Mile2 Cybersecurity Certifications

Cybersecurity Certifications

OCU C)OST C Discussion Lesson 09

Viewing 7 reply threads
  • Author
    Posts
    • #66402
      Jessica Jagerson
      Keymaster

      Please suggest at least three different types of physical security hardware devices and why those particular devices would be relevant in business networks today.

    • #105643
      Carlos Martes
      Participant

      Firewall Appliance: Monitors and filters incoming and outgoing network traffic. It provides a first line of defense against unauthorized access and cyberattacks by blocking suspicious traffic at the network perimeter. Next we have is Network Access Control. Its purpose is to restrict unauthorized devices from connecting to the business network. They enforce security policies by ensuring only approved and secure devices gain access, reducing the risk of internal threats or even infected devices. Last is Surveillance Cameras or IP cameras. their purpose is to physically monitor network infrastructure like server rooms and data centers. It basically deters physical tampering or theft of networking equipment and provides video evidence in case of security incidents. At least with IP cameras, you are able to have real time remote monitoring allowing you to monitor business operations even offsite. If you want to go through the Mission impassible route, using security Alarms and motion sensors can be another way as well. They trigger alerts when unauthorized movement is detected near sensitive equipment. Hope this information helps!

    • #105664
      James Settle
      Participant

      So one device we utilize on the multifunction devices we service are RFID readers, so only those users who have passwords or readers can print to the specific network connected printer. This would be considered network access control. Also in a lot of the financial institutions we install them in or school systems, they are installed in secure locations or rooms with physical locks or rooms you need to badge into, which again utilize some type of RFID reader or key fob. Finally, most businesses, churches, schools, banks or corporations today utilize some sort of surveillance system, NVR, or network video recording system for monitoring secure areas and after hours activity. Others might include biometric authentication such as retina scanning, fingerprint reader, VPN gateways.

    • #105682
      Cameron Tackett
      Participant

      Physical security devices are great. Not only can they prevent network attacks, but real physical threats as well. Firstly, any sort of name badge or outside verification system is great. These mostly fall under the RFID. If I have to scan a name badge or card to get into an area. The odds of any unauthorized entrance is greatly reduced.

      The second instance of external security that I can think of would be any type of surveillance. Such as, CCTV and audio monitoring. For one it acts as a deterrent and in the event that their is a breach. Can be a great way to see who/what caused the breach.

      Thirdly, I would say are any sort of locking server rack or cabinet. This would make theft or any other sort of tampering with the device very limited even if it was able to be accessed by someone who shouldn’t

      • #105689
        Caleb Kiser
        Participant

        Hi Cameron,

        I’m completely on board with the idea that physical security plays a crucial role alongside digital protection. Badge systems like RFID add a solid layer of protection by limiting who can physically get in. Surveillance, like cameras or audio monitoring, helps deter threats and track incidents. And locking up server racks? Simple but super effective in preventing tampering or theft.

    • #105687
      Caleb Kiser
      Participant

      When we think about network security, it’s easy to focus only on the digital side of things, but physical security hardware plays a huge role too—especially in business environments where sensitive data and expensive equipment are involved. One key device is the surveillance camera system. These are essential not just for catching intruders but also for monitoring employee activity and protecting high-security areas. If something goes wrong, having video evidence can make a huge difference.

      Another important piece of hardware is a key card access system. Instead of using traditional keys, which can be easily copied or lost, these systems let businesses control who can enter specific areas and even log access times for accountability. Lastly, server cabinet locks are simple but extremely effective. They prevent unauthorized access to networking equipment and servers, which are often the core of a company’s operations.

      Together, these tools help make sure physical access is just as secure as digital.

      • #105720
        Isabelle Tubbs
        Participant

        Hello, Caleb! Great evaluation of some physical tools for the protection of businesses. I agree that studying this is an important aspect of security. Camera systems are a good way to send alerts of intruders and to also keep evidence of it. Key cards do have a disadvantage that they sometimes need to be fixed more often than traditional keys, but since they are not easy to copy, they do add more security.

      • #105744
        Misty Stewart
        Participant

        Your post emphasizes how important physical security hardware is for network security, which is often ignored in favor of digital measures. Surveillance camera systems are crucial for spotting intruders, keeping an eye on employees, and protecting high-security areas. Having video evidence can be very helpful if something goes wrong.
        Key card access systems are better than traditional keys because they let businesses control who can enter certain areas and keep track of when they do. Server cabinet locks are simple but very effective in stopping unauthorized access to important networking equipment and servers.

      • #105748
        Cameron Tackett
        Participant

        Caleb,

        Much like my post, you also pointed out that in the tech world. We often highlight mostly digital forms of protection. I recently saw a video (if it was real or not I do not know). However, it got me thinking. A man made a fake name badge and walked right into an office printing room posing as a repair man. He then took the internal drives of the office fax/printing machine, and thus took who knows how much sensitive data right out the door. Without anyone know the wiser. As I said, I am unsure if this is real or not or where it even came from. I still think it teaches a great lesson.

