It however explained how smart card can be used as an access control mechanism as well as locks, in securing facility or system. This chapter also discussed about Electronic Access Control (EAC) tokens and how useful it is in protecting and controlling entrances into physically controlled area. Intrusion Detection System was also evaluated in this chapter as an essential tool in detecting any strange changes within the physical environment or system. Once the IDSs capture any strange change, it alerts the responsible entities and proper action will be taken to evaluate the situation and react to it. In all, physical security though, was often not considered when addressing information security, but it is a key area that touched people, data, system, buildings and all company
It however explained how smart card can be used as an access control mechanism as well as locks, in securing facility or system. This chapter also discussed about Electronic Access Control (EAC) tokens and how useful it is in protecting and controlling entrances into physically controlled area. Intrusion Detection System was also evaluated in this chapter as an essential tool in detecting any strange changes within the physical environment or system. Once the IDSs capture any strange change, it alerts the responsible entities and proper action will be taken to evaluate the situation and react to it. In all, physical security though, was often not considered when addressing information security, but it is a key area that touched people, data, system, buildings and all company