Overview of Physical Security Measures

Aug 9, 2024

Lecture Notes: Physical Security and Surveillance Systems

Introduction

  • Video Surveillance: Common in organizations for facility security.
    • Known as CCTV (Closed Circuit Television).
    • Advantages over human guards: larger area coverage, longer time periods.
    • Features: object detection, motion detection, passive infrared (view in the dark).
    • Networked setup: multiple cameras linked to a central Network Video Recorder (NVR).

Asset Tracking

  • Tags for Devices: Used for routers, switches, fiber modules, etc.
    • Integrated with financial systems for tracking purchases, installations, and depreciation.
    • Tags may include a barcode, number, and organization name for easy identification.

Hardware Tampering Sensors

  • Tampering Detection: Alerts for case removal.
    • Found in personal computers, firewalls, routers, switches, and other network devices.
    • Can be combined with asset tags for enhanced security.

Employee Training

  • Importance of Training: Employees as a key security element.
    • Training to identify security issues.
    • Utilization of posters, signs, login messages, and intranet for ongoing education.
    • Continuous training procedures are essential.

Access Control Hardware

  • Types of Access Control: Gates, locks, cameras, etc.
    • Integrated systems: badge in to access elevators, video surveillance.
    • Central management console for access configurations.
    • Authentication Methods:
      • Electronic systems: keyless entry, personal identification numbers (PIN).
      • Biometric systems: fingerprints, retina scans, voice prints.
    • Advantages of Biometrics: Consistent over time, difficult to fake, no need for periodic changes.

Access Control Vestibules

  • Highly Secure Areas: Data centers with controlled entry.
    • One-person or multi-person rooms with sequential door locks.
    • Prevents tailgating, ensures controlled access.
    • Examples: PIN and biometric readers.

Smart Lockers

  • Package Security: Used for secure deliveries.
    • Online orders delivered to lockers with secure access via PIN.
    • Prevents package theft.

Data Disposal

  • Secure Disposal: Prevent unauthorized data access.
    • Legal mandates for data retention.
    • Options: physical destruction or data sanitization.
    • Factory reset for devices: deletes personal info, logs, encryption keys.
    • Data wiping for hard drives and SSDs: ensures no data recovery.