ResearchSpace

Security access control effectiveness design

Show simple item record

dc.contributor.author Goncalves, Duarte PD
dc.date.accessioned 2024-02-06T12:59:24Z
dc.date.available 2024-02-06T12:59:24Z
dc.date.issued 2023-11
dc.identifier.citation Goncalves, D.P. 2023. Security access control effectiveness design. <i>South African Journal of Industrial Engineering, 34(3).</i> http://hdl.handle.net/10204/13581 en_ZA
dc.identifier.issn 2224-7890
dc.identifier.uri https://doi.org/10.7166/34-3-2954
dc.identifier.uri http://hdl.handle.net/10204/13581
dc.description.abstract South Africa's infrastructure faces a barrage of security attacks that has led to the promulgation of the Critical Infrastructure Protection Act (CIPA) No. 8 of 2019. Residual risk (i.e. after the threats have been mitigated) must be assessed for the critical infrastructure security system as part of the total security system design. One area that requires attention is access control. This paper will demonstrate how to approach such a design with particular focus on the effectiveness of the access control system and how to choose the biometric or digital key (such as access cards) system. The approach starts with defining access control events which are used to define access control effectiveness in terms of probability of invalid access and probability of anomaly detection. The theoretically derived results are validated by means of simulation. Based on these models, guidance is provided for the design of access control for critical infrastructure. en_US
dc.format Fulltext en_US
dc.language.iso en en_US
dc.relation.uri https://sajie.journals.ac.za/pub/article/view/2954 en_US
dc.source South African Journal of Industrial Engineering, 34(3) en_US
dc.subject Access Control en_US
dc.subject Authentication en_US
dc.subject Authorisation en_US
dc.subject Biometrics en_US
dc.subject Effectiveness en_US
dc.subject Security en_US
dc.title Security access control effectiveness design en_US
dc.type Article en_US
dc.description.pages 84-96 en_US
dc.description.cluster Defence and Security en_US
dc.description.impactarea Command Control and Integrated Systems en_US
dc.identifier.apacitation Goncalves, D. P. (2023). Security access control effectiveness design. <i>South African Journal of Industrial Engineering, 34(3)</i>, http://hdl.handle.net/10204/13581 en_ZA
dc.identifier.chicagocitation Goncalves, Duarte PD "Security access control effectiveness design." <i>South African Journal of Industrial Engineering, 34(3)</i> (2023) http://hdl.handle.net/10204/13581 en_ZA
dc.identifier.vancouvercitation Goncalves DP. Security access control effectiveness design. South African Journal of Industrial Engineering, 34(3). 2023; http://hdl.handle.net/10204/13581. en_ZA
dc.identifier.ris TY - Article AU - Goncalves, Duarte PD AB - South Africa's infrastructure faces a barrage of security attacks that has led to the promulgation of the Critical Infrastructure Protection Act (CIPA) No. 8 of 2019. Residual risk (i.e. after the threats have been mitigated) must be assessed for the critical infrastructure security system as part of the total security system design. One area that requires attention is access control. This paper will demonstrate how to approach such a design with particular focus on the effectiveness of the access control system and how to choose the biometric or digital key (such as access cards) system. The approach starts with defining access control events which are used to define access control effectiveness in terms of probability of invalid access and probability of anomaly detection. The theoretically derived results are validated by means of simulation. Based on these models, guidance is provided for the design of access control for critical infrastructure. DA - 2023-11 DB - ResearchSpace DP - CSIR J1 - South African Journal of Industrial Engineering, 34(3) KW - Access Control KW - Authentication KW - Authorisation KW - Biometrics KW - Effectiveness KW - Security LK - https://researchspace.csir.co.za PY - 2023 SM - 2224-7890 T1 - Security access control effectiveness design TI - Security access control effectiveness design UR - http://hdl.handle.net/10204/13581 ER - en_ZA
dc.identifier.worklist 27031 en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record