4.1 Summarize the purposes of physical security devices. Flashcards
Video surveillance
CCTV (Closed circuit television)
Can replace physical guards
Motion detection - Can provide notification of activity
Camera properties
Focal length - Shorter is wider angle
Depth of field - How much is in focus
Illumination requirements - See in the dark
Networked together and recorded over time
Asset tracking tags
Barcode, RFID, visible tracking number
A record of every asset Routers, switches, cables, fiber modules, CSU/DSUs, etc.
Financial records, audits, depreciation
Make/model, configuration, purchase date, location, etc.
Tamper detection
Hardware tampering
Foil asset tags
Hardware tampering
Case sensors, identify case removal
Alarm sent from BIOS
Firewalls, routers, etc.
Foil asset tags
Identify the tampering
Identification badges
ID badge - Picture, name, other details, Must be worn at all times
May be integrated with door access or a smart card
Standardized format
Biometrics
Biometric authentication -Fingerprint, iris, voiceprint
Usually stores a mathematical representation
Difficult to change
Used in very specific situations - not foolproof
Tokens and cards
Smart card -Integrates with devices with pin
USB token - Certificate is on the USB device
Hardware or software tokens / key fobs - Generates pseudo-random authentication codes
Door access controls
Conventional - Lock and key
Token-based
Electronic
Multi-factor
Deadbolt
Physical bolt
Electronic
Keyless
Token-based
Magnetic swipe card or proximity reader
Multi-factor
Smart card and PIN