Entry Level Theory

How Access Control Systems Work

Most access control systems operate using the same basic process:

  1. Identify – The system checks the person’s credentials (such as a key fob, PIN code, or ID).
  2. Verify – The system confirms that the credentials match an authorized user in the database.
  3. Document – The system logs the access attempt, creating a record for security purposes.
  4. Authorize & Unlock – If approved, the system unlocks the door or gate.

Many basic access control systems do not require a security officer to be present for day-to-day use. However, security officers play an important role in monitoring, enforcing, and responding to issues that these systems cannot handle on their own.

What Happens if Someone Tries to Cheat the System?

Some individuals may attempt to scam or bypass an access control system by using fake credentials, stolen access cards, or tailgating (following someone in without permission).

  • In most cases, the reader will not unlock the door or gate if the credentials are invalid.
  • Some systems trigger an alarm, which alerts a security monitoring center or the police if multiple failed attempts occur.
  • If the system is connected to a Closed-Circuit Television (CCTV) system, security officers or investigators can review footage to identify the individual.
  • Some sites have active security monitoring, where officers watch cameras in real-time to spot suspicious activity.

Common Access Control Systems in Use Today

Different sites use different access control methods based on security needs and the type of facility.

Apartment & Building Access Systems

  • Call Box in the Lobby – Guests use an intercom system to call the resident, who can unlock the door remotely.
  • Security Officer at the Lobby Desk – The officer checks the guest’s ID, logs their visit, and announces them to the tenant before allowing entry.

Key Fobs & Access Cards

  • Used for doors, gates, elevators, and restricted areas.
  • The system automatically logs each use, recording who entered and at what time.
  • If lost or stolen, key fobs should be reported immediately to deactivate access.

Combination Locks & PIN Entry

  • Doors require a PIN code or combination to open.
  • Some systems allow managers to change codes regularly for added security.
  • Should never be shared with unauthorized individuals.

Security Officer Responsibilities When Assigned to an Entry Post

If a security officer is stationed at an access point, they must follow specific procedures to verify identity and document all visitors.

  • Always cross-check identification with the information provided in the visitor registry or access log.
  • Verify the purpose of the visit before allowing entry.
  • Watch for suspicious behavior such as tailgating, visitors refusing to show ID, or people trying to force entry.
  • Follow post instructions for handling unauthorized access attempts. Some sites may require contacting a supervisor, while others may involve law enforcement.
  • Keep accurate records of visitors and incidents to assist with investigations if needed.