Department of Defense User's Guide on Controlling Locks, Keys and Access Cards: DoD Lock Program Department of Defense User's Guide on Controlling Locks, Keys and Access Cards: DoD Lock Program

Department of Defense User's Guide on Controlling Locks, Keys and Access Cards: DoD Lock Program

    • S/ 34.90
    • S/ 34.90

Descripción editorial

This is a reproduction of the official U.S. military user’s guide on controlling locks, keys, and access cards, produced by the Naval Facilities Engineering Service Center. This user’s guide provides information and recommended procedures for establishing key and lock programs. Also included are specific hardware requirements for protection of arms, ammunition, and explosives (AA&E) and sensitive and critical assets. This user’s guide provides information and procedures that will aid in the distribution and control of mechanical and electronic keys. An effective access control (lock and key or electronic) program will help minimize the possibility of unauthorized access to a facility and/or assets in a facility. Possession of keys and access control cards represent primary authorization for an individual to enter a facility or have access to a particular asset. Possession of keys and access control cards by unauthorized individuals severely affects security and neutralizes the primary purpose of an access control program. This user’s guide presents information on establishing a program for protecting Department of Defense (DoD) assets against covert or insider threats. This guide is divided into five chapters and seven appendices that describe a process for controlling locks, keys and access cards or credentials. Chapter 2 describes DoD requirements for access control. Chapter 3 provides a structured program for controlling locks, keys and access control cards. Chapter 4 provides descriptions of software and hardware that are commercially available for controlling locks and keys. Chapter 5 provides a structured program that specifically addresses the control of locks and keys that protect critical assets. The appendices include a glossary of lock, key, and access control terms, references, a listing of manufacturers that offer software and hardware for access control, and forms that can be used to implement a comprehensive lock, key, or access card control program. The appendices also include a checklist for lock and key control, a sample lock and key control plan, and a general description of electronic access control systems.
This user's guide provides information and procedures that will aid in the distribution and control of mechanical and electronic keys. An effective access control (lock and key or electronic) program will help minimize the possibility of unauthorized access to a facility and/or assets in a facility. Possession of keys and access control cards represent primary authorization for an individual to enter a facility or have access to a particular asset. Possession of keys and access control cards by unauthorized individuals severely affects security and neutralizes the primary purpose of an access control program.
Contents: Chapter 1 - Introduction * Chapter 2 - DoD Lock and Key Control Requirements * Chapter 3 - Establishing a Program for Controlling Locks, Keys, or Access Credentials * Chapter 4 - Key Control Software and Equipment * Chapter 5 - Lock And Key Control for Critical Assets

GÉNERO
Historia
PUBLICADO
2014
4 de septiembre
IDIOMA
EN
Inglés
EXTENSIÓN
92
Páginas
EDITORIAL
Progressive Management
VENTAS
Draft2Digital, LLC
TAMAÑO
4.5
MB

Más libros de Progressive Management

General George S. Patton: Operational Art, Battle Command Lessons in the Second World War, Leadership Development, Battle of the Bulge, Many Faces, Air Power for Patton's Army in World War II General George S. Patton: Operational Art, Battle Command Lessons in the Second World War, Leadership Development, Battle of the Bulge, Many Faces, Air Power for Patton's Army in World War II
2014
2018 U.S. Intelligence Community Worldwide Threat Assessment: Coats Testimony: Global Cyber Threats, WMD Nuclear Proliferation, Terrorism, Foreign Denial and Deception, Space and Counterspace 2018 U.S. Intelligence Community Worldwide Threat Assessment: Coats Testimony: Global Cyber Threats, WMD Nuclear Proliferation, Terrorism, Foreign Denial and Deception, Space and Counterspace
2018
The South China Sea (SCS) Territorial Disputes: Catalyst for a United States - Vietnamese Security Partnership - Strategy, Policy, Provocations and Challenges, Role of Philippines, Malaysia, Brunei The South China Sea (SCS) Territorial Disputes: Catalyst for a United States - Vietnamese Security Partnership - Strategy, Policy, Provocations and Challenges, Role of Philippines, Malaysia, Brunei
2017
Eisenhower: Comparative Analysis of the Military Leadership Styles of George C. Marshall and Eisenhower, Can Judgment Be Developed: A Case Study of Three Proven Leaders (Patton, Eisenhower, Bradley) Eisenhower: Comparative Analysis of the Military Leadership Styles of George C. Marshall and Eisenhower, Can Judgment Be Developed: A Case Study of Three Proven Leaders (Patton, Eisenhower, Bradley)
2017
The Defeat of the 7th Cavalry: Impact on the Nation - Custer's Little Bighorn Loss in the 1876 Indian Campaign, Early Indian Policy, Post Civil War Focus, Effect of the Massacre on the Army, Politics The Defeat of the 7th Cavalry: Impact on the Nation - Custer's Little Bighorn Loss in the 1876 Indian Campaign, Early Indian Policy, Post Civil War Focus, Effect of the Massacre on the Army, Politics
2016
The Makara of Hizballah: Deception in the 2006 Summer War - History and Organization of Hizballah, Lebanon, Chain of Command, Hijacking the Internet, Bunkers, Denial Operations, Electronic Warfare The Makara of Hizballah: Deception in the 2006 Summer War - History and Organization of Hizballah, Lebanon, Chain of Command, Hijacking the Internet, Bunkers, Denial Operations, Electronic Warfare
2016