Turnstile
Turnstile: A form of physical access control, turnstiles regulate individual entry to secure areas one person at a time, often requiring authentication like badges, tickets, or biometrics. They’re used in various settings, from public transit to high-security buildings, to prevent unauthorized access and manage pedestrian traffic flow.
Tailgating
Tailgating: The unauthorized access to a restricted area by following someone who has legitimate access. It is a common security risk, especially in physical security environments such as buildings and facilities. Examples include an unauthorized person following an employee into a secured office building, or a visitor following a resident into a gated community.
Suppression measures
Suppression measures: Actions or techniques designed to prevent, reduce, or eliminate unwanted behavior or occurrences. In a security context, it can include methods used to counteract potential threats or to minimize the impact of a security incident. These measures could range from firewalls and antivirus software that suppress malicious activity to disaster recovery plans that […]
Surge suppressor
Surge suppressor: A device that protects electronic equipment from voltage spikes or surges. It is commonly used in homes and businesses to protect computers and other sensitive equipment from damage. Examples include a surge protector strip for a computer, a whole-house surge protector for a home’s electrical system, and a surge protector for a commercial […]
Smart cards
Smart cards: A type of security token that stores information on a microprocessor chip, such as personal identification or financial data. It is used in access control and secure transactions. Examples include using a smart card to access a secure facility or using a smart card for contactless payment.
Shielded enclosure
Shielded enclosure: A protective covering or enclosure that is designed to block electromagnetic interference (EMI). It is used in electrical and electronic systems to prevent EMI from affecting the operation of the system. Examples include shielded cables and enclosures for sensitive electronic equipment.