Coconote
AI notes
AI voice & video notes
Export note
Try for free
Overview of Physical Security Measures
Aug 9, 2024
Lecture Notes: Physical Security and Surveillance Systems
Introduction
Video Surveillance
: Common in organizations for facility security.
Known as CCTV (Closed Circuit Television).
Advantages over human guards: larger area coverage, longer time periods.
Features: object detection, motion detection, passive infrared (view in the dark).
Networked setup: multiple cameras linked to a central Network Video Recorder (NVR).
Asset Tracking
Tags for Devices
: Used for routers, switches, fiber modules, etc.
Integrated with financial systems for tracking purchases, installations, and depreciation.
Tags may include a barcode, number, and organization name for easy identification.
Hardware Tampering Sensors
Tampering Detection
: Alerts for case removal.
Found in personal computers, firewalls, routers, switches, and other network devices.
Can be combined with asset tags for enhanced security.
Employee Training
Importance of Training
: Employees as a key security element.
Training to identify security issues.
Utilization of posters, signs, login messages, and intranet for ongoing education.
Continuous training procedures are essential.
Access Control Hardware
Types of Access Control
: Gates, locks, cameras, etc.
Integrated systems: badge in to access elevators, video surveillance.
Central management console for access configurations.
Authentication Methods
:
Electronic systems: keyless entry, personal identification numbers (PIN).
Biometric systems: fingerprints, retina scans, voice prints.
Advantages of Biometrics
: Consistent over time, difficult to fake, no need for periodic changes.
Access Control Vestibules
Highly Secure Areas
: Data centers with controlled entry.
One-person or multi-person rooms with sequential door locks.
Prevents tailgating, ensures controlled access.
Examples: PIN and biometric readers.
Smart Lockers
Package Security
: Used for secure deliveries.
Online orders delivered to lockers with secure access via PIN.
Prevents package theft.
Data Disposal
Secure Disposal
: Prevent unauthorized data access.
Legal mandates for data retention.
Options: physical destruction or data sanitization.
Factory reset for devices: deletes personal info, logs, encryption keys.
Data wiping for hard drives and SSDs: ensures no data recovery.
📄
Full transcript