53

The article considers the possibility of creating access control and management systems, shows the scheme of operation, methods and means of implementing the access control and control system for the object, describes the functional features of the ACS software product. An important issue is the possibility of integrating the ACS with any security system based on the use of an open protocol. For the correct use of technical means at the checkpoint, you first need to thoroughly study the principles of their use, understand all the nuances, pros and cons of their use. Modern technical means are certainly a necessary element of the checkpoint, and the checkpoint as part of the security system will clearly perform many functions

  • Ўқишлар сони 53
  • Нашр санаси 21-03-2024
  • Мақола тилиIngliz
  • Саҳифалар сони1942-1949
English

The article considers the possibility of creating access control and management systems, shows the scheme of operation, methods and means of implementing the access control and control system for the object, describes the functional features of the ACS software product. An important issue is the possibility of integrating the ACS with any security system based on the use of an open protocol. For the correct use of technical means at the checkpoint, you first need to thoroughly study the principles of their use, understand all the nuances, pros and cons of their use. Modern technical means are certainly a necessary element of the checkpoint, and the checkpoint as part of the security system will clearly perform many functions

Ҳавола номи
1 1. Tarasov Yu. Control and access control mode at the enterprise. Information protection / / Confidential, 2002. No. 1. pp. 55-61.
2 2. Tatarchenko I. V., Solov'ev D. S. The concept of integration of unified security systems // Security systems. No. 1 (73). pp. 86-89.
3 3. Zlotnik E. Touch Memory - a new electronic identifier// Monitor, 1994. No. 6 P. 26-31.
4 4. Floren M. V. Organization of access control / / Information protection "Confidential", 1995. No. 5. P. 87-93.
5 5. Maltsev I. V. Access control systems / / Security systems, 1996. No. 1. P. 43-45.
6 6. Omelyanchuk A. " To pass or not to pass: This question is solved by access control systems. Mir bezopasnosti, 1997. No. 5. p. 39 ^ 14.
7 7. Sitnikov S. S. Algorithm of equipping a modern object of protection of the ACS / / Communication and telecommunications systems, 2002. June-July. pp. 50-53.
8 8. Phillips P. D., Martin E., Wilson S. L., Przyboki M. Introduction to the evaluation of biometric systems / / Open Systems, 2000. No. 3. pp. 21-27.
9 9. Lopatin D. V., Chirkin E. S. Computer security Center – a point of professional growth of university graduates // Bulletin of the Tambov University. Ser.: Humanities. Tambov, 2008. Issue 11 (67). pp. 45-50
10 10. Lopatin D. V. Cluster of information security / / Cluster model of innovative development of the University: collective monograph / V. M. Yuryev [et al.] Tambov: Publishing House of TSU named after G. R. Derzhavin, 2008. Pp. 175-217
Кутилмоқда