Mile2 Cybersecurity Certifications

Cybersecurity Certifications

Reply To: OCU C)OST B Discussion Lesson 08

#98319
Latoya Stoudmire
Participant

Three types of physical security hardware are intrusion detection, surveillance systems, and access control systems. All three hardware systems a highly effective and prevent the intrusion of unwanted persons. Each system serves a different purpose that ensures the physical protection of data.

There are five types of intrusion detection systems, a few are Network-based intrusion detection systems, Host-based intrusion detection system, and Protocol-based. (What Is an Intrusion Detection System?, n.d.) Network based intrusion detection monitors all traffic flowing from and to devices on the protected network. This is valuable today due to the advanced malware that hackers use.

In today’s society it is imperative for surveillance systems. Surveillance systems use to be used on more of a commercial basis but since the introduction of affordable home surveillance like the Ring camera surveillance systems have become accessible to majority of consumers, allowing to monitor camera activities from the phone or computer.

Access control systems are physical hardware that has become indispensable. Access control systems set specific restrictions for access to areas of company property. Three types of access control systems are role-based access control, attribute access control and discretionary access control. (Locksmiths, 2023) All three systems are used to protect sensitive areas by only allowing users with those credentials to access the area.

What is an Intrusion Detection System? (n.d.). Palo Alto Networks. https://www.paloaltonetworks.com/cyberpedia/what-is-an-intrusion-detection-system-ids

Locksmiths, F. (2023, February 27). What are the 3 types of access control? | Access control security. The Flying Locksmiths. https://flyinglocksmiths.com/blog/three-types-of-access-control/#:~:text=The%203%20types%20of%20access%20control%20are%20Role%2DBased%20Access,property%20and%20data%20is%20secure.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Certifications

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.