Service ID : HSPSCD
Entry Control: Controls who can enter or exit a building or area. This includes the use of locks, security guards, keycards, and biometric scanners.
Surveillance: CCTV cameras and alarm systems that monitor and protect physical spaces.
Barriers and Gates: Physical barriers like gates, turnstiles, and security doors that restrict access to certain areas.
Logical Access Control:
Authentication: Verifying the identity of a user or device before granting access. Common methods include:
Passwords and PINs: The most basic form of authentication.
Biometrics: Uses unique physical characteristics, such as fingerprints or facial recognition, to authenticate users.
Two-Factor Authentication (2FA): Combines something the user knows (password) with something they have (mobile device) or something they are (biometric).
Authorization: Determines what an authenticated user is allowed to do. This is often based on roles, rules, or attributes.
Encryption: Protects data in transit and at rest, ensuring that only authorized parties can access or read it.
Description
Entry Control: Controls who can enter or exit a building or area. This includes the use of locks, security guards, keycards, and biometric scanners.
Surveillance: CCTV cameras and alarm systems that monitor and protect physical spaces.
Barriers and Gates: Physical barriers like gates, turnstiles, and security doors that restrict access to certain areas.
Logical Access Control:
Authentication: Verifying the identity of a user or device before granting access. Common methods include:
Passwords and PINs: The most basic form of authentication.
Biometrics: Uses unique physical characteristics, such as fingerprints or facial recognition, to authenticate users.
Two-Factor Authentication (2FA): Combines something the user knows (password) with something they have (mobile device) or something they are (biometric).
Authorization: Determines what an authenticated user is allowed to do. This is often based on roles, rules, or attributes.
Encryption: Protects data in transit and at rest, ensuring that only authorized parties can access or read it.