2.7 Explain the importance of physical security controls. Flashcards
Used to control both foot traffic and vehicles. K-rails (often seen during road construction), large planters, zigzag queues, bollards, and tire shredders are all examples of barricades.
BOLLARDS
A small room with two doors: one in the trusted environment and one opening to the outside. Access control vestibules often contain scales and cameras to prevent piggybacking.
ACCESS CONTROL VESTIBULE/ MANTRAPS
When an employee is terminated or otherwise departs the organization, badges should be retrieved and destroyed. A facility’s security policy may require that badges be worn in plain view by each authorized person. Badges should be designed with security features to minimize the ability of intruders to replicate or duplicate. Day passes and/or visitor badges should be clearly marked as such with bright colors for easy recognition from a distance, especially for escort required visitors.
BADGES
Systems designed to detect attempted intrusion, breach, or attack; the use of an unauthorized entry point; or the occurrence of some specific event at an unauthorized or abnormal time.
ALARMS
Can be used to declare areas off-limits to those who are not authorized, indicate that security cameras are in use, and disclose safety warnings.
SIGNAGE
Video surveillance, video monitoring, closed-circuit television (CCTV), and security cameras are all means to deter unwanted activity and create a digital record of the occurrence of events.
CAMERAS
Some cameras are activated through motion recognition. Some can even automatically indentify individuals and track their motion across the monitored area. See section 2.4 heading “Gait analysis.” Simple motion recognition or triggered cameras may be fooled by animals, birds, insects, weather, or foliage. Motion recognition can trigger a retention of video or notify security personnel of the event.
Motion recognition (Cameras)
Some cameras are capable of object detection, which can include faces, devices, and weapons. Detection of an object or person could trigger retention of video, notification of security personnel, closing/locking doors, and/or sounding an alarm.
Object detection (Cameras)
a security camera system that resides inside an organization’s facility and is usually connected to monitors for the security guards to view as well as to a recording device. Most traditional CCTV systems have been replaced by remote controlled IP cameras.
Closed-circuit television (CCTV)
The attempt to mask or hide the actual function, purpose, or operations of a facility by providing a façade presenting a believable or convincing alternative.
Industrial camouflage
People can be used as protection components, and defenses against unauthorized personnel are needed as well.
PERSONNEL
These are able to adapt and react to various conditions or situations, learn and recognize attack and intrusion activities and patterns, adjust to a changing environment, and make decisions and judgment calls.
Guards (Personnel)
These can be used to automatically patrol an area to look for anything out of place. They often use facial recognition to identity authorized individuals as well as potentially identify intruders.
Robot sentries (Personnel)
This can be used as a choke point to block access to unauthorized visitors. This area should be segregated from the security areas with locked doors and monitored by security cameras. If a visitor is authorized, then an escort can be assigned to accompany them around the facility. If a valid worker arrives, the person staffing this area may be able to “buzz” the door open for them. Any unauthorized visitors can be asked to leave, security guards can be brought to bear, or police can be called.
Reception (Personnel)
A security procedure where any changes to an environment or system must be approved by two different people before the alteration is applied or committed. Any sensitive or risky activity requires two admins to agree to perform the task. This type of control can be useful in managing access to a backup or escrow of encryption keys/certificates as well as authorizing production deployment of updates or applications from development or a software library.
Two-person integrity/control (Personnel)
These can be controlled in such a way that only authorized people can unlock and/or enter through them.
These are used to keep doors and containers secured to protect assets.
LOCKS
Doors used to control entrance into secured areas can be protected by biometric locks. Only after the biometric is verified is the door unlocked and the person allowed entry. When biometrics are used to control entrance into secured areas, they serve as a mechanism of identity proofing as well as authentication.
Biometrics (Locks)
Many door access systems, whether supporting biometrics, smart cards, or even PINs, are designed around the electronic access control (EAC) concept (a.k.a. digital locks and crypto locks). An EAC system is a door-locking and door-access mechanism that uses an electromagnet to keep a door closed, a reader to accept access credentials, and a door-close spring and sensor to ensure that the door recloses within a reasonable timeframe.
Electronic (Locks)
Hardware or physical conventional locks are used to keep specific doors or other access portals closed and prevent entry or access to all but authorized individuals. With the risks of lock picking and bumping, locks resistant to such attacks must be used whenever valuable assets are to be protected from tampering or theft. Physical locks include conventional locks, deadbolts, dual-key locks, and padlocks.
Physical (Locks)
A cable lock is used to protect smaller devices and equipment by making them more difficult to steal. A cable lock usually isn’t an impenetrable security device, since most portable systems are constructed with thin metal and plastic. However, a thief will be reluctant to swipe a cable-locked device, because the damage caused by forcing the cable lock out of the K-Slot will be obvious when they attempt to pawn or sell the device.
Cable locks (Locks)