2.1 - Physical Security
Physical Barriers for Security
Bollards and Barricades
Definition: Steel or concrete barriers designed to restrict vehicle access in specific areas.
Functionality:
Prevent large vehicles from entering pedestrian zones.
Channel pedestrian movement through designated points.
Enhance safety by separating vehicle routes from pedestrian areas.
Variants based on environment:
Large concrete round barriers.
Natural barriers like canals or moats in water-rich environments.
Access Control Mechanisms
Access Control Vestibules
Definition: Intermediate security zone between external environment and secure internal areas (e.g., data centers).
Types of vestibules:
Unlocked doors: When one door is opened, all others lock.
Locked doors: Only one door can be unlocked at a time; others remain locked until the first door is closed.
Bi-directional access: Two doors with one-way unlocking features.
Purpose: Track and manage individuals entering and exiting protected spaces.
Security Personnel: Typically a receptionist or guard, checking IDs and access credentials.
Electronic Access Control
Modern Access Systems
Shift from physical keys to electronic processes, utilizing access cards.
Card Technology:
Use of RFID (Radio-Frequency Identification) or NFC (Near Field Communication) for access.
Older systems may still use magnetic stripe readers.
Functions of access cards:
Gain entry to secure areas.
Log clock-in and clock-out times.
Facilitate security checks conducted by security personnel.
RFID and Access Card Construction
Internal View of Access Cards:
Typical structure includes:
An RFID chip located central within the card, attached to an antenna.
Video Monitoring and Surveillance Systems
CCTV (Closed Circuit Television)
Growing adoption in organizations for monitoring.
Functionality:
Allows remote observation of various facility locations without physical presence.
Advanced features include:
Identification of vehicles.
Reading license plates.
Motion detection using radio reflection or infrared technology.
Centralized Monitoring:
Video feeds are networked to a central station for broader oversight.
Alerts triggered by detected motion or door/window activity.
Alarm Systems and Alerts
Alert Mechanisms
Circuit-based alerts: Signals when doors or windows open/close, sending notifications to security personnel.
Motion detection sensors: Automatically notify when changes in the environment occur.
Duress buttons: Allow individuals to discreetly trigger alarms in unsafe situations.
Locking Mechanisms for Security
Types of Locks Used:
Conventional Lock and Key:
The most common for home security, often paired with a deadbolt for added protection.
Electronic Locks:
Require PIN input for access.
Token-based Locks:
Use RFID chips embedded in badges for entry.
Biometric Systems:
Utilize physical characteristics (fingerprints, retina scans) for access verification.
Multi-factor authentication may be implemented in high-security areas.
Security in Data Centers
Cabinet and Rack Security
Importance of locking cabinets and server racks to limit access to authorized personnel only.
Structural configuration:
Racks arranged side-by-side to minimize unauthorized access.
Access provided through locked front and back doors, maintaining airflow via perforated or vented doors.
Security Personnel Role
Role of Security Guards
Often stationed at reception or patrolling premises.
Responsibilities:
Verify identification and grant or deny access.
Ensure proper badge identification for employees, often worn on lanyards.
Visitor Management:
May require pre-registration for access approval, enhancing security measures with logs of visits.
Perimeter Security Measures
Fencing Types:
Purpose: Acts as a primary barrier to unauthorized access to buildings.
Material and Design:
Typically heavy metal, designed largely resistant to breaches.
Heightened fences to deter climbing, often topped with razor wire in high-risk scenarios.