The idea behind physical access security methods is to keep an unauthorized user from physically touching or gaining access to a computer system or network. Though we often spend a lot of time and focus on internally securing networked systems, many times there isn’t much thought put into externally protecting them. Just how secure is a system is that is physically accessible to each and every employee? Internal attacks, misuse, and sabotage are all too common in the workplace, making physical security a must have.
· Physical access logs/lists – Physical access logs and lists are used to show who had access to a certain piece of hardware at what time. They came in handy during auditing time as well as in the case that a security breach occurs; it’s helpful to know who could have been involved.
· Hardware locks – Hardware locks can be used to secure highly classified servers or computer systems as well as everyday systems that may hold confidential data. These pieces of hardware are locked and secured and can only be accessed if the proper key is used to unlock the lock.
· Physical access control (ID badges) – ID badges can be used in various methods. They can be used to enter a secure room, exit one, and various other ways.
· Man-trap – Often only used in highly secure locations. These traps require visual identification along with authentication in order for access to be granted. Man-traps only allow one or two users at a time to enter the secured location and is able to contain someone who is hostile or isn’t able to be authenticated from accessing any sort of information.
· Physical tokens – Simply, physical tokens are something that a user must have to access certain resources on the network. These tokens create a one-time use password to authenticate a user’s identity. SecurID is a prime example.
It is also important to be aware of door access systems. Note the different types (stand-alone and centrally managed) and be able to tell the difference between the two. Be aware of how these systems provide a sense of security. Video surveillance is also important for this section. The types of cameras used and how they are positioned is extremely important for quality physical security.
GetCertify4Less and GetCertified4Less