School: Science

This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.

  • Unit Title

    Access Control Systems
  • Unit Code

    SCY3213
  • Year

    2016
  • Enrolment Period

    1
  • Version

    1
  • Credit Points

    15
  • Full Year Unit

    N
  • Mode of Delivery

    On Campus
    Online

Description

This unit will examine the security technology of access control systems (ACS). It will identify, define and explain the scientific principles, technologies, design, integration and application of ACS. Analysis of current advances in technology is applied, including biometric identification, smart card technology and system software.

Prerequisite Rule

Students must pass 1 unit from SCY2111

Learning Outcomes

On completion of this unit students should be able to:

  1. Analyse the strengths and weaknesses of ACS.
  2. Apply an understanding of electronic ACS to the design of a strategy for the design, application, management and operation of security risks to which a facility may be exposed.
  3. Define and explain the principles and applications of ACS.
  4. Demonstrate a comprehensive overview of security policy and procedures when applied to facility ACS.
  5. Examine the implications for type and extent of ACS in relation to the security risk.
  6. Identify the theories, concepts and principles underlying the applications of security practices and devices in the area of electronic security technology, especially ACS and biometric systems.
  7. Plan, recommend and report on appropriate ACS for hypothetical facilities.

Unit Content

  1. ACS Applications: The technologies and components that are essential for the operation of an access control system will be presented. The individual components need to be configured for their compatibility for a specific task, with a description explaining how they can be configured for a specific access control application.
  2. Access Control Medium: The theories, principles, technologies and types of electronic access control mediums that have been used as the authorised entry method will be described. A discussion of current and previous technologies in cards will be presented, with an indication of trends for future card technologies. A description of the principles of operation of the card technologies will be presented with discussion on appropriate application.
  3. Access Control: A description of the concepts and principles of ACS as applied in the Defence in Depth concept will be discussed through the components of the system including locking devices, authorised user identification, alarm system and an access control audit trail. A description of ACS as large management systems will be provided, with discussion on the application of access portals.
  4. Biometric Identification: A description of the application of biometric identification of people as a means of access control for the protection of a facility will be presented. A discussion of the types of biometric recognition systems being developed and the features of each for personal identification will be conducted. A discussion of the acceptance and rejection rates of systems will be presented, together with a discussion of the advantages and disadvantages of particular systems in a variety of situations.
  5. Management of ACS: A description of some of the concepts and principles in the management of ACS is presented. A discussion will be provided on the factors that should be considered to ensure that ACS is utilised effectively to achieve a specific application.

Additional Learning Experience Information

Lectures, tutorials, and syndicate activity work.

Assessment

GS1 GRADING SCHEMA 1 Used for standard coursework units

Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.

ON CAMPUS
TypeDescriptionValue
EssayMinor essay20%
EssayMajor essay30%
ExaminationEnd of semester examination50%
ONLINE
TypeDescriptionValue
EssayMinor essay20%
EssayMajor essay30%
ExaminationEnd of semester examination50%

Text References

  • ^ Norman T,L. (2012) Electronic access control Boston: Butterworth-Heinemann.
  • Fay, J.J. (2002). Contemporary security management. Butterworth Heinmann.
  • Fischer, R.J., & Green, G. (1998). Introduction to security (6th ed.). Butterworth Heinmann.
  • Grant, J. (1991). Intruder alarms (2nd ed.). Boreham, UK: Paramount Publishing Ltd.
  • Cunningham, J.E. (1987). Understanding security electronics. Howard W Sams & Co, Indianapolis.
  • Carnahan Conference Proceedings on Security Technology IEEE (1990 - 2001).
  • Barnard, R.L. (1995). Intrusion detection systems (2nd ed.). Boston: Butterworth-Heinemann.
  • AS3725:1995. Australian Standard AS3725:1995 emergency control organisation and procedures for buildings. Australian Standard.
  • McCrie, R.D. (2001). Security operations management. Butterworth Heinmann.
  • Garcia, M.L. (2001). The design and evaluation of physical protection systems. Boston: Butterworth-Heinemann.

^ Mandatory reference


Disability Standards for Education (Commonwealth 2005)

For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.

Academic Misconduct

Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:

  • plagiarism;
  • unauthorised collaboration;
  • cheating in examinations;
  • theft of other students' work;

Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.

The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.

