dc.contributor.author |
Goncalves, Duarte PD
|
|
dc.date.accessioned |
2024-02-06T12:59:24Z |
|
dc.date.available |
2024-02-06T12:59:24Z |
|
dc.date.issued |
2023-11 |
|
dc.identifier.citation |
Goncalves, D.P. 2023. Security access control effectiveness design. <i>South African Journal of Industrial Engineering, 34(3).</i> http://hdl.handle.net/10204/13581 |
en_ZA |
dc.identifier.issn |
2224-7890 |
|
dc.identifier.uri |
https://doi.org/10.7166/34-3-2954
|
|
dc.identifier.uri |
http://hdl.handle.net/10204/13581
|
|
dc.description.abstract |
South Africa's infrastructure faces a barrage of security attacks that has led to the promulgation of the Critical Infrastructure Protection Act (CIPA) No. 8 of 2019. Residual risk (i.e. after the threats have been mitigated) must be assessed for the critical infrastructure security system as part of the total security system design. One area that requires attention is access control. This paper will demonstrate how to approach such a design with particular focus on the effectiveness of the access control system and how to choose the biometric or digital key (such as access cards) system. The approach starts with defining access control events which are used to define access control effectiveness in terms of probability of invalid access and probability of anomaly detection. The theoretically derived results are validated by means of simulation. Based on these models, guidance is provided for the design of access control for critical infrastructure. |
en_US |
dc.format |
Fulltext |
en_US |
dc.language.iso |
en |
en_US |
dc.relation.uri |
https://sajie.journals.ac.za/pub/article/view/2954 |
en_US |
dc.source |
South African Journal of Industrial Engineering, 34(3) |
en_US |
dc.subject |
Access Control |
en_US |
dc.subject |
Authentication |
en_US |
dc.subject |
Authorisation |
en_US |
dc.subject |
Biometrics |
en_US |
dc.subject |
Effectiveness |
en_US |
dc.subject |
Security |
en_US |
dc.title |
Security access control effectiveness design |
en_US |
dc.type |
Article |
en_US |
dc.description.pages |
84-96 |
en_US |
dc.description.cluster |
Defence and Security |
en_US |
dc.description.impactarea |
Command Control and Integrated Systems |
en_US |
dc.identifier.apacitation |
Goncalves, D. P. (2023). Security access control effectiveness design. <i>South African Journal of Industrial Engineering, 34(3)</i>, http://hdl.handle.net/10204/13581 |
en_ZA |
dc.identifier.chicagocitation |
Goncalves, Duarte PD "Security access control effectiveness design." <i>South African Journal of Industrial Engineering, 34(3)</i> (2023) http://hdl.handle.net/10204/13581 |
en_ZA |
dc.identifier.vancouvercitation |
Goncalves DP. Security access control effectiveness design. South African Journal of Industrial Engineering, 34(3). 2023; http://hdl.handle.net/10204/13581. |
en_ZA |
dc.identifier.ris |
TY - Article
AU - Goncalves, Duarte PD
AB - South Africa's infrastructure faces a barrage of security attacks that has led to the promulgation of the Critical Infrastructure Protection Act (CIPA) No. 8 of 2019. Residual risk (i.e. after the threats have been mitigated) must be assessed for the critical infrastructure security system as part of the total security system design. One area that requires attention is access control. This paper will demonstrate how to approach such a design with particular focus on the effectiveness of the access control system and how to choose the biometric or digital key (such as access cards) system. The approach starts with defining access control events which are used to define access control effectiveness in terms of probability of invalid access and probability of anomaly detection. The theoretically derived results are validated by means of simulation. Based on these models, guidance is provided for the design of access control for critical infrastructure.
DA - 2023-11
DB - ResearchSpace
DP - CSIR
J1 - South African Journal of Industrial Engineering, 34(3)
KW - Access Control
KW - Authentication
KW - Authorisation
KW - Biometrics
KW - Effectiveness
KW - Security
LK - https://researchspace.csir.co.za
PY - 2023
SM - 2224-7890
T1 - Security access control effectiveness design
TI - Security access control effectiveness design
UR - http://hdl.handle.net/10204/13581
ER -
|
en_ZA |
dc.identifier.worklist |
27031 |
en_US |