Chapter 3 - Physical Access Controls - Part 2
Chapter 3 - Physical Access Controls - Part 2
CHAPTER 3 - PART 2
1
Chapter 3: Physical Access Controls - Part 2
❖ Electronic door lock - May plastic card key or ● Logging is typically done at the front
token reception desk and entrance to the computer
room.
● Before gaining access, visitors should also be
Security Token
required to provide verification of
● Physical device (e.g. smart card)
identification such as a driver’s license or
● With something that a user knows (e.g. PIN)
vendor identification tag.
● Allows authorized access to a computer or
network
f) Electronic logging
● A feature of electronic and biometric
Administrative process for card keys of
security systems
electronics locks that should be controlled
○ Dapat hindi na-eedit
includes:
○ Example: pag tap ng card, ATM
a) Issuing of the card keys
● All access can be logged, with unsuccessful
b) Accounting for the card keys
attempts being highlighted.
c) Retrieval of the card keys
RECITATION QUESTION:
d) Biometric door locks
● Activated by an individual’s unique body
Question 1A: Identify the picture:
features; for extremely sensitive facilities
○ Can be voice, retina, finger print,
hand geometry, or signature
■ Ex. GCash, Touch ID
○ This system is used in instances when
extremely sensitive facilities must be
protected, such as in the military.
e) Manual logging
● Requires visitors to sign a log; at the
front reception desk or entrance; requires
providing verification of identification
Answer: combination door lock
○ Lahat ay galing sa manual bago
naging high tech
Question 1B: An advantage of electronic door
○ Important sa computer room. Hindi
locks over bolting and combination locks is:
dapat laging pumapasok yung
Answer:
programmers sa computer room.
1) Card assignment to a specific individual
○ Visitor’s should provide their
2) Access restricted to individual’s unique
identification upon entering.
access needs
○ Paglog ng attendance sa computer -
3) Difficult to duplicate
generally, manual logging siya kasi
4) Easy deactivation of card entry upon
may human intervention kahit nag
employee termination or card stolen or
iinput sa computer. Automated yung
lost
portion ng date and time.
○ Electronic kapag yung computer yung
gumawa without human intervention. g) Identification badges (photo IDs)
● Should be worn and display by all
personnel; different color; sophisticated
Important information in the visitor’s log
photo IDs; control issuing, accounting
1) Name of the visitor
and retrieving badges
2) Company represented
● Visitor badges should be a different color
3) Reason for visiting
from employee badges for easy
4) Person to see
identification.
5) Date and time of entry and exit
● Sophisticated photo IDs can also be
used as electronic card keys.
2
Chapter 3: Physical Access Controls - Part 2
● Issuing, accounting for and retrieving ● Use two doors in entries to facilities such
the badges is an administrative process as computer rooms and high security
that must be carefully controlled. areas; reduces the risk of piggybacking;
use of a turnstile; may also be used for
h) Video cameras delivery and dispatch areas
● Including motion-activated models, should ● For the second door to operate, the first
be located at strategic points and entry door must close and lock, with only
monitored by guards; retain recording one person permitted in the holding area.
with sufficient resolution ○ Only use one door at a time
● The video surveillance recording should be ● This reduces the risk of piggybacking,
retained for possible future playback, and when an unauthorized person follows an
it should be recorded in sufficient authorized person through a secured entry.
resolution to permit enlarging the image to ● In some installations, this same effect is
identify an intruder. accomplished through the use of a full
● Balance control and costs. Mas malaki height turnstile.
yung cost kapag matagal i-reretain yung ○ Turnstile - Ex. yung nasa MRT or LRT
recording. ● Deadman doors may also be used for
delivery and dispatch areas where outer
i) Security guards doors open to admit a truck and the inner
● Very useful if supplemented by video doors cannot be opened to load or unload
cameras and locked doors; bond for until the outer doors are closed and
guards supplied by external agency locked.
● Guards supplied by an external agency
should be bonded to protect the l) Computer workstation locks
organization from loss. ● Secure the device to the desk to prevent
use; another feature is the use of a
turnkey or card key
Security guard agency bond
● Secure the device to the desk, prevent the
● Ensures the lawful and honest conduct of
computer from being turned on or
the security guard agency in providing
disengage keyboard recognition, thus
security services to its clients
preventing use.
● Also a financial assurance that protects
● Another available feature is locks that
clients from the dishonest acts of the
prevent turning on a PC workstation until a
security guard agency and its personnel
key lock is unlocked by a turnkey or card
key.
j) Controlled visitor access ● This is sometimes seen in the case of
● All visitors escorted by responsible high-security workstations, such as those
employee; bonded personnel that process payroll.
● Visitors include friends, maintenance
personnel, computer vendors, consultants
Turnkey system
(unless long-term, in which case special
● Customized for a particular application
guest access may be provided) and
● Idea: users can just turn the key and the
external auditors.
system is ready go
○ Maintenance - yung software galing sa
● Includes all the hardware and software
scratch, i-momodify mo siya at
necessary for a particular application
ichechange
● All service contract personnel, such as
cleaning people and offsite storage m) Controlled single-entry point
services, should be bonded personnel. ● Monitored by a receptionist
○ This does not improve physical ● Should be used by all incoming
security but limits the financial personnel; unnecessary or unused entry
exposure of the organization. points should be eliminated
● Multiple entry points increase the risk of
k) Deadman doors unauthorized entry.
● Also referred to as a mantrap or airlock
entrance
3
Chapter 3: Physical Access Controls - Part 2
4
Chapter 3: Physical Access Controls - Part 2
RECITATION QUESTION: