Chapter 6 - 02 - Physical Security Controls PDF

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Summary

This document discusses various physical security controls, including Mantraps, Warning Signs, and Alarm/Sensor Systems. It explains the different types, how they work, and their applications in different security scenarios. Information on security zones and multilevel security systems are also mentioned.

Full Transcript

—erHHEd Lyobersecurity Techn ician Network Security Controls — Physi cal Controls Exam 212-82 Mantrap Itis a security system having an entry and exit door on opposite sides, separating non-secure area from secure area It allows only one door to be opened at a time, people enter the mantrap, request...

—erHHEd Lyobersecurity Techn ician Network Security Controls — Physi cal Controls Exam 212-82 Mantrap Itis a security system having an entry and exit door on opposite sides, separating non-secure area from secure area It allows only one door to be opened at a time, people enter the mantrap, request access and if gran ted they are permitted to exit. If access is not granted they are held inside until security personnel unlocks the mantrap Passing these doors is allowed only through access control mechanisms such as access cards, password, voice recognition, biometrics, etc. A mantrap is another trespassers. It is most type of physical access securi ty control that is used for catching widely used to Separate non -secure areas from secure areas and opens. User authentication at mantrap doors is performed using smart cards, keypad PINs biometric verification. It Operat , or es automa tically, is useful in authorizi ng visitors, reduces the manpower required for security systems, and guarantees the saf ety of the organization. Working of Mantraps ® * " * * Step 1:The mantrap authentic ates the person attempting access. Step 2: The first door opens afte r authentication. The person wal ks in. Step 3: The first door closes soo n after the person enters the room. Now, the person is locked inside the room. This sign als the unlocking of the second door. Step 4: The second door opens with the person walking out of the room. The first door is automatically locked soon afte r the second door opens. Step 5: The second door enters the locked state soon after the person walks out. Module 06 Page 646 Certified Cybersecurity Technici an Copyright © by EC-Council All Rights Reserved. Reproduction ic Strict Certified Cybersecurity Technician Network Security Controls - Physical Controls Exam 212-82 Warning Signs Warning signs are used @ to ensure someone does not inadvertently intrude in any restricted areas Appropriate warning 0 signs should be placed at each access control AUTHORIZED P E R S O point O N N N E L LY Copyright© by EC-Council All Rights Reserved. Reproduction Is Strictly Prohibited. Warning Signs Warning signs are generally used to restrict unauthorized access in an organization. Warning signs are placed at entrance points, boundaries of the locality, and sensitive areas. They should be visible to users such that people understand prohibited areas and avoid entering them. Warning signs also help organizations prevent a large number of people from entering sensitive areas. They are generally placed in all sensitive areas that have a threat of damage to assets or life or disclosure of information. For example, warning signs are typically placed on electrical fences because unknowingly touching the electric fence may pose a threat to life. Examples of warning signs are “RESTRICTED AREA,” “WARNING,” “CAUTION,” “DANGER,” and “BEWARE.” Module 06 Page 647 Certified Cybersecurity Technician Copyright © by EG-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Network Security Controls — Physical Controls Exam 212-82 Alarm/Sensor System v Proper alarm systems should be installed inside and 0/0 at the entrance to It can be turned on report intrusions, suspicious activity, and emergencies either automatically or manually by smoke detectors, heat detectors, security personnel, etc. @ = It should be audible to everyone in the building and set at intervals of 5 minutes such as the first alert, second alert and then the final alert to evacuate Alarm/Sensor System (Cont’d) Types of Alarm Systems & Passive Infrared Cixcuit-based Infrasound Proximity Detector Alarm Detector Detector Q Includes a sensor that detects changesin Q temperature at a Signals when a door/window/fen ce is opened, cut O Detects malicious intrusions by burglars or thieves by any person O Includes a sensor that detects low- small range of up to 40 ft with a objects within a specified frequency sound 135¢ field of vision physical range for microwave or displacement of off, or damaged given point in time O tefnperature and raises an alarm Itincludes sensor - like open or close O Detects the movement of an object/person/ animal within a infrared rays that can easily detect O Uses RFID tags and readers to detect the movement of equipment or objects moving objects Alarm/Sensor System Alarms are used to draw attention in case of a breach or an attempted breach. Alarm sounds can be of different types based on the facility; examples include sirens, flash lighting with a sound, emails, and/or voice alerts. The organization should divide large facilities such as buildings, floors, sections, and offices into small security zones; depending on their significance, the appropriate alarm system should be installed. Security zones that store high-priority data are given multilevel security systems such as access restriction with access control devices, Module 06 Page 648 Certified Cybersecurity Technician Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Network Security Controls - Physical Controls Exam 212-82 biometrics, surveillance, locks, and alarms to draw attention in an event of intrusion. Alarms can be turned on either automatically or manually by smoke detectors, heat detectors, security personnel, etc. They should be audible to everyone in the building and set with three alerts to evacuate in intervals of 5 min. Organizations should have a proper power backup for alarm systems so that they work in emergencies and during power shutdowns. All wiring and components of an alarm should be protected from tampering, and the alarm box should be concealed with proper locks and limited access. Proper management and regular assessments of the alarm system should be performed with emergency drills. An alarm system contains at least one sensor that detects and alerts of an intrusion. The alarms used for security purposes include the following components: an alarm control panel (ACP), sensors, an alerting system, a keypad, and wired or wireless interconnection components. The following are different types of alarms used for physical security. » with other Passive infrared detector/temperature detector: This type of alarm includes a sensor that detects changes in temperature at a given point of time. For example, if a person comes into the vicinity of the sensor, the temperature at that position changes from room temperature to the body temperature of that person. The sensor detects this fast change in temperature and raises an alarm. » (Circuit-based alarm: This type of alarm is used to signal when a door/window/fence is opened, cut off, or damaged by any person. It includes a sensor that detects circuit changes such as open or close. * Infrasound detector: This type of alarm is used to identify malicious intrusions by burglars or thieves. It includes a sensor that detects low-frequency sound vibrations below 20 Hz. When an intruder attempts to unlock a door or window using tools, the sensor identifies the low-frequency vibrations and raises an alarm. * Motion detector: This object/person/animal type of alarm is used to identify the movement of any within a small area of up to 40 ft with a 135° field of vision. It includes a sensor for microwave or infrared rays that can easily detect moving objects. = Proximity detector: This type of alarm is built using RFID tags and readers. They are used to detect the movement of objects within a specified physical range. These alarms are used to identify the displacement of equipment or objects. Module 06 Page 649 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited.

Use Quizgecko on...
Browser
Browser