Mile2 Cybersecurity Certifications

Cybersecurity Certifications

OCU C)OST B Discussion Lesson 09

Viewing 7 reply threads
  • Author
    Posts
    • #91935
      Manny Varela
      Keymaster

      Please suggest at least three different types of physical security hardware devices and why those particular devices would be relevant in business networks today.

    • #98021
      Erin Kesterson
      Participant

      Three physical security hardware that would help businesses today. First would be security camaras as they can record everything around a business and keep the perimeters under surveillance. The next one I feel would be Security lighting this would alert the guards that there is a intruder on the premise’s. Lastly I would feel that having key cards to unlock the doors to allow only employees to enter the building would go hand and hand with the other things to help business keep the security tight and on cue with keep security 24/7.

      • #98082
        Addison West
        Participant

        Hey Erin, I really enjoyed reading your discussion. It is great to be able to help businesses stay safe. Security cameras are a great way to keep an eye on things. Security lighting can deter criminals, and key cards are a good way to control access. These are all important steps to keeping businesses secure.

      • #98245
        Jessica Belknap
        Participant

        Erin,

        I appreciate your suggestion regarding the implementation of security lighting that can promptly notify the guards in the event of an intruder.

    • #98081
      Addison West
      Participant

      Networks are vulnerable in many ways. One major vulnerability is phishing attacks, where cybercriminals deceive users into providing sensitive information through fake emails or websites. Another significant threat is malware, including viruses, worms, and ransomware, which can infiltrate networks, causing data theft, damage, or service disruptions. Additionally, unpatched software poses a risk, as outdated programs may have security flaws that attackers can exploit to gain unauthorized access.

      To protect network infrastructure, several methods and controls can be implemented. Firstly, deploying firewalls and Intrusion Detection Systems (IDS) can help block unauthorized access and monitor network traffic for suspicious activity, providing alerts for potential threats. Secondly, regular software updates and patch management are crucial, as they ensure that known vulnerabilities are addressed, reducing the risk of exploitation. Lastly, conducting employee training and awareness programs can significantly enhance security. Educating employees on cybersecurity best practices, such as recognizing phishing attempts and using strong passwords, helps minimize the risk of human error leading to security breaches. Implementing these strategies can fortify network defenses and mitigate potential vulnerabilities.

    • #98087
      Trae Johnson
      Participant

      Physical security can be said to be one very good way for business network protection due to its nature of preventing unauthorized access to equipment, data, and other critical infrastructure. Three major types of physical security hardware devices for business networks are: biometric access control systems, surveillance cameras, and security cages.

      Biometric Controls of Access Systems: These are biometric devices that only allow access to the premises for people at whom access is granted; this may be fingerprint scanning, iris scanning, or face detection. Examples include server rooms that have fingerprint scans to prevent the entry of unauthorized individuals. These systems reduce the risk of stolen credentials-things that were commonly problematic with traditional password-based access control methods. Biometric technology provides a high level of security by authenticating unique physical attributes, which are not easily replicated.

      Surveillance Cameras: CCTVs play a critical role in monitoring the physical space for recording and deterring potential intruders. Besides that, surveillance cameras allow an organization to monitor areas that need restriction either in real-time or study footage if there is some sort of security breach. They play a major role in identifying individuals and activities that may be compromising network infrastructure.

      Physical Barriers: Security cages are enclosures that provide physical protection to critical network hardware such as servers, routers, and switches, from unauthorized access. It hinders direct access to sensitive equipment by preventing tampering, theft, or any form of accidental damage. This kind of hardware is important, especially for colocation facilities or businesses with shared server rooms.

      References
      Alavi, M., & Heidari, S. (2019). Surveillance cameras: Effectiveness in crime prevention and implications for policy. Journal of Security Studies, 12(3), 45-58. https://doi.org/10.1080/17467598.2019.1618921

      Kurtz, A. (2020). Best practices for securing business networks: The role of physical security. Information Security Journal, 15(2), 130-142. https://doi.org/10.1080/19393555.2020.1638542

      Rouse, M. (2021). Biometric authentication: How it enhances security for physical and digital assets. Cybersecurity Today, 28(4), 56-62. https://doi.org/10.1007/s12394-021-00089-9

    • #98072
      Trae Johnson
      Participant

      Discussion lesson 9:

      Physical security can be said to be one very good way for business network protection due to its nature of preventing unauthorized access to equipment, data, and other critical infrastructure. Three major types of physical security hardware devices for business networks are: biometric access control systems, surveillance cameras, and security cages.

      Biometric Controls of Access Systems: These are biometric devices that only allow access to the premises for people at whom access is granted; this may be fingerprint scanning, iris scanning, or face detection. Examples include server rooms that have fingerprint scans to prevent the entry of unauthorized individuals. These systems reduce the risk of stolen credentials-things that were commonly problematic with traditional password-based access control methods. Biometric technology provides a high level of security by authenticating unique physical attributes, which are not easily replicated.

      Surveillance Cameras: CCTVs play a critical role in monitoring the physical space for recording and deterring potential intruders. Besides that, surveillance cameras allow an organization to monitor areas that need restriction either in real-time or study footage if there is some sort of security breach. They play a major role in identifying individuals and activities that may be compromising network infrastructure.

