Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

IT BTEC Level 3 - Unit 7 - P2

Organisational Systems Security: physical security measures
by

Marco Tranchino

on 7 May 2015

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of IT BTEC Level 3 - Unit 7 - P2

Lock and Key
Sign in / Sign out systems

Visitor Passes
Unit 7 - Organisational Systems Security
P2 - Describe how physical security measures can help keep systems secure
Biometrics
Fingerprint Scan
The Retina is the rear of the eye and its configuration is unique (like fingerprints)

While fingerprints can change if the skin is damaged, the retina stays the same from birth

A Retina Scan takes only about 2 seconds

Glasses or contact lenses must be removed
Retina Scan
Fingerprint recognition has been used for over 100 years in crime detection

Some scanners use a rapid laser to detect the ridges in our fingers

Other scanners use electro-statically sensitive pads which detect the current formed by the small quantities of water in our fingerprint

For additional security (for example to enter the United States) fingerprint scans are used together with the passport and using fingerprints from more than one finger.
Other biometric technologies
New or improved biometric technologies are continuously being developed and deployed


Voice recognition
is useful for speech to text applications but not very much as a security measure.... Because voice can be recorded and played back!

Facial recognition
is being improved and applied to live CCTV footage
Cable Shielding

When essential systems are held in rooms and buildings which are secured under lock and key

Many of these systems work with a master/sub-master system: i.e. there are keys for individual doors, for groups of doors (for example for the all the ICT rooms) and for all the doors in the building

Normal key-cutters cannot reproduce this kind of keys

Usually companies keep a register of keys and who has them

Digital keypads are cheaper but... the code can be given.. so LESS SECURE!

Lock and key security works well ONLY IF the environment is secure. (For example if there are windows that can be used to get in...)
Visitor passes are useful for both staff and visitors identification (colour coding can provide additional information)

Easy to challenge someone who doesn't have a pass

To increase security, sometimes passes are used in conjunction with codes to be entered in digital keypads.
This is a variation of the lock and key system used in conjunction with staff and visitors identification systems

The system works with people using SWIPE CARDS or DONGLES as keys

The system logs sign in and sign out times automatically (time keeping and attendance)

Each key can be programmed to give access to some areas and not other areas

Records can be kept of who went where

If an employee leaves a company and doesn't return the key, it can be disabled

If an employee should have access to additional areas, the key can be re-programmed

Usually these keys or swipe cards only contain an ID. It is the system to have a DB of IDs and to retrieve the permission level for each ID.

If a key is lost or stolen and not disabled in time... a breach of security can happen...

Data transmitted through copper cables could be read by others by detecting the variation of the magnetic field emitted by the cable when the data is being transmitted

Shielding these copper cables can protect them from external magnetic interference but also improve the security, preventing third parties from "reading" the data by detecting the magnetic field emitted by the cable


Fiber optic cables are much more secure and cannot be read in the same way
Like the retina, another unique feature of our eyes is the
iris

Unlike the retina scan, the iris scan can be operated even if the person wears glasses or contact lenses (except if the lenses are coloured...)
Iris Scan
Implementation of technology to use BIOLOGICAL INFORMATION about ourselves as a method of unique identification.

From the ancient Greek "bios", meaning life, and "metron", meaning measure.
Full transcript