Security: Physical Security - Paiet/Tech-Journal-for-Everything GitHub Wiki

  • Lighting
    • Illumination of important areas such as entry-control points
    • Perimeters of buildings and fences
    • Not a psychological deterrent
    • Relatively inexpensive to maintain
    • Assist guards and camera-based systems
    • Should have power backup, or UPS support
  • Signs
    • Authorized entry points(public access point to secured access)
    • Controlled entry points(public access point to customer area)
    • Warning signs around perimeters
    • Physical hazard areas
  • Fencing/gate/cage
    • Fencing is the most common physical security component
    • Example
  • Security guards
    • Real-time monitoring
    • Reacting in realtime to intrusion events
    • Human element is more adaptable to events that IDS systems
    • SANS Reading Room Whitepaper 37120
    • http://bit.ly/2okpYhW
  • Alarms
  • Safes
  • Secure cabinets/enclosures
  • Protected distribution/Protected cabling
    • PDS or Protected Distribution Systems
    • Protection of wireline and optical fiber PDS to transmit unencrypted information
    • National Security Telecommunication and Information Security Instruction (NSTISSI) No. 7003 standardized PDSs to transmit unencrypted National Security Information
    • Stress the need for continued physical security integrity
  • Airgap
  • Mantrap
  • Faraday cage
    • Time for the tin foil hat
    • Side-channel attack is a form of reverse engineering in which circuitry leaks EM fields making it possible for capture. The attacker is able to deduce the information or data that is being processed.
    • van Eck phreaking
    • Embedded System
      • Types
        • IC
        • SoC
        • IoTs,are susceptible
    • http://bit.ly/2oNwdif (Wikipedia)
    • http://amzn.to/2p8krjr (Amazon)
  • Lock types
  • Biometrics
    • Types
      • Fingerprint readers
      • Hand geometry scanners
      • Retinal scanners
      • Face recognition
      • Voice recognition
  • Barricades/bollards
    • Guides traffic away from an area
    • Prevents from vehicle intrusions
    • Can be static or hydraulic (think Gunter's AFB)
    • Can be crash rated to within vehicular impacts
    • Types
  • Tokens/cards
    • Mentioned throughout, keyfobs,smartcards, RFID
  • Environmental controls
  • Cable locks
    • Kabilt
    • Keningston
    • Keningston Security Slots
    • Targus
  • Screen filters
  • Cameras
  • Motion detection
    • Radar-waves relying on reflection back to a sensor
    • Photo-sensitive detects using lasers and light sensor
    • Passive Infrared or PiR using abrupt changes in the infrared energy.
  • Logs
    • Visitor access
      • Being able to uniquely identify and record individual's access 24/7
    • Event monitoring
    • Log retention for auditing or review purposes
    • Securely storing logs
  • Infrared detection
    • Most IR beam sensors come with one to three beams
    • More beams, larger coverage area or creating taller beam that is harder to bypass
  • Key management
    • Key falling into the hands of an unauthorized
    • Gives unauthorized person or persons
    • Data breaches
    • Corrupted keys can render data unreadable