2.1 - Physical Security

Physical Barriers for Security

  • Bollards and Barricades

    • Definition: Steel or concrete barriers designed to restrict vehicle access in specific areas.

    • Functionality:

    • Prevent large vehicles from entering pedestrian zones.

    • Channel pedestrian movement through designated points.

    • Enhance safety by separating vehicle routes from pedestrian areas.

    • Variants based on environment:

    • Large concrete round barriers.

    • Natural barriers like canals or moats in water-rich environments.

Access Control Mechanisms

  • Access Control Vestibules

    • Definition: Intermediate security zone between external environment and secure internal areas (e.g., data centers).

    • Types of vestibules:

    • Unlocked doors: When one door is opened, all others lock.

    • Locked doors: Only one door can be unlocked at a time; others remain locked until the first door is closed.

    • Bi-directional access: Two doors with one-way unlocking features.

    • Purpose: Track and manage individuals entering and exiting protected spaces.

    • Security Personnel: Typically a receptionist or guard, checking IDs and access credentials.

Electronic Access Control

  • Modern Access Systems

    • Shift from physical keys to electronic processes, utilizing access cards.

    • Card Technology:

    • Use of RFID (Radio-Frequency Identification) or NFC (Near Field Communication) for access.

    • Older systems may still use magnetic stripe readers.

    • Functions of access cards:

    • Gain entry to secure areas.

    • Log clock-in and clock-out times.

    • Facilitate security checks conducted by security personnel.

RFID and Access Card Construction

  • Internal View of Access Cards:

    • Typical structure includes:

    • An RFID chip located central within the card, attached to an antenna.

Video Monitoring and Surveillance Systems

  • CCTV (Closed Circuit Television)

    • Growing adoption in organizations for monitoring.

    • Functionality:

    • Allows remote observation of various facility locations without physical presence.

    • Advanced features include:

      • Identification of vehicles.

      • Reading license plates.

      • Motion detection using radio reflection or infrared technology.

    • Centralized Monitoring:

    • Video feeds are networked to a central station for broader oversight.

    • Alerts triggered by detected motion or door/window activity.

Alarm Systems and Alerts

  • Alert Mechanisms

    • Circuit-based alerts: Signals when doors or windows open/close, sending notifications to security personnel.

    • Motion detection sensors: Automatically notify when changes in the environment occur.

    • Duress buttons: Allow individuals to discreetly trigger alarms in unsafe situations.

Locking Mechanisms for Security

  • Types of Locks Used:

    • Conventional Lock and Key:

    • The most common for home security, often paired with a deadbolt for added protection.

    • Electronic Locks:

    • Require PIN input for access.

    • Token-based Locks:

    • Use RFID chips embedded in badges for entry.

    • Biometric Systems:

    • Utilize physical characteristics (fingerprints, retina scans) for access verification.

    • Multi-factor authentication may be implemented in high-security areas.

Security in Data Centers

  • Cabinet and Rack Security

    • Importance of locking cabinets and server racks to limit access to authorized personnel only.

    • Structural configuration:

    • Racks arranged side-by-side to minimize unauthorized access.

    • Access provided through locked front and back doors, maintaining airflow via perforated or vented doors.

Security Personnel Role

  • Role of Security Guards

    • Often stationed at reception or patrolling premises.

    • Responsibilities:

    • Verify identification and grant or deny access.

    • Ensure proper badge identification for employees, often worn on lanyards.

    • Visitor Management:

    • May require pre-registration for access approval, enhancing security measures with logs of visits.

Perimeter Security Measures

  • Fencing Types:

    • Purpose: Acts as a primary barrier to unauthorized access to buildings.

    • Material and Design:

    • Typically heavy metal, designed largely resistant to breaches.

    • Heightened fences to deter climbing, often topped with razor wire in high-risk scenarios.