U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

PERSONNEL ACCESS CONTROL (FROM CARNAHAN CONFERENCE ON CRIME COUNTERMEASURES - PROCEEDINGS, 1977, BY JOHN JACKSON - SEE NCJ-57737

NCJ Number
57739
Author(s)
C H BEAN; J A PRELL
Date Published
1977
Length
11 pages
Annotation
PERSONNEL ACCESS CONTROL SYSTEMS--INCLUDING COMMERCIALLY AVAILABLE AND STATE-OF-THE-ART--ARE EXAMINED, WITH ATTENTION TO LEVELS OF CONTROL AND HARDWARE APPROPRIATE FOR DIFFERENT LEVELS OF ACCESS AUTHORIZATION.
Abstract
THIS PERSONNEL ACCESS CONTROL REPORT SUMMARIZES INFORMATION COMPILED FOR THE NUCLEAR REGULATORY COMMISSION AND INCLUDES INFORMATION ON HARDWARE SYSTEMS AND PROCEDURES USEFUL TO THE NUCLEAR INDUSTRY FOR PREVENTING UNAUTHORIZED ACCESS OF INDIVIDUALS TO CONTROLLED AREAS. INFORMATION ABOUT RECENT DEVELOPMENTS IS PROVIDED, PARTICULARLY WITH REGARD TO UPGRADING SECURITY SYSTEMS, AUGMENTING ACCESS CONTROLS AT REMOTE PASSAGEWAYS, AND REDUCING THE WORK LOAD OF GUARDS. PROTECTION THAT CAN BE OBTAINED FROM THE VARIOUS LEVELS OF CONTROL IS EVALUATED, AND ACCESS CONTROL SYSTEMS ARE DESCRIBED ALONG WITH THEIR INDIVIDUAL FUNCTIONS. THE LEVELS OF ACCESS CONTROL ARE (1) ACCESS AUTHORIZATION, (2) ACCESS AUTHORIZATION WITH PERSONAL IDENTIFICATION, AND (3) ACCESS AUTHORIZATION WITH PERSONAL IDENTIFICATION AND IDENTITY VERIFICATION. ALL THREE LEVELS CAN BE IMPLEMENTED BY MANUAL, AUTOMATED, OR SEMIAUTOMATED SYSTEMS THAT PERFORM THE ACCESS CONTROL FUNCTIONS OF INTERROGATION, DECISION, RESPONSE, AND DOCUMENTATION. EQUIPMENT NEEDED TO PERFORM THESE FUNCTIONS IS REVIEWED, INCLUDING DEVELOPMENTS IN THE USE OF BADGES, KEY CARDS, IDENTIFICATION DEVICES, CONTROL EQUIPMENT, AND IDENTITY VERIFICATION EQUIPMENT. REFERENCES ARE INCLUDED. (KBL)