OCU C)OST B Discussion Lesson 09
Tagged: physical security
- This topic has 9 replies, 6 voices, and was last updated 7 months ago by
Latoya Stoudmire.
-
AuthorPosts
-
-
November 20, 2023 at 12:03 pm #91935
Manny Varela
KeymasterPlease suggest at least three different types of physical security hardware devices and why those particular devices would be relevant in business networks today.
-
September 14, 2024 at 12:10 am #98021
Erin Kesterson
ParticipantThree physical security hardware that would help businesses today. First would be security camaras as they can record everything around a business and keep the perimeters under surveillance. The next one I feel would be Security lighting this would alert the guards that there is a intruder on the premise’s. Lastly I would feel that having key cards to unlock the doors to allow only employees to enter the building would go hand and hand with the other things to help business keep the security tight and on cue with keep security 24/7.
-
September 18, 2024 at 6:15 pm #98082
Addison West
ParticipantHey Erin, I really enjoyed reading your discussion. It is great to be able to help businesses stay safe. Security cameras are a great way to keep an eye on things. Security lighting can deter criminals, and key cards are a good way to control access. These are all important steps to keeping businesses secure.
-
September 20, 2024 at 6:25 pm #98245
Jessica Belknap
ParticipantErin,
I appreciate your suggestion regarding the implementation of security lighting that can promptly notify the guards in the event of an intruder.
-
-
September 18, 2024 at 6:12 pm #98081
Addison West
ParticipantNetworks are vulnerable in many ways. One major vulnerability is phishing attacks, where cybercriminals deceive users into providing sensitive information through fake emails or websites. Another significant threat is malware, including viruses, worms, and ransomware, which can infiltrate networks, causing data theft, damage, or service disruptions. Additionally, unpatched software poses a risk, as outdated programs may have security flaws that attackers can exploit to gain unauthorized access.
To protect network infrastructure, several methods and controls can be implemented. Firstly, deploying firewalls and Intrusion Detection Systems (IDS) can help block unauthorized access and monitor network traffic for suspicious activity, providing alerts for potential threats. Secondly, regular software updates and patch management are crucial, as they ensure that known vulnerabilities are addressed, reducing the risk of exploitation. Lastly, conducting employee training and awareness programs can significantly enhance security. Educating employees on cybersecurity best practices, such as recognizing phishing attempts and using strong passwords, helps minimize the risk of human error leading to security breaches. Implementing these strategies can fortify network defenses and mitigate potential vulnerabilities.
-
September 20, 2024 at 12:31 pm #98087
Trae Johnson
ParticipantPhysical security can be said to be one very good way for business network protection due to its nature of preventing unauthorized access to equipment, data, and other critical infrastructure. Three major types of physical security hardware devices for business networks are: biometric access control systems, surveillance cameras, and security cages.
Biometric Controls of Access Systems: These are biometric devices that only allow access to the premises for people at whom access is granted; this may be fingerprint scanning, iris scanning, or face detection. Examples include server rooms that have fingerprint scans to prevent the entry of unauthorized individuals. These systems reduce the risk of stolen credentials-things that were commonly problematic with traditional password-based access control methods. Biometric technology provides a high level of security by authenticating unique physical attributes, which are not easily replicated.
Surveillance Cameras: CCTVs play a critical role in monitoring the physical space for recording and deterring potential intruders. Besides that, surveillance cameras allow an organization to monitor areas that need restriction either in real-time or study footage if there is some sort of security breach. They play a major role in identifying individuals and activities that may be compromising network infrastructure.
Physical Barriers: Security cages are enclosures that provide physical protection to critical network hardware such as servers, routers, and switches, from unauthorized access. It hinders direct access to sensitive equipment by preventing tampering, theft, or any form of accidental damage. This kind of hardware is important, especially for colocation facilities or businesses with shared server rooms.
References
Alavi, M., & Heidari, S. (2019). Surveillance cameras: Effectiveness in crime prevention and implications for policy. Journal of Security Studies, 12(3), 45-58. https://doi.org/10.1080/17467598.2019.1618921Kurtz, A. (2020). Best practices for securing business networks: The role of physical security. Information Security Journal, 15(2), 130-142. https://doi.org/10.1080/19393555.2020.1638542
Rouse, M. (2021). Biometric authentication: How it enhances security for physical and digital assets. Cybersecurity Today, 28(4), 56-62. https://doi.org/10.1007/s12394-021-00089-9
-
September 20, 2024 at 12:31 pm #98072
Trae Johnson
ParticipantDiscussion lesson 9:
Physical security can be said to be one very good way for business network protection due to its nature of preventing unauthorized access to equipment, data, and other critical infrastructure. Three major types of physical security hardware devices for business networks are: biometric access control systems, surveillance cameras, and security cages.
Biometric Controls of Access Systems: These are biometric devices that only allow access to the premises for people at whom access is granted; this may be fingerprint scanning, iris scanning, or face detection. Examples include server rooms that have fingerprint scans to prevent the entry of unauthorized individuals. These systems reduce the risk of stolen credentials-things that were commonly problematic with traditional password-based access control methods. Biometric technology provides a high level of security by authenticating unique physical attributes, which are not easily replicated.
