Request to Exit (REX) Systems
Request to Exit (REX) Systems: Security mechanisms that allow individuals to exit a secured area without manual unlocking, using devices such as motion sensors, push bars, and wave-to-open switches to automatically unlock doors when a person approaches.
Proximity Reader
Proximity Reader: A device that uses electromagnetic fields or radio waves to identify objects in close proximity. This is commonly used in security systems to authenticate users based on their proximity to a particular device or location. Examples include RFID readers and NFC readers.
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID): A technology that uses electromagnetic fields to automatically identify and track objects, such as RFID tags attached to products or animals. It is used in supply chain management, inventory tracking, and security systems to automate data collection and tracking. Examples include using RFID tags to track packages in a warehouse, using […]
Physical access control
Physical access control: The measures put in place to restrict physical access to a facility, building, or device. This can include security guards, keycards, security cameras, and biometric scanners. It is used in the field of information security to prevent unauthorized individuals from gaining access to sensitive information or systems. 3 examples of physical access […]
Physical access token
Physical access token: A physical access token is a tangible device that provides secure user authentication and access control to buildings, rooms, or information systems. These tokens store security credentials and can take various forms, such as key fobs, smart cards, or USB tokens. Examples include RFID badges for building access, tokens for two-factor authentication, […]
Physical controls
Physical controls: Security measures implemented in the physical environment to protect sensitive information from unauthorized access. These measures include locks, barriers, alarms, and surveillance cameras, aimed at deterring and detecting security threats. For example, locked doors and security cameras can prevent unauthorized entry to a building, while a password-protected login screen can secure information on […]