What is a technical attack on an ACS?
The forging of a credential, personal identification number, or obtains another persons credential.
What three methods can be deployed to defeat an access point?
1) Deceit
2) Physical Attack
3) Technical Attack
What five things is an ACS design based off of?
1) Throughput requirements
2) Building and fire codes
3) Integration with other systems
4) Procedural requirements
5) Database management