SCY3213|1|1

School: Science

This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.

  • Unit Title

    Access Control Systems
  • Unit Code

    SCY3213
  • Year

    2016
  • Enrolment Period

    2
  • Version

    1
  • Credit Points

    15
  • Full Year Unit

    N
  • Mode of Delivery

    On Campus
    Online

Description

This unit will examine the security technology of access control systems (ACS). It will identify, define and explain the scientific principles, technologies, design, integration and application of ACS. Analysis of current advances in technology is applied, including biometric identification, smart card technology and system software.

Prerequisite Rule

Students must pass 1 unit from SCY2111

Learning Outcomes

On completion of this unit students should be able to:

  1. Analyse the strengths and weaknesses of ACS.
  2. Apply an understanding of electronic ACS to the design of a strategy for the design, application, management and operation of security risks to which a facility may be exposed.
  3. Define and explain the principles and applications of ACS.
  4. Demonstrate a comprehensive overview of security policy and procedures when applied to facility ACS.
  5. Examine the implications for type and extent of ACS in relation to the security risk.
  6. Identify the theories, concepts and principles underlying the applications of security practices and devices in the area of electronic security technology, especially ACS and biometric systems.
  7. Plan, recommend and report on appropriate ACS for hypothetical facilities.

Unit Content

  1. ACS Applications: The technologies and components that are essential for the operation of an access control system will be presented. The individual components need to be configured for their compatibility for a specific task, with a description explaining how they can be configured for a specific access control application.
  2. Access Control Medium: The theories, principles, technologies and types of electronic access control mediums that have been used as the authorised entry method will be described. A discussion of current and previous technologies in cards will be presented, with an indication of trends for future card technologies. A description of the principles of operation of the card technologies will be presented with discussion on appropriate application.
  3. Access Control: A description of the concepts and principles of ACS as applied in the Defence in Depth concept will be discussed through the components of the system including locking devices, authorised user identification, alarm system and an access control audit trail. A description of ACS as large management systems will be provided, with discussion on the application of access portals.
  4. Biometric Identification: A description of the application of biometric identification of people as a means of access control for the protection of a facility will be presented. A discussion of the types of biometric recognition systems being developed and the features of each for personal identification will be conducted. A discussion of the acceptance and rejection rates of systems will be presented, together with a discussion of the advantages and disadvantages of particular systems in a variety of situations.
  5. Management of ACS: A description of some of the concepts and principles in the management of ACS is presented. A discussion will be provided on the factors that should be considered to ensure that ACS is utilised effectively to achieve a specific application.

Additional Learning Experience Information

Lectures, tutorials, and syndicate activity work.

Assessment

GS1 GRADING SCHEMA 1 Used for standard coursework units

Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.

ON CAMPUS
TypeDescriptionValue
EssayMinor essay20%
EssayMajor essay30%
ExaminationEnd of semester examination50%
ONLINE
TypeDescriptionValue
EssayMinor essay20%
EssayMajor essay30%
ExaminationEnd of semester examination50%

Text References

  • ^ Norman T,L. (2012) Electronic access control Boston: Butterworth-Heinemann.
  • Fay, J.J. (2002). Contemporary security management. Butterworth Heinmann.
  • Fischer, R.J., & Green, G. (1998). Introduction to security (6th ed.). Butterworth Heinmann.
  • Grant, J. (1991). Intruder alarms (2nd ed.). Boreham, UK: Paramount Publishing Ltd.
  • Cunningham, J.E. (1987). Understanding security electronics. Howard W Sams & Co, Indianapolis.
  • Carnahan Conference Proceedings on Security Technology IEEE (1990 - 2001).
  • Barnard, R.L. (1995). Intrusion detection systems (2nd ed.). Boston: Butterworth-Heinemann.
  • AS3725:1995. Australian Standard AS3725:1995 emergency control organisation and procedures for buildings. Australian Standard.
  • McCrie, R.D. (2001). Security operations management. Butterworth Heinmann.
  • Garcia, M.L. (2001). The design and evaluation of physical protection systems. Boston: Butterworth-Heinemann.

^ Mandatory reference


Disability Standards for Education (Commonwealth 2005)

For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.

Academic Misconduct

Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:

  • plagiarism;
  • unauthorised collaboration;
  • cheating in examinations;
  • theft of other students' work;

Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.

The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.

SCY3213|1|2