Free Study Guide for Network Plus 4.1

4.1 Summarize the purposes of physical security devices.

Welcome to Exam Notes by CertBlaster. Free Study Guide for Network Plus 4.1. This edition will cover physical security types and their purposes as outlined in objective 4.1 -“Summarize the purposes of physical security devices.” Enjoy!

Detection

When discussing physical security, let’s start with the methods used to detect unauthorized intrusion into protected areas and the devices they contain.

Motion detection is used to monitor for physical activity, often triggering an alarm or alerting security personnel. The sensitivity of the detector is calibrated in order to prevent false alarms. These detectors can trigger event monitoring, recording the date and time of the activity along with turning on the lights and enabling video recording.

Video surveillance, in the form of closed-circuit TV (CCTV), has greatly reduced the manpower needed to visually monitor protected areas. Strategically placed video cameras can cover areas that once required physical surveillance. The video cameras send their imaging to a central monitoring station, enabling security personnel to view and record activity throughout the entire coverage area(s). The video camera can connect to the central monitoring station using a coaxial cable or through the existing network.

Regardless of the connection method used, remember that these cameras can be motion activated or can remain on at all times. As a rule, all video should be recorded and saved.

Asset tracking tags are placed on all valuable assets owned by the company. This serves several purposes. The tag is linked to a database of assets and uses the object’s type, make, model, acquisition date, and current location. The tag is usually a barcode but can also be an RFID tag. These tags are used to identify the object for depreciation, routine maintenance, or security.

A common form of Tamper detection is a sticker which when broken, indicates the opening of a device enclosure. This is not the only tamper detection that may be encountered. More sophisticated tamper detectors are mounted inside the device and can trigger alarms, lights, and cameras.

Prevention

ID Badges are used to identify employees. Depending on the access model, the ID badge can also provide electronic information to allow access to restricted areas. Badge readers are also placed strategically around locked areas in order to permit access to authorized parties.

Biometrics uses a person’s unique physical characteristics to authenticate them. This could be as simple as a fingerprint or hand scan and as complex as a retinal scan. The scanned results are compared to the stored biometric data for authentication. While this method is more expensive to implement and maintain, it possesses a very high accuracy level.

Smart cards are electronic access badges that are used to unlock doors to authorized areas. These badges often contain a photograph of the user.

A Key fob is easily recognizable to anyone with remote locks on their vehicle. This device is used to allow access to secure areas. However, it is not as easy as pushing a button. The key fob and door are time-synchronized and use a random sequence in order to permit access.

All of the prevention methods listed above control locks. Access to a locked area can be as simple as a physical key or as complicated as a biometric lock. It is important to realize that multiple prevention methods can be combined, creating multi-factor authentication which will be described in the following posts.

Click here to go back to the Network+ 4.0 Table of Content

we hope you liked our free study guide for Network Plus 4.1. See you in 4.2!

screenshot of a Performance Based Question (PBQ) in the CertBlaster Network+ simulator
Example of Performance Based Question (PBQ) in the CertBlaster Network+ simulator

By continuing to browse this site, you accept the use of cookies and similar technologies that will allow the use of your data by CertBlaster in order to produce audience statistics- see our privacy policy.