Time
1 hour 53 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:00
All right. Welcome back to this lecture and this lecture. We're gonna be talking about physical security controls and this should be a short one. So let's go ahead and dive right into it.
00:10
Security controls are Kim biological. They can be, you know, in the cloud they can be on your computer. They could be a firewall. They can even be a locking key or security guard themselves. They're basically anything out there that is preventing the bad guys from coming in. They're controlling
00:30
the security
00:31
of whatever you're trying to protect.
00:34
So when we're talking about physical security controls, one thing that comes to mind our door access controls doors obviously prevent the bad guys from entering rooms that may have secret information or protected people.
00:49
Ah, and you want to make sure that's only the right. People have access to set things.
00:54
So some of the physical security controls that can be put in place are things like a lock and a key, a deadbolts and electronic key lists or pin type, you know, access method,
01:07
token base. You can use an or if I d swipe card or badge or a key fob
01:14
you can use biometrics, and you can use multi factor authentication. So, like something, you know, it's something you have or something you are and something, you know, that kind of thing. So let's talk a little bit more about others, have security controls. Another thing that you can have our security guards or access list. So
01:34
when we talk about guards, we could talk about humans that act as guards to have weapons. They have canines.
01:40
They have cameras, all those types of
01:44
tools. The security guards would know that that would have, you would imagine they would have. They access.
01:52
They have access to the guests list, and they can validate who has access and who should be allowed in or are not allowed in. And they can validate those people. They usually
02:02
ah, have I D badges, and they will check to make sure that other users have I D badges. So they have a database. They can check your name, your I D. Number, your picture, things like that.
02:13
And like I said, they have the access list so they can see the physical list of names and, you know, they also have reinforcements to go and catch the bad guys that somebody's trying to break in and access something they shouldn't.
02:27
Biometrics is another thing that we talked about. It is kind of a unique thing. If you're not familiar with security controls, basically what it is is it's biologically checking the identification of a person. So if you see right here in this GIF image, you see this guy running up to a scanner
02:46
and he's checking all different tart on different parts of his body.
02:50
And what is doing is, uh, he saved his his information,
02:57
his body part information into a database and what it is. It's skins his foot and his hand
03:04
and turns that that image into a series of bits that are now affiliated with him. So whenever he goes back to the scanner, he can get through the door by re scanning his hand in his foot and this tongue and everything else here. This is obviously an exaggeration,
03:23
but this is also a very good example of what biometrics is. Some of the more realistic methods of biometrics would be a fingerprint. Retina scans your eye. Maybe your voice print things like that. They usually store the information about you through the data that's collected. The other algorithms see these algorithms or the
03:43
methods that is translating your biometric information and to bits or system information.
03:49
And it's not foolproof. I mean, it's very difficult for you to, ah, fool somebody else's fingerprint, right? You would probably have to do like a mission. Impossible thing where you're jelling the other footprints and then creating a fingerprint mold or something in order to fool
04:05
fool the biometric scanner. But I haven't heard of that actually happening. I don't know that that's actually really,
04:11
uh, you know it is in the movies, but that is a, uh, that this is biometrics and this is a physical security control
04:20
Cable Locks Act is another security control. Typically, these are used to secure devices, maybe to a desk or in a public place. You know, like you're ah ah computer store or some kind of technology store. Usually they have cable locks that are locking
04:39
the expense of hardware in place so that you can't just walk out the store with them. Sometimes you will need these in a corporate setting. I personally I've never seen it, so I don't think they're very popular But I'm sure with more public traffic in those workplaces, maybe like government buildings like a D M. V or something like that Cable locks maybe more applicable in those scenarios.
04:59
They are a temporary security control. As you can see you, you have the cable lock right there, and, um, you know, you can't cut it, but it would take a lot of effort. It is used to secure loose items. Most devices
05:14
Ah, usually they're portable devices would have to have some kind of area where you can insert the cable
05:19
into them in order to lock the device to whatever permanent object. Maybe like a desk, our table of some sort to to lock the device to that table
05:32
locking cabinets act as another security control. These are popular for server racks you want. You mean you want to make sure that certain users can't access the server. They can't stick a USB drive or pull our cables. Things like that. You can lock the cabinets to prevent users from doing so.
05:49
Locking cabinets are also used for locking. Multiple security
05:56
locking cabinets are also used for locking in multiple portable devices like laptops and stuff like that, especially in the school systems. I used to work in the school system.
06:04
Ah, and there would be locking cabinets to secure hundreds of chromebooks. And yes, these were large cabinets. They were very heavy. They were made of steel, had keys just like this one here in the picture.
06:19
And they had ah, charging racks built into them where you could charge ah, 100 chromebooks right within the rack overnight. And so they were very handy. Easy way to keep up with the device is making sure that no one stealing them
06:34
And, ah, you know, this is a physical security control that is very popular. And it may be something worth considering if you ever working in an organization or if you do work in an organization with lots of portable devices.
06:46
All right, that about wraps up this lecture on physical security controls. I'll see you guys in the next one

Up Next

CompTIA A+ 220-1002

In this course, you will learn the fundamentals of operating systems, security, software troubleshooting, and operating procedures. This course will prepare you to take and pass the CompTIA A+ 220-1002 exam.

Instructed By

Instructor Profile Image
Nicolas Moy
Senior Cloud Security Engineer
Instructor