U.S. Department of Justice
Office of Justice Programs
National Institute of Justice
DOJ Seal
Line
 
Title Page
Spacer
Line
Spacer
Foreword
Spacer
Line
Spacer
Preface
Spacer
Line
Spacer
Acknowledgments
Spacer
Line
Spacer
Table of Contents
Spacer
Chapter 1
Spacer
Chapter 2
Spacer
Chapter 3
Spacer
Chapter 4
Spacer
Chapter 5
Spacer
Line
Spacer
Resources
Spacer
Line
Spacer
Home
 
Entry-Control Approaches
(Chapter 4   Entry-Control Technologies, Continued)

Once entrances to a facility are limited in number, the process of allowing or denying access is generally accomplished through one of four approaches. The first and most common approach is manpower intensive, and the remaining three employ technology devices. The level of actual security achieved is generally believed to be from 1 to 4, lowest security to highest security, but this is subject to many other variables. These four approaches are:

  1. A security guard controls entry; ID cards or other means of identification may be checked. (WHO lets you in)
  2. A special ID card/badge with automatic readers. (What you HAVE)
  3. A PIN number for entering on a keypad. (What you KNOW)
  4. A biometric device for feature recognition. (Who you ARE)

Exhibit 4.02The following sections provide further details. The second, third, and fourth approaches utilize technology, as illustrated in exhibit 4.2.

 



Research Report:   The Appropriate and Effective Use of Security Technologies in U.S. Schools