How do you protect an access control system? Case study Frankfurt Airport

John Harvey and Martin Fiur of LEGIC explain why system security always begins with procurement.

If you want to manage who comes and goes in your buildings, the most vulnerable point of attack is neither the access control system itself, nor physical identification media such as employee badges:; it is the cryptographic keys that are used to configure and manage your system.

In offices, factories, warehouses, universities hotels, utilities and airports, this most fundamental level of access security is thus of paramount importance. LEGIC's "Master Token System Control" access control technology address this core security issue.

Read the full article in the July 2021 issue of International Security Journal.