2.7 Explain the importance of physical security controls Flashcards
Explain BOLLARDS/BARRICADES
Barricades can be made out of various materials, including concrete and metal. They are usually constructed to delay a determined intruder long enough for security and other response personnel to neutralize any threats posed by the intruder. Bollards—concrete or metal posts—are examples of barricades that might be placed outside of a facility around drive-through areas, parking lots, and even sidewalks. Bollards impede vehicular traffic but do not deter foot traffic.
Explain ACCESS CONTROL VESTIBULES
Mantraps guide and control individuals physically as they enter or exit a facility. A mantrap is a small room or compartment, with two doors that are individually locked, usually electronically. One individual at a time enters the mantrap, and the entry door is locked. Mantraps are normally used in highly secure facilities, such as data centers, where positive authentication of personnel is of critical importance.
Explain ALARMS
Physical alarm systems and intrusion detection systems are a must in any physical security program. Alarm systems can be loud and obnoxious, such as fire or tornado alarms, but they can also be silent alarms that sound or activate only at a guard station. Silent alarms alert security personnel without alerting an intruder that he or she has been discovered, giving security personnel time to reach and subdue the intruder.
Explain SIGNAGE
Signage—words on plates of metal, wood, or plastic—helps deter unwanted visitors. Signs can warn intruders away from restricted areas and instruct authorized personnel to follow the proper security and safety procedures. Signs can direct personnel during an evacuation to the correct exit points, warn personnel about potential safety hazards in the facility, or help them find proper safety or fire suppression equipment.
Explain MOTION RECOGNITION CAMERAS
Recording systems should automatically kick in with motion recognition hardware detecting movement, thus capturing anything larger than a squirrel that enters a camera’s field of view.
Explain OBJECT DETECTION CAMERAS
Speaking of squirrels . . . some security camera software employs object detection algorithms, meaning the software can provide an alert when detecting something out of the ordinary. The movement of a squirrel or bird wouldn’t trigger anything, for example, but an unauthorized drone would.
Explain CLOSED-CIRCUIT TELEVISION(CCTV)
Closed-circuit television systems (CCTVs) can be placed throughout a facility. CCTVs use cameras to record surveillance video and transmit it to a central monitoring station, which enables guards to extend their view of the facility. CCTV systems detect and watch intruders in areas where guards can’t be all the time.
Explain INDUSTRIAL CAMOUFLAGE
Hiding or obscuring CCTV cameras helps enhance the security of a network. This industrial camouflage potentially causes attackers to miss the fact that cameras are rolling, thus minimizing the attackers’ ability to avoid visual or auditory capture.
Explain GUARDS
Security guards have specific training and skills to monitor and maintain facility security. Most facilities that have any type of physical security have guards, and despite all of the new advances in technologies that might one day eliminate them, human guards will likely be a cornerstone of facility security for years to come.
Explain ROBOT SENTRIES
The increasingly sophisticated artificial intelligence features of computer systems combined with brilliantly engineered mechanical systems will usher in the use of robot sentries.
Explain RECEPTION PERSONNEL
Guards in the reception area of a building manage people in real time. They can actively review people who step up to the entryway and, again, actively allow or deny access to the facility. They can and should log in and out every single visitor on a visitor log.
Explain TWO-PERSON INTEGRITY/CONTROL
In a general sense, two-person integrity (TPI) simply means that you have two guards in the same space at all times, so one guard can’t mess up (inadvertently or on purpose) without the other guard catching the problem. Specifically, TPI refers to the nuclear weapons controls in the United States; again, so one person can’t make a catastrophic mistake. It’s a failsafe mechanism.
Explain BIOMETRIC LOCKS
They also may be tied to other security measures, such as smart cards or badges—physical authentication devices—and biometric mechanisms—such as fingerprint readers.
Explain ELECTRONIC LOCKS
Electronic locks are more sophisticated and may use various protection mechanisms. Usually, an electronic lock uses a PIN code and may be known as a cipher lock. Electronic locks usually have their mechanisms protected by metal containers or embedded into walls. They may be programmable, offering configurable options, such as the ability to program in separate PINs for different people, a lockout threshold for the number of incorrect PIN entries, a lockout delay, and so on.
Explain PHYSICAL LOCKS
Some physical locks, called device locks, are used to lock down items that are easily stolen, such as laptops. Some mobile devices have a special slot to facilitate this type of lock. Most physical locks use ordinary keys and can be purchased from a hardware store. Combination locks, which require a numerical combination or PIN code to unlock them, and locks built into the door or other type of entrance (such as a gate, vault, or safe) are also popular hardware locks.