PHYSICAL PROTECTION Flashcards
locks
can be used to prevent access to server rooms or sensitive data stores. Only a personnel with the right key will have access.
Biometrics
biometric devices require the input of a human characteristic such as a fingerprint, iris
the biometric device is checked against previously inputted data in the database. a match will allow access to the user.
RFID AND TOKENS
radio frequency identification uses electromagnetic fields to attach tags to physical objects
RFID tags can be embedded with in objects such as clothing
RFID is used within security tokens such as ID keycards, to permit the access of authorized people to certain areas.
RFID can be used by IT companies to track equipment and manage access
Shredding
this is the cutting up of documents into small pieces so that they cannot be resembled and read. sensitive data on paper or optical disks should be shredded when no longer required.
backup
backups should be taken regularly and stored at a secure location away from the main site. Backups could be stored on cloud servers so that any damage to the organization’s building will not affect the building as well
security staff
staff maybe employed to physically prevent unauthorized people from accessing certain areas of a building where sensitive information is stored.
They may check ID keycards or use surveillance like CCTV to monitor who is entering and exiting a secure area.