6.5 Physical Protection Flashcards
Locks
Prevent access to server rooms or sensitive data stored
Authorised personal with keys can enter
Biometrics
Require the input of a human characteristic (Voice scan, iris, fingerprint)
Biometric data checked against previously inputted data in a database
A match will allow access to the user
RFID & Tokens
Uses electromagnetic fields to attach tags or physical objects
Can be embedded within objects
Used with security tokens (ID Keycard) to permit access of authorised people to certain areas
Can be used by IT companies to track equipment and manage access
Backup
Should be taken regularly
Should be stored at a secure location far away from the main site
Backups can be stored in cloud servers so damage to the organisations building will not affect the backup as well
Shredding
Cutting up of documents into small pieces so they cannot be reassembled
Sensitive data on paper or Optical disc should be shredded when no longer required
Security staff
Security staff may be employed to physically prevent unauthorised people from accessing:
Certain areas of a building where sensitive information is stored