The Anatomy of an Access Control Reader: A Cybersecurity Perspective