Skip to main content

All Questions

Filter by
Sorted by
Tagged with
0 votes
0 answers
88 views

compatability of Desfire EV1/2 readers and cards with a Doorking access control system

I am getting the idea that Doorking's ProxPlus cards and reader have a pre-defined encryption key in their reader. As these readers are wiegand devices and the software for the Doorking Access systems ...
steve vogel's user avatar
1 vote
2 answers
175 views

Liquid security scenario

I'm a part of a small team of undergraduate developers taking a course on developing Arduino and Raspberry Pi applications with a focus on the Internet of Things. Our current task is to imagine, ...
Christian Westbrook's user avatar
1 vote
1 answer
2k views

Physical vs Logical - Location/Address

According to the CJIS Security Policy - Access Enforcement The information system shall enforce assigned authorizations for controlling access to the system and contained information. The ...
Namita's user avatar
  • 111
6 votes
4 answers
6k views

Are keys or RFID tags more secure access control solutions?

Just musing to myself, what is the preferable access control mechanism in high security environments? Locks and Keys or RFID tags? Going under the assumption that the locks/keys are not knoow to be ...
NULLZ's user avatar
  • 11.5k
6 votes
1 answer
755 views

Building access card that has an identification role

The main question is should a building access card have the corporate logo on it? In this organization, the employee ID card is separate from building access card. We currently do not have the logo ...
Hubie's user avatar
  • 69
3 votes
4 answers
7k views

Block unauthorized user from getting access to intranet

What's the common way to block users from accessing intranet? Right now, whoever plugs in a cable can access any intranet server freely. I want to change this behavior. But given that we run not only ...
daisy's user avatar
  • 2,097
5 votes
3 answers
2k views

Live Linux which does not mount any hard drive in the computer

I am searching for a Linux System which runs from a CD and does not mount any hard drive of the computer. I want to prevent any possiblity to write something on the hard drive of the computer and on ...
Jan Koester's user avatar
0 votes
3 answers
528 views

Keyless entry security systems and HIPAA implications

We are upgrading our office to have badged security doors. What I would particularly like to know is if Keyless Entry systems exist or are of decent quality. By this I mean, I would like the doors ...
Rikon's user avatar
  • 103
16 votes
3 answers
1k views

Risks of Mullions in High Security Areas

I have a storage space full of information assets. The room itself is sound; there are no windows, the walls go all the ceiling, and there is only a single entrance with two good stout doors and high ...
Scott Pack's user avatar
  • 15.3k
1 vote
1 answer
1k views

Standards for physical Access Control systems

Hoping to help protect an IT installation, I've been looking into physical protection systems, specifically Access Control for protected areas. The field is quite big. Are there any US or ...
George's user avatar
  • 2,833
2 votes
4 answers
766 views

Help to account all the points of physical access to a rack server to steal software

Let's say I want to move my 1U Dell server to co-location site with a hostile company who will try to steal my code (this is almost 90% probability if I dont take steps)... The limitation for their ...
Boppity Bop's user avatar
6 votes
3 answers
287 views

Requiring Authentication to Exit

I've often wondered why facilities do not require authentication as a default on exit. Beyond the oblivious reasons: Fire safety policies would require a panic mechanism to override the access ...
blunders's user avatar
  • 5,082
22 votes
4 answers
2k views

Securing an area both physically and technically

I work for a commercial printing company, and we're beginning to get a couple jobs labeled "High Security". Essentially this means that if any pictures/information/files/etc. of the product were ...
jwegner's user avatar
  • 411
5 votes
1 answer
813 views

access control to data-center using rfid

I don't know if "here" is the right place to make this kind of question... so here it is.. Is rfid a good solution for controlling access to a data-center? Because rfid is "wireless", is it hackable? ...
user avatar