      Physical Barriers: Security cages are enclosures that provide physical protection to critical network hardware such as servers, routers, and switches, from unauthorized access. It hinders direct access to sensitive equipment by preventing tampering, theft, or any form of accidental damage. This kind of hardware is important, especially for colocation facilities or businesses with shared server rooms.

      References
      Alavi, M., & Heidari, S. (2019). Surveillance cameras: Effectiveness in crime prevention and implications for policy. Journal of Security Studies, 12(3), 45-58. https://doi.org/10.1080/17467598.2019.1618921

      Kurtz, A. (2020). Best practices for securing business networks: The role of physical security. Information Security Journal, 15(2), 130-142. https://doi.org/10.1080/19393555.2020.1638542

      Rouse, M. (2021). Biometric authentication: How it enhances security for physical and digital assets. Cybersecurity Today, 28(4), 56-62. https://doi.org/10.1007/s12394-021-00089-9

    • #98073
      Trae Johnson
      Participant

      Physical security can be said to be one very good way for business network protection due to its nature of preventing unauthorized access to equipment, data, and other critical infrastructure. Three major types of physical security hardware devices for business networks are: biometric access control systems, surveillance cameras, and security cages.

      Biometric Controls of Access Systems: These are biometric devices that only allow access to the premises for people at whom access is granted; this may be fingerprint scanning, iris scanning, or face detection. Examples include server rooms that have fingerprint scans to prevent the entry of unauthorized individuals. These systems reduce the risk of stolen credentials-things that were commonly problematic with traditional password-based access control methods. Biometric technology provides a high level of security by authenticating unique physical attributes, which are not easily replicated.

      Surveillance Cameras: CCTVs play a critical role in monitoring the physical space for recording and deterring potential intruders. Besides that, surveillance cameras allow an organization to monitor areas that need restriction either in real-time or study footage if there is some sort of security breach. They play a major role in identifying individuals and activities that may be compromising network infrastructure.

      Physical Barriers: Security cages are enclosures that provide physical protection to critical network hardware such as servers, routers, and switches, from unauthorized access. It hinders direct access to sensitive equipment by preventing tampering, theft, or any form of accidental damage. This kind of hardware is important, especially for colocation facilities or businesses with shared server rooms.

      References
      Alavi, M., & Heidari, S. (2019). Surveillance cameras: Effectiveness in crime prevention and implications for policy. Journal of Security Studies, 12(3), 45-58. https://doi.org/10.1080/17467598.2019.1618921

      Kurtz, A. (2020). Best practices for securing business networks: The role of physical security. Information Security Journal, 15(2), 130-142. https://doi.org/10.1080/19393555.2020.1638542

      Rouse, M. (2021). Biometric authentication: How it enhances security for physical and digital assets. Cybersecurity Today, 28(4), 56-62. https://doi.org/10.1007/s12394-021-00089-9

    • #98244
      Jessica Belknap
      Participant

      Physical security hardware encompasses three primary types of devices. The first type consists of locks and keys, where a key serves as a security token providing access to a secured area. The second type involves physical barriers such as fences, gates, or walls, which are installed to establish a secure perimeter and deter potential intruders. The third type encompasses video surveillance, which includes the use of closed-circuit television (CCTV) cameras and video recording equipment. These devices are utilized to monitor physical spaces in real time and also for post-incident review, providing an additional layer of security and surveillance.

    • #98320
      Latoya Stoudmire
      Participant

      Three types of physical security hardware are intrusion detection, surveillance systems, and access control systems. All three hardware systems a highly effective and prevent the intrusion of unwanted persons. Each system serves a different purpose that ensures the physical protection of data.

      There are five types of intrusion detection systems, a few are Network-based intrusion detection systems, Host-based intrusion detection system, and Protocol-based. (What Is an Intrusion Detection System?, n.d.) Network based intrusion detection monitors all traffic flowing from and to devices on the protected network. This is valuable today due to the advanced malware that hackers use.

      In today’s society it is imperative for surveillance systems. Surveillance systems use to be used on more of a commercial basis but since the introduction of affordable home surveillance like the Ring camera surveillance systems have become accessible to majority of consumers, allowing to monitor camera activities from the phone or computer.

      Access control systems are physical hardware that has become indispensable. Access control systems set specific restrictions for access to areas of company property. Three types of access control systems are role-based access control, attribute access control and discretionary access control. (Locksmiths, 2023) All three systems are used to protect sensitive areas by only allowing users with those credentials to access the area.

      What is an Intrusion Detection System? (n.d.). Palo Alto Networks. https://www.paloaltonetworks.com/cyberpedia/what-is-an-intrusion-detection-system-ids

      Locksmiths, F. (2023, February 27). What are the 3 types of access control? | Access control security. The Flying Locksmiths. https://flyinglocksmiths.com/blog/three-types-of-access-control/#:~:text=The%203%20types%20of%20access%20control%20are%20Role%2DBased%20Access,property%20and%20data%20is%20secure.

Viewing 7 reply threads
  • You must be logged in to reply to this topic.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Certifications

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.