Only those in possession of an appropriate card, with an appropriate security level and with knowledge of the PIN are permitted entry to the room.
In order to authenticate, authorize, or maintain accountability a variety of methodologies are used such as password protocols, devices coupled with protocols and software, encryption, firewalls, or other systems that can detect intruders and maintain security, reduce vulnerabilities and protect the data and systems from threats.
These can include sophisticated password programs, advanced biometric security features, or any other setups that effectively identify and screen users at any administrative level.
Militaries and governments use logical access biometrics to protect their large and powerful networks and systems which require very high levels of security.
Without logical access control security systems highly confidential information would be at risk of exposure.