employees access a secure area by entering a cipher code, but this code does not identify individuals. after a recent security incident, management has decided to implement a key card system that will identify individuals who enter and exit this secure area. however, the installation might take six months or longer. which of the following choices can the organization install immediately to identify individuals who enter or exit the secure area?