Time
7 hours 35 minutes
Difficulty
Intermediate
CEU/CPE
12

Video Transcription

00:01
Hey, guys. Welcome to another episode of the S S C P Exam Prep series.
00:06
I'm your host, Peter Simple.
00:08
This is the nine and the last lesson off the second of me.
00:13
Just a quick recap from everything we've seen in the second domain. So far, we've looked at the code of ethics, which is the required behavior for an S S C P. Practitioner.
00:21
We've looked at the C I A Triad, which is the most fundamental aspect of cybersecurity.
00:26
We've looked at security architectures and control.
00:30
We've talked about security plans and how they are detailed document specifying the security requirements of a system. And we've looked at building secure systems through secure development techniques and how secure development reduces the number of system vulnerability.
00:46
We've taken a good look at data, how to manage it, how to protect it and how to dispose of it when needed. And we've also looked at preventing the leakage of data throughout the network.
00:56
We've taken a book at different management techniques and how using the same process over and over can maintain system integrity.
01:04
We've looked at security awareness and training and how when employees are aware of security situations. It really helps everyone and makes an S S C P practitioners job a whole lot easier.
01:15
And finally, in this lesson will be looking at interior intrusion detection systems. These air specifically developed, designed to handle insider threats and different physical threats.
01:27
We'll also be looking at building security such as locks and doors, and we will be looking at fire suppression. How to control a fire inside in a data center or an organization.
01:41
Let's get started.
01:44
It is necessary to maintain different levels of secure even within the facility.
01:51
Not all employees need access to all areas of the facility, and that's why we have interior intrusion detection systems
02:00
entry warrior intrusion detection systems
02:02
prevent insider threats or people who want to hurt an organization from the inside out on it is necessary to have these simply to maintain the integrity of your organization.
02:17
Intrusion detection systems include a balanced magnetic switch,
02:23
motion activated cameras,
02:24
acoustic sensors,
02:27
infrared of linear beam sensors,
02:30
passive infrared sensors,
02:31
escort and visitor control.
02:35
Let's take a look at all of these in a little bit more detail.
02:38
Balanced magnetic switches.
02:40
This uses a magnetic field or a mechanical contact to determine if an alarm signal is initiated.
02:49
So with regular Magnetics, which is like the picture on the left, the two magnets are stuck together. And if that magnetic bond is broken, for whatever reason, alarm is triggered.
03:02
Now, this could be circumvented very easily by adding your own magnet in to one of the attachments.
03:12
Um, so then you can disable the other one, and since that magnetic connection is technically not broken than no alarm will sound,
03:23
this problem has been solved by a balanced magnetic switch, otherwise known as a B. M s.
03:30
This magnetic switch uses a reed switch, so
03:37
basically a read switch. When it's open, it maintains a magnetic field
03:44
where the switch is separate. But as soon as you add a magnetic field to just rub that magnetic field, the re switch comes together on when the reeds switch comes together and touches each other. That's when the alarm is initiated.
04:00
Motion activated cameras. This is very straightforward. It's basically just a camera with video motion features. So anytime picks up any type of movement or activity, B camera turns on, and it starts to record
04:18
acoustic sensors. This is a device that uses passive listening to monitor building spaces. This is specifically designed to detect people who might stay behind after a building closes for the night so they can move around with whatever they want to do
04:38
On infrared Elin, your beam sensors. A focused infrared light beam is projected and bounced off a reflector on either side of the detection area, so this is usually situated across the hallway or a passage. So anyone who
04:57
walks across will
04:59
break be either from the transmitter to the receiver, and once that beam is broken, then in a warm will be initiated.
05:08
Passive infrared sensors. This picks up on heat signatures to detect intruders so the sensor is set at whatever the normal temperature off that room is. And if it picks up any heat signature, or if it sees a increase off temperature
05:29
from what it normally sees,
05:30
then a warm will be initiated.
05:33
These are also used as an automatic request to exit device, so the door must be locked.
05:41
But as soon as this p i R sensor picks up ah, heat signature that's greater than what it's used to see. It will unlock the door automatically
05:53
tool technology sensors. That's just a term saying that two different kinds of sensors are used to reduce the possibility off false alarms and also visitor control. Consider for consideration. Factors for
06:10
visitor control are controlled waiting room, having a badge or past visible when you walk around or having like your I D in a very noticeable spot so people can tell that you are a part of the organization and you have been
06:25
registered with the organization, so they know you were there.
06:29
Another aspect of visitor control is just being escorted around the organization by an employee.
06:36
Building security.
06:38
Now that we have learned several different ways of detecting intruders, we must prevent them using physical security or security inside the building.
06:53
