5.4 physical security Flashcards
locks
a lock can be used to prevent access to server rooms or sensitive data stores
only authorized personnel with the right key will have access
biometrics
require the most input of a human charecteristic such as fingerprint
RFID and tokens
radio frequency identification (RFID) uses electromagnetic fields to attach tags to physical objects
can be embedded within dub objects such as clothing or even animals]
is used with security tokens as an ID card to permit the access to authorized people to certain areas
can be used by IT companies to track equipment and manage access
privacy screens
these plastic screen are placed over monitor to obscure the screen to anyone expect the person sitting directly Infront of them
prevents shoulder surfing and prevents data from being read by unauthorized people nearby
shredding
cutting up of documents into small pieces that they cannot be reassembled and read, sensitive data on paper or optical disks should be shredded when no longer required