Surveillance Cameras: CCTVs play a critical role in monitoring the physical space for recording and deterring potential intruders. Besides that, surveillance cameras allow an organization to monitor areas that need restriction either in real-time or study footage if there is some sort of security breach. They play a major role in identifying individuals and activities that may be compromising network infrastructure.
Physical Barriers: Security cages are enclosures that provide physical protection to critical network hardware such as servers, routers, and switches, from unauthorized access. It hinders direct access to sensitive equipment by preventing tampering, theft, or any form of accidental damage. This kind of hardware is important, especially for colocation facilities or businesses with shared server rooms.
References
Alavi, M., & Heidari, S. (2019). Surveillance cameras: Effectiveness in crime prevention and implications for policy. Journal of Security Studies, 12(3), 45-58. https://doi.org/10.1080/17467598.2019.1618921Kurtz, A. (2020). Best practices for securing business networks: The role of physical security. Information Security Journal, 15(2), 130-142. https://doi.org/10.1080/19393555.2020.1638542
Rouse, M. (2021). Biometric authentication: How it enhances security for physical and digital assets. Cybersecurity Today, 28(4), 56-62. https://doi.org/10.1007/s12394-021-00089-9
-
September 20, 2024 at 12:31 pm #98073
Trae Johnson
ParticipantPhysical security can be said to be one very good way for business network protection due to its nature of preventing unauthorized access to equipment, data, and other critical infrastructure. Three major types of physical security hardware devices for business networks are: biometric access control systems, surveillance cameras, and security cages.
Biometric Controls of Access Systems: These are biometric devices that only allow access to the premises for people at whom access is granted; this may be fingerprint scanning, iris scanning, or face detection. Examples include server rooms that have fingerprint scans to prevent the entry of unauthorized individuals. These systems reduce the risk of stolen credentials-things that were commonly problematic with traditional password-based access control methods. Biometric technology provides a high level of security by authenticating unique physical attributes, which are not easily replicated.
Surveillance Cameras: CCTVs play a critical role in monitoring the physical space for recording and deterring potential intruders. Besides that, surveillance cameras allow an organization to monitor areas that need restriction either in real-time or study footage if there is some sort of security breach. They play a major role in identifying individuals and activities that may be compromising network infrastructure.
Physical Barriers: Security cages are enclosures that provide physical protection to critical network hardware such as servers, routers, and switches, from unauthorized access. It hinders direct access to sensitive equipment by preventing tampering, theft, or any form of accidental damage. This kind of hardware is important, especially for colocation facilities or businesses with shared server rooms.
References
Alavi, M., & Heidari, S. (2019). Surveillance cameras: Effectiveness in crime prevention and implications for policy. Journal of Security Studies, 12(3), 45-58. https://doi.org/10.1080/17467598.2019.1618921Kurtz, A. (2020). Best practices for securing business networks: The role of physical security. Information Security Journal, 15(2), 130-142. https://doi.org/10.1080/19393555.2020.1638542
Rouse, M. (2021). Biometric authentication: How it enhances security for physical and digital assets. Cybersecurity Today, 28(4), 56-62. https://doi.org/10.1007/s12394-021-00089-9
-
September 20, 2024 at 6:22 pm #98244
Jessica Belknap
ParticipantPhysical security hardware encompasses three primary types of devices. The first type consists of locks and keys, where a key serves as a security token providing access to a secured area. The second type involves physical barriers such as fences, gates, or walls, which are installed to establish a secure perimeter and deter potential intruders. The third type encompasses video surveillance, which includes the use of closed-circuit television (CCTV) cameras and video recording equipment. These devices are utilized to monitor physical spaces in real time and also for post-incident review, providing an additional layer of security and surveillance.
-
September 25, 2024 at 10:30 am #98320
Latoya Stoudmire
ParticipantThree types of physical security hardware are intrusion detection, surveillance systems, and access control systems. All three hardware systems a highly effective and prevent the intrusion of unwanted persons. Each system serves a different purpose that ensures the physical protection of data.
There are five types of intrusion detection systems, a few are Network-based intrusion detection systems, Host-based intrusion detection system, and Protocol-based. (What Is an Intrusion Detection System?, n.d.) Network based intrusion detection monitors all traffic flowing from and to devices on the protected network. This is valuable today due to the advanced malware that hackers use.
In today’s society it is imperative for surveillance systems. Surveillance systems use to be used on more of a commercial basis but since the introduction of affordable home surveillance like the Ring camera surveillance systems have become accessible to majority of consumers, allowing to monitor camera activities from the phone or computer.
Access control systems are physical hardware that has become indispensable. Access control systems set specific restrictions for access to areas of company property. Three types of access control systems are role-based access control, attribute access control and discretionary access control. (Locksmiths, 2023) All three systems are used to protect sensitive areas by only allowing users with those credentials to access the area.
What is an Intrusion Detection System? (n.d.). Palo Alto Networks. https://www.paloaltonetworks.com/cyberpedia/what-is-an-intrusion-detection-system-ids
Locksmiths, F. (2023, February 27). What are the 3 types of access control? | Access control security. The Flying Locksmiths. https://flyinglocksmiths.com/blog/three-types-of-access-control/#:~:text=The%203%20types%20of%20access%20control%20are%20Role%2DBased%20Access,property%20and%20data%20is%20secure.
-
-
AuthorPosts
- You must be logged in to reply to this topic.