3.4 Compare and contrast physical security controls - Paiet/Tech-Journal-for-Everything GitHub Wiki

3.4 Compare and contrast physical security controls

  • Mantraps
    • Physical security measure
    • Locks a person in a confined space employing a 2 locked door method
      • Person enters the room through one door
      • 2nd door won't open until the first door is closed and locked
    • Locks can be managed by guards or the user can manipulate them with a key card or code on a keypad
      • Could also be a combo of both
    • Integrated metal detectors can sniff out weapons
    • Often uses CCTV and Intercom systems for communications and observation
    • Where do we see this type of access control?
      • Banks
      • Jewelry stores
      • Data centers
  • Network closets
    • Allow you to partition off the network/server equipment from the general public who doesn't need access to it anyway
      • Reduces the risk of accidental/purposeful damage
    • Locks on the doors
      • Only accessible by authorized staff
  • Video monitoring
    • Can be used for surveillance/monitoring/documenting access
    • Can also be used for communications before access is granted (intercom)
      • Verifies request before allowing access
      • Provides for a physical barrier while allowing interaction
    • IP cameras/CCTVs
      • Both systems increase your ability to monitor your surroundings
      • Closed Circuit TeleVision cameras are the traditional method for accomplishing video surveillance
      • IP cameras connect to the network, so they can be accessed through the network/internet
        • Some IP camera systems us local storage along with remote storage in case network connectivity is lost
  • Door access controls
    • Card readers
      • Reads the magnetic stripe on a plastic card which authenticates the user and grants access
      • Like a hotel room key
    • Intercoms
      • User must interact with guard before access is granted
      • May be video intercom system
  • Proximity readers/key fob
    • Key cards
    • Key Fobs
    • Cards/Fobs are placed near the reader (around 5cm)
      • Sends a challenge-response over RF
      • Interacts with a server for access rights
  • Biometrics
    • Fingerprint
    • Retina
    • Voice recognition
  • Keypad/cipher locks
    • User must punch in a correct code to unlock the door
  • Security guard
    • Good old Barney Fife ;)
    • Guards are able to interact/react to situations like crime, fire, or general suspicious/emergency activity
    • They bring human problem solving skills and intuition to the table as assets
    • They also bring human fallibility and are susceptible to things like social engineering attacks