Identifying possible threats in the access control system