    • #105692
      Misty Stewart
      Participant

      Three types of physical security hardware are surveillance cameras, access control systems, and intrusion detection systems. Surveillance cameras monitor and record activities around business premises, helping to deter crime, provide evidence, and enhance security through real-time monitoring. Access control systems manage who can enter or exit specific areas using keycards, biometric scanners, or PIN codes, protecting sensitive areas and ensuring only authorized personnel can access restricted zones. Intrusion detection systems, including alarms and sensors, detect unauthorized entries or suspicious activities at doors, windows, and other entry points, alerting security personnel to potential breaches and ensuring the safety of employees and assets. These devices are important for businesses because they improve security, protect valuable assets, ensure employee safety, and maintain a secure working environment.

      • #105696
        James Settle
        Participant

        Great post Misty. Some physical security hardware such as surveillance cameras (IP cameras or NVR systems) have IDS features included such as motion detection for times outside business hours and alarms that trigger after prolonged time inside these areas. Not only do they deter criminals ,but they also allow the ability to track the movements of certain individuals or items throughout the building in the event something needs located or recalled. This can be viewed as a positive in many ways, but also a negative to some in terms of profiling.

    • #105719
      Isabelle Tubbs
      Participant

      Businesses today need physical security hardware devices to maintain security and safety of data and information. Three tools include intrusion detection systems, firewalls, and multi-factor authentication.
      An intrusion detection system (IDS) examines the traffic on the network and then sends out an alert if it finds any malicious activity or unauthorized access (GeeksforGeeks, 2025). This is an important system to install for businesses who need to know when any attacks or unauthorized accesses happen on the system. Likewise, having a physical detection system, like surveillance cameras and sensors, is beneficial for business locations (Avigilon, n.d.).
      However, to prevent attacks in the first place, firewalls are important tools for controlling the incoming and outgoing traffic. They are used to deny access to malicious users or software while also allowing known objects in. Although an intrusion detection system is helpful for alerting businesses of attacks, it is also good to have systems in place that prevent such things.
      Another method for security is the way authorized users are authenticated for access. Previously in this course, we learned how multi-factor authentication can be more secure for authenticating users. It can use information (like a password), or an object (like access to an email), etc. Using more than one method can help businesses be more secure because it requires more than just a password to get in to access important information. This can apply to logging in online or even for accessing a secure building (Avigilon, n.d.).
      References
      Avigilon. (n.d.). What is physical security? Controls, methods, and measures for commercial buildings. Retrieved May 2, 2025 from https://www.avigilon.com/blog/physical-security-guide#key-physical-security-measures
      GeeksforGeeks. (2025, April 28). Intrusion Detection System (IDS). https://www.geeksforgeeks.org/intrusion-detection-system-ids/

      • #105741
        Teisha Nolen
        Participant

        Hi Isabelle!
        Great job on your summary of hardware security devices! I shared in my post about the key card access to our building. Our employee IDs are our access, and the access levels are set by job and department. Employees will only have access to the areas needed to do their job. We use multi-factor authentication as well to keep our network secure with employees who work from home or other locations.

      • #105749
        Cameron Tackett
        Participant

        Isabelle,

        Just as Teisha said, many companies I have worked for in the past also used some sort of RFID tags. For example, only certain employees could access certain areas. For example, the warehouse held firearms for distribution to the stores. Thus only the people tasked with being in the cage. Were allowed into it. Along with other previsions such as CCTV and who knows how many other instances of protection that went with it. Since it was regularly inspected and audited by the ATF. So combining physical and digital security. They go hand in hand it is hard to simply have one or the other and believe your data/facility is safe.

    • #105740
      Teisha Nolen
      Participant

      When it comes to network and enterprise security, it is easy to focus on software attacks, but just as important are the physical components of our networks. For instance, in my company, all employees have access cards that must be scanned to enter the building. In addition, there are several secure areas that only certain employees can access. For example, the server room is protected by key card only access, and very few employees have permission to enter that room.
      Spiceworks defines hardware security as “The protection of physical devices from threats that would facilitate unauthorized access to enterprise systems” (Spiceworks, 2022). Things such as the key card access mentioned above, as well as cameras, can help keep hardware components safe. A hardware firewall can be installed to prevent unauthorized access to network components. A proxy server can act as a middleman, sending and receiving requests on a user’s behalf, allowing the IP address to stay hidden. All of these items are important to consider in business today.

      Spiceworks. (2022, January 4). What is hardware security? Definition, threats, and best practices. Spiceworks. 1

Viewing 7 reply threads
  • You must be logged in to reply to this topic.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Certifications

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.