A plus 1002 Sub-objective 2.1

A plus 1002 Sub-objective 2.1 – Summarize the importance of physical security measures.

dti Publishing Corporation, a company registered in Delaware, has since 2001 helped more than 1 million IT professionals, students and career changers alike, to achieve certification through CertBlaster. Some of those people have brought back amazing stories of life changing turn-around. Some IT professionals have told us about that promotion they wanted finally coming through upon certification. Some long term unemployed career changers suddenly got back on their feet and so busy that their every minute was a scheduled event. Some students credit getting their first job in the field to succeeding at their certification. We have been doing this for a long time but never stop being amazed at what determined and courageous people can achieve when they set their minds to it. CertBlaster® exam simulations provide you with all you need when it’s time to start preparing for your certification exam.

Physical Security

The first area we will look at is physical security. Often marginalized or considered common knowledge, physical security is one of the primary defenses in the workplace. Enforcing locked entry points to secure areas is fundamental to overall security.

Mantrap

A mantrap, in simplest terms, is an area of controlled access between two secure areas. For example, consider a small room, with two doors, that is between two controlled access areas. The first door possesses a simple level of security allowing easy entrance into the space. The second door however has a higher level of security or different authentication method compared to the first door. Furthermore to prevent or at least minimize tailgating, the first door needs to be secured (closed) before the access mechanism(s) on the second door can be used.  The second more secure door may require multifactor authentication. Optimally, each mantrap would be monitored by a security guard.

Badge reader

Access is provided through security badges that contain coded data that identifies users to the security system. These badges include a current picture in order to satisfy personal security challenges. User data can be stored on a magnetic strip or NFC contactless storage. The card should also have the company logo and be tamperproof.

Smart cards

Smart cards are another way to deliver security tokens to the system. Smart cards may or may not be combined with badge technology. One thing that separates many Smart Cards from others is its ability to both send and receive data. This enables mutual authentication allowing each component to trust each other.

Door Locks

Locking doors seem like a simple task, but let’s look deeper and see what level of security can be achieved. First is the lock and key. This method to secure a single server by itself is unacceptable. Keys can be copied if left unattended. Locks can be picked granting unauthorized access. It is best to combine this method with others in order to create a secure area.

Biometric locks

Using a person’s unique personal attributes such as their Iris, Fingerprint, or Voice to authenticate is known as biometrics. Biometric security is quite tough to fool. When setting up biometric locks, a sample of the attribute to be tested is provided. This is then stored in a database for comparison to any future access attempts. Often, a fingerprint scanner and a keyboard are combined in order to provide multifactor authentication.

Hardware Tokens

Tokens are a security component necessary for devices to communicate and provide the holder of the token the appropriate access level. Tokens are passed across connections to a card reader, a magnetic swipe, or via wireless communication.

Cable locks

Cable locks are used to secure valuable items, such as laptops, that can easily be removed from the workplace. Combination or key locks are attached to a cable which is solidly secured to the laptop and the desk.

Server Locks

A server lock is used to prevent unauthorized users from opening the server case.

USB locks

USB locks prevent access to a device through the USB port. USB locks are small plastic plugs which are placed in the port(s). A USB drive can be used to access data or install malware. Consider any physical port a potential vulnerability.

Key fob

Key fobs are frequently used in contactless authentication. The key fob contains a security token that changes at predetermined intervals to synchronize with the master security system. This guarantees that the user has possession of the key fob. Possession of the key fob can be verified by entering the number displayed into the system.

Privacy screen

Privacy filters are employed by users who work in close proximity to others and require security from shoulder surfing. The screen filter narrows the monitor’s viewable angle to direct the output only to the desired user.

Entry control roster

An entry control roster is a list of people with valid credentials that is used by security personnel to log these parties. This covers 220-1002 objective 2.1! Keep pushing! Good luck on the test.

By continuing to browse this site, you accept the use of cookies and similar technologies that will allow the use of your data by CertBlaster in order to produce audience statistics- see our privacy policy.