1st 1 LR locks, so there's two main types of locks. There are electric locks
06:59
and an electric strike, so an electric clock is your typical lot that you find in most doors. This is the one where the bolt comes out of the lock and into the door frame. You see this on just about all the home
07:15
home locks on your front door.
07:17
A electric strike is a type of lock that where the bolt does not move,
07:25
but rather there's a little part on the door frame that will open or close to allow the door to be open or shut.
07:33
So if you look at the picture on the right,
07:38
the part that moves is known as the lip or the keeper,
07:43
and once the lock is unlocked, then the wind the lip will move
07:48
and the door will open
07:53
magnetic locks. These are serviceman and magnets to hold the door closed. These are one of the best methods used
08:01
or having for applying security. Two doors that have already been built. They could just be last right onto the door, and they're very easy to install. A way to get around them is using a P I R sensor that we've looked at before. P I R Sensor detects state
08:20
You were coming. It will automatically
08:24
disengaged. The magnetic locks on the door can be opened or closed.
08:28
Another
08:30
concept of building security is known as the anti passed back, and this is a strategy where a person must
08:35
present a credential to enter and exit Ah facility. So the organization knows that you came in and they know that you came out, so they know that you didn't song are are hiding inside the organization or the building waiting for the building to close for the night
08:56
turnstiles and man traps. These are very popular building security practices that have been used turnstiles. You see them enduring almost any sporting arena for any sporting event or any major office building
09:11
alm and then man traps where
09:13
this prevents multiple people from going through the same door at the same time. So the way a man trap works, the first door opens. A person walks in, the first door must close before the second door opens up.
09:30
It's only when the first door closes that the second door opens and then the person can walk through.
09:35
This is to prevent multiple people from going through the same door
09:39
at the same time.
09:45
It's amore types of locks. A rim lock is a lock that is mounted on the service of the door again. This you see this on just about all front doors of all homes, and another type of lock is known as a more T's lock. This is a lot that is built into the edge of the door
10:03
with this lock. The lock is embedded into the door itself,
10:09
and then the bull will come out and come back in. But there's no actual lock that, like a room locked that comes out of the door.
10:20
Dater center security. There was a lot of physical security. Considerations include with data centers and
10:28
considerations include our utilities, H vac systems, air contamination, water issues, far detection and suppression.
10:37
The biggest one is fire suppression. There are several different types of fire suppression systems.
10:45
This is the wet system, which is a constant supply for which will not shut off until the water sources shuttles. So even if the fire has been put out unless the water source has been shut off, water will continue to pour out of the spring course.
11:01
Three words.
11:03
The next is the tri system. They do not have water in them, and the valve will not release until it is stimulated by access he so there is no water in the spring course above.
11:16
They are waiting for the heat valve to be triggered, and then water will come through the pipes and out of the sprinklers.
11:26
The next is the pre action system,
11:28
which incorporates a detection system. Water is held back until the detective detectors are activated. Once they are activated, the water comes pouring down.
11:39
The last type is the deluge system, which operates the same as the pre action system, except that the sprinkler heads are in the open position. So the sprinklers are open
11:52
and the water is waiting until a detector somewhere in the room has been activated. And at that point, the water will just pour out.
12:01
Order solutions are good for physical areas, but obviously not for computer equipment. We all know that water and computers
12:09
do not mix
12:11
addle. So for computer equipment,
12:15
there are gas fire suppression systems to the biggest ones are air OK, which is an air soul of microscopic potassium compounds,
12:24
and FM 200 which is a colorless slip. If I'd compressed gas, though it sits in a liquid form, and once a fire has been noticed, it comes down into a guess, which will then put out the fire.
12:43
In today's lecture, we discussed intrusion detection systems
12:48
on building security
12:50
quiz time.
12:52
All of these are examples of physical building security except a more T's clocks
13:00
be balanced magnetic switches
13:01
Stee man traps de magnetic locks
13:09
if you pick be than you were correct. Remember, balanced magnetic switches are considered to be an intrusion detection device rather than a piece of physical building security.
13:24
Thanks for watching guys. I really hope you learned a lot in this lesson and I'll see you next time.

Up Next

Systems Security Certified Professional (SSCP)

Obtaining your SSCP certification signifies that you possess the ability to tackle the operational demands and responsibilities of security practitioners, including authentication, security testing, intrusion detection/prevention, incident response and recovery, attacks and countermeasures, cryptography, malicious code countermeasures, and more.

Instructed By

Instructor Profile Image
Pete Cipolone
Cyber Security Analyst and Programmer
Instructor