What is one possible goal of a terrorist attack?

identity before granting access, or the lock itself can serve as the verification device that also grants or restricts entry. Badges Badges, identification cards, and security IDs are forms of physical identification andor of elec- tronic access control devices. A badge can be as simple as a name tag indicating whether you are a valid employee or a visitor. Or it can be as complex as a smart card or token device that employs multifactor authentication to verify and prove your identity and provide authentica- tion and authorization to access a facility, specific rooms, or secured workstations. Badges often include pictures, magnetic strips with encoded data, and personal details to help a security guard verify identity. Badges may be used in environments in which physical access is primarily controlled by secu- rity guards. In such conditions, the badge serves as a visual identification tool for the guards. They can verify your identity by comparing your picture to your person and consult a printed or electronic roster of authorized personnel to determine whether you have valid access. Badges can also serve in environments guarded by scanning devices rather than security guards. In such conditions, the badge can be used either for identification or for authentication. When the badge is used for identification, it is swiped in a device and then the badge owner must provide one or more authentication factors, such as a password, pass phrase, or biological trait if a biometric device is used. When the badge is used for authentication, the badge owner pro- vides their ID, username, and so on and then swipes the badge to authenticate. Motion Detectors A motion detector, or motion sensor, is a device that senses the occurrence of motion in a specific area. There are many different types of motion detectors, including infrared, heat, wave pattern, capacitance, photoelectric, and passive audio. An infrared motion detector monitors for signifi- cant or meaningful changes in the infrared lighting pattern of a monitored area. A heat-based motion detector monitors for significant or meaningful changes in the heat levels and patterns in a monitored area. A wave pattern motion detector transmits a consistent low ultrasonic or high microwave frequency pattern into the monitored area and monitors for significant or meaningful changes or disturbances in the reflected pattern. A capacitance motion detector senses changes in the electrical or magnetic field surrounding a monitored object. A photoelectric motion detector senses changes in the visible light levels of the monitored area. Photoelectric motion detectors are usually deployed in internal rooms that have no windows and are kept dark. A passive audio motion detector listens for abnormal sounds in the monitored area. Intrusion Alarms Whenever a motion detector registers a significant or meaningful change in the environment, it triggers an alarm. An alarm is a separate mechanism that triggers a deterrent, a repellant, and or a notification. Alarms that trigger deterrents may engage additional locks, shut doors, and so on. The goal of such an alarm is to make further intrusion or attack more difficult. Alarms that trigger repellants usually sound an audio siren or bell and turn on lights. These kinds of alarms are used to discourage the intruder or attacker from continuing their malicious or tres- passing activities and get them to leave the premises. Alarms that trigger notification are often silent from the perspective of an intruderattacker, but they record data about the incident and notify administrators, security guards, and law enforcement. The recording of an incident can take the form of log files andor CCTV tapes. The purpose of a silent alarm is to bring autho- rized security personnel to the location of the intrusion or attack in hopes of catching the person committing the unwanted acts. Local alarm systems must broadcast an audible alarm signal that can be easily heard up to 400 feet away. Additionally, they must be protected, usually by security guards, from tampering and disablement. For a local alarm system to be effective, there must be a security team or guards positioned nearby who can respond when the alarm is triggered. A centralized alarm sys- tem may not have a local alarm; a remote or centralized monitoring station is signaled when the alarm is triggered. Auxiliary alarm systems can be added to either local or centralized alarm sys- tems. The purpose of an auxiliary alarm system is to notify local police or fire services when an alarm is triggered. Secondary Verification Mechanisms When motion detectors, sensors, and alarms are used, secondary verification mechanisms should be in place. As the sensitivity of these devices is increased, a false trigger will occur more often. Innocuous events such as the presence of animals, birds, bugs, and authorized personnel can trigger false alarms. Deploying two or more detection and sensor systems and requiring two or more triggers in quick succession to occur before an alarm is triggered may significantly reduce false alarms and increase the certainty of sensing actual intrusions or attacks. CCTV closed-circuit television via security cameras is a security mechanism related to motion detectors, sensors, and alarms. However, CCTV is not an automated detection-and- response system. CCTV requires personnel to watch the captured video to detect suspicious and malicious activities and to trigger alarms. Security cameras can expand the effective visible range of a security guard, therefore increasing the scope of his oversight. In many cases, CCTV is not used as a primary detection tool due to the high cost of paying a person to sit and watch the video screens. Instead, it is used as a secondary or follow-up mechanism that is reviewed after a trigger by an automated system occurs. In fact, the same logic used on auditing and audit trails is used for CCTV and recorded events. A CCTV is a preventative measure, while review- ing recorded events is a detective measure. Technical Controls The technical controls most often found employed as an access control mechanism to manage physical access include smartdumb cards and biometrics. In addition to access control, physical security mechanisms include audit trails, access logs, and intrusion detection systems IDSs.