obj 2 Flashcards
access control vestibule
all doors normally unlocked
all doors normally locked
one door open / other locked
one at a time, controlled groups
badge reader
magnetic swipe, RFID, or NFC
different applications
video surveillance
CCTV
camera features are important
often many different cameras
motion detection
alarm systems
circuit based
motion detection
door locks
conventional
deadbolt
electronic
token-based
biometric
multi-factor
equipment locks
data center hardware is usually managed by different groups
racks can be installed together
enclosed cabinets with locks
guards and access lists
physical security guards
ID badges
access list
barricades/bollards
prevent access
channel people through a specific access point
identity safety concerns
can be used to an extreme
fences
build a perimeter
transparent or opaque
robust
prevent climbing
key fobs
small RFID key
replaces a physical key
smart cards
certificate-based authentication
integrated card reader
external reader
biometrics
biometric authentication
difficult to change
used in very specific situations
keys
some doors may not have an electronic lock
use a key cabinet
biometric factors
retina scanner
fingerprint scanner
palmprint scanner
magnetometers
passive scanning (metal detectors)
not useful for non-metal objects
lighting
more light means more security
consider overall light levels
Mobile device management (MDM)
manage company-owned and user-owned mobile devices
centralized management of the mobile devices
set policies on apps, data, camera, etc.
least privilege
rights and permissions should be set to the bare minimum
all user accounts must be limited
don’t allow users to run with admin privileges
access control lists (ACLs)
used to allow or deny traffic
ACLs evaluate on certain criteria
deny or permit
also used in operating system
multi-factor authentication
more than one factor (something you are, have, know,)
can be expensive
software tokens
authenticator application
saves money
short message service (SMS)
text messaging
login factor can be sent via SMS to a predefined phone number
security issues exist
video call
a phone call provides the token
similar disadvantages to SMS (intercepted, number can be added to another phone)
email filtering
unsolicited email
scan and block malicious software