system" presents cloud computing as a Remote Procedure Call by offering advantages relating to time and cost.... It is an establishment of an abstract version of an operating system, a storage device, a server, or network resources.... his paper will examine Remote Procedure Call Distributed Computer system, its mechanism, and related systems.... It will provide a background on the distributed computer system and describe its features (characteristics, deployment models, and approaches to Remote Procedure Call)....
8 Pages (2000 words) Report

Ccess Control System Design-Airports and Aviation Security Systems

The "Acess control system design-Airports and Aviation Security Systems" paper analyzes the design of next-generation technologies capable of preventing unconventional forms of attack.... An access control system for airports could be designed to secure and protect airport facilities against an array of threats.... A key initiative entails upgrading of APCS-this system ought to be upgraded from APCS2 to APCS3.... An ideal airport security system will be fully scalable thus the ability to provide solutions for a variety of airport or airfield sizes with complex security requirements(U....
9 Pages (2250 words) Term Paper

Maintaining Accounting Information Systems

anagement information system ... his system works at a broad level for the senior management and the operational management.... It provides details like the quantity of product developed in a given period of time, the time consumed in their production and how effective the labour system in use is performing.... ransaction processing system ... All these activities are subject to the transaction processing system....
12 Pages (3000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us