Reply To: OCU C)OST B Discussion Lesson 09
Discussion lesson 9:
Physical security can be said to be one very good way for business network protection due to its nature of preventing unauthorized access to equipment, data, and other critical infrastructure. Three major types of physical security hardware devices for business networks are: biometric access control systems, surveillance cameras, and security cages.
Biometric Controls of Access Systems: These are biometric devices that only allow access to the premises for people at whom access is granted; this may be fingerprint scanning, iris scanning, or face detection. Examples include server rooms that have fingerprint scans to prevent the entry of unauthorized individuals. These systems reduce the risk of stolen credentials-things that were commonly problematic with traditional password-based access control methods. Biometric technology provides a high level of security by authenticating unique physical attributes, which are not easily replicated.
Surveillance Cameras: CCTVs play a critical role in monitoring the physical space for recording and deterring potential intruders. Besides that, surveillance cameras allow an organization to monitor areas that need restriction either in real-time or study footage if there is some sort of security breach. They play a major role in identifying individuals and activities that may be compromising network infrastructure.
Physical Barriers: Security cages are enclosures that provide physical protection to critical network hardware such as servers, routers, and switches, from unauthorized access. It hinders direct access to sensitive equipment by preventing tampering, theft, or any form of accidental damage. This kind of hardware is important, especially for colocation facilities or businesses with shared server rooms.
References
Alavi, M., & Heidari, S. (2019). Surveillance cameras: Effectiveness in crime prevention and implications for policy. Journal of Security Studies, 12(3), 45-58. https://doi.org/10.1080/17467598.2019.1618921
Kurtz, A. (2020). Best practices for securing business networks: The role of physical security. Information Security Journal, 15(2), 130-142. https://doi.org/10.1080/19393555.2020.1638542
Rouse, M. (2021). Biometric authentication: How it enhances security for physical and digital assets. Cybersecurity Today, 28(4), 56-62. https://doi.org/10.1007/s12394-021-00089-9