Physical security Flashcards
1.2 2.4
Physical security
Measures to protect tangible assets (building, equipment, people) from harm or unauthorized access
Define two physical security controls
Fencing and Bollards
Bollards - Short, Sturdy vertical posts controlling or preventing vehicle access
What is an Access Control Vestibules
Double- door system electronically controlled to allow only one door open at a time
Prevents piggybacking and tailgating
Access badges
Use of Radio Frequency Identification (RFID) OR Near Field Communications NFC for access
Surveillance is often comprised of four main categories
Video Surveillance
Remote Access
Provides real time visual feedback
A wired solution security camera is physically cabled from the device back to the central monitoring station
What is a Pan-Tilt-Zoom system
Can move the camera or its angle to better detect issues during an intrusion
Give me the four categories of sensors
Infrared sensors - Detect changes in infrared radiation that is often emitted by warm bodies like humans or animals
Pressured Sensors - Activated whenever a specified minimum amount of weight is detected on the sensor that is embedded into the floor or a mat
Microwave Sensors - Detect Movement in an area by emitting microwave pulses and measuring their reflection off moving objects
Ultrasonic Sensors- Measures the reflection of ultrasonic waves off moving objects
Ways to bypass surveillance systems
Visual Obstruction like blocking the cameras, spraying point, placing a sticker, positions objects,
Blinding senors
Interfering with Acoustics-
Electromagnetic Interference EMI - Involves jamming the signals that surveillance system relies on to monitor the environment
Access badge cloning
Radio Frequency Identification and Near field Communications are popular technologies used for contactless authentication in various applications
Copying the data from an RFID OR NFC card or badge onto another card of device
Gimme some Access control Vestibules
Access Control Vestibules
Double door system that is designed with two doors that are eletrconically controlled to ensure that only one door can be open at a give time.
Piggybacking - Go behind someone you trust
Tailgating- follow someone in without them knowin
GIVE me the steps to that an attacker clone an access badge
- Scanning - Scanning or reading the targeted individuals access badge
- Data Extraction - Attackers extract the relevant authentications credentials from the card, such as a unique identifier or a set of encrypted data
- Writing to a new card or device
Attacker will then transfer the extracted data onto a blank RFID or NFC card or another compatible device - Using the cloned access badge
Attackers gain unauthorized access to builidng, computer systems, or even make payments using a cloned NFC enabled credit card