Time
33 hours 23 minutes
Difficulty
Beginner
CEU/CPE
33

Video Transcription

00:00
Hello and welcome back to Siberia. 2019. Cop Tia Security Plus Certification Preparation course.
00:08
We'll continue our discussion of Marginal my three, which in fact ist obeying three and the topic of discussion will be architecture and design.
00:17
We have a brand new nothing objective, which is 3.9, where we have to explain the importance of physical security Controls
00:26
continue on this discussion.
00:29
Here again are the topics which encompasses 3.9, where we had to explain the importance of physical security controls. We begin by looking at lighting, talking about signs.
00:40
Events in all of these items here, in fact, enhance your overall visible security.
00:50
Let's not turn our attention toward a pre assessment quiz
00:53
now. What you need to do is determine whether or not the statement here is in fact a true statement or, in fact, a false statement,
01:00
and it reads as follows.
01:03
Basically, we're referencing what we call a proximity card in a specific thing that is not a contact lists device. What a smart card is put mirror the proximate card device to gain access to the door or building is a true or false statement.
01:19
If you said let the false. You're absolutely correct, because approximate card is a contact is device where smart card is put near the proximate car device to gain access to a door or a building.
01:34
One of the first thing we need to understand. Particularly when we look at this particular president, we have to think about I embalming controls such as your heating or ventilation. All these things are very, very important.
01:44
They again, these techniques used what we call hot and cold owls
01:49
beyond the importance of hardware, software and configuration. You should also be for me with the physical security controls,
01:55
visible school control deal with the security of your office and your data set of your employees as well as your physical assets.
02:01
One. Another thing that's very important, particularly think about our physical security is looking at lighting.
02:07
A new name and area so that could be viewed at the dog is obviously important thing that we need to form a security control procedure, particularly looking at physical security
02:16
signs. Also useful. Securing your facilities were like listed on this line here.
02:22
Personnel noticed personal use of company computer subject in termination.
02:27
Then we have offense and I gator cages fences you a tall, permanent structure to keep individual from maintaining again. Other words for maintaining our security.
02:38
We can also implore security guards. Obviously, they are very effective at safeguarding your particular facility.
02:45
Alarms is also ineffective physical security control that we should do. Remember we employ in a process called a layered approach in terms of security
02:53
and the purpose. That is, if someone able to circumvent one aspect about security
02:58
the next openly, the next layer. What happened? They get caught up in that next layer in terms of being caught. What the case may be,
03:05
we also have safe, safe. They're used to store the most valuable or irreplaceable objects.
03:10
We also implored Secure cabinets enclosures because they are useful again for lightly securing items that you perhaps items you don't want like that may have to walk away if they left unsecured.
03:24
We have protected disposition and protected cabling system. The cable conduit that is used to protect classified information being transmitted between two between to secure areas is very important as well.
03:38
We have a term called Air Gap is a physical seven taste of a computer or network from the Internet or another insecure type networks. And when I implore air gapped vault distribution now, I didn't get This is a physical segmentation. For example, you might have a sensitive server connected to a land
03:54
in Atlanta is not connected to your device or network that has access
03:59
to the in it.
04:00
We can also improve the technique of a man trap. Man Traps is designed to separate a non secure area, form a secure area. A matchup device monitors and controls two interlocking doors to investable.
04:15
Ah, fair decade isn't a closing that blocks electromagnetic fields
04:20
continue on without topic of explained and put in the physical security control. Let's take a look at some additional objects or topics, which encompasses this particular,
04:30
not an objective.
04:31
We're totally about lot types.
04:34
Biometrics
04:36
barricades or ballots,
04:40
tokens, cars as well.
04:42
Take a look at environment controls, its H back hot and cold hours and so forth
04:48
again. There are different types of locks that we can employ, so there's a deadlock are not block a dark block as well as a camera. And these are different things that we can implement from a physical security perspective, because there many different types off lots each with this screens as well as various weaknesses.
05:06
We can also implore biometrics
05:09
now. It means by which it what a person can be uniquely identified by evaluated one arm or distinguishing biological traits. We can do it through voice recognition or other words. Faso type recognition.
05:21
We can also implement barricades, a barricade Julie designed to block the passage of traffic.
05:29
We could also implored token causes were token, and cars are often small wallet size or smaller cars that employs used to gain access to buildings, parking garages and other type of facilities
05:42
In terms on Dominica chose provide typical Joe and by my own protection for your facilities is something else that we can employ.
05:48
An H Vac system hips without developing into service in the data center insurance that they don't overheat. We can also employed look at the layout in terms of Dennison over time, but the hot and cold, how that could be used to reduce the heat By managing the outflow. We can also make sure you have adequate fire suppression system,
06:05
which again this attempt to reduce the impact in the event that we should have
06:10
a far in our facility
06:13
continue on with the importance of physical screwed control going. Take a look at cable locks, screen filters, cameras, motion detectors, logs all way down to our key management. Obviously, employing cable locks are good for securing your individual assets, such as your computers, your laptops, your banks, your cameras on any other small equipment that perhaps the one
06:32
might really pick up.
06:34
We have screened filter. The screen foot is a monitor screen that overly that dramatically reduces the feel of feel off a mantra or screen. Basically, when you put it, put that screen on that computer monitor. It makes it difficult for people walking by or character looking over your soldiers is actually see the screen
06:54
cameras again are used to capture activity around your facility. You can gain the benefit of being able to replay the activity later. Potentially happen to track down responsible people and particularly if you have an incident was to occur.
07:05
We could also employed a technique motion detectives. You can sit there long when you leave the facility. Any motion detected there after it's considered malicious, and what happens is that alarm is actually activated.
07:18
Perhaps another important areas logs. Logs could be talked. All of your physical security solutions, such as your badge readers, your biometric readers of visitor logs that are used to manual insight in to a facility
07:30
we have. Also, infrared detection basically is a technique that reacts to infrared radiation. The two main types of detectives are thermal and platonic.
07:41
Other words. Photo detectors the thermal effects of the incident Incident Radiation can be followed through many temperature dependent on the type of phenomenal. So again we can utilize that type of technology really to secure our facilities, infrared detection
07:58
and that important areas. Key manages the process. Imagine all the keys with the physical security manager is the price of the mansion keys. Often we talking about physical keys
08:07
such as to the building or massacre. But Key man also extend to our digital keys as well.
08:13
At this point time, we have our post assessment question, and what we need to do is determine whether or not the statement here is actually a true statement or a false statement, and it reads, asked falls. Laws can be tired, toe all physical security solutions such as badge readers, biometric readers and visit a law used to manage the sign into a building.
08:33
Is that true or false
08:35
if you send it to you? Absolutely correct, because logs, in fact, can be tired. Toe all your fiscal security solutions, such as your badge readers, biometric readers, business laws used to manager Sign into your particular fit. Silly.
08:48
At this point time, we have some key takeaways from this particular
08:52
video. First, all illuminate an area so that it can be viewed at the dark is important from a security perspective. Signs also useful for securing your facilities as well.
09:03
All can be tired of all your physical security solution, as mentioned earlier, such as your badge readers, your biometric readers, visitor logs that are used mainly signed into your facility.
09:13
You can also set that long when you lead a facility. And so what happened is we have a motion detective type system in song. What happens if something mind moves in there after you shut the building down on security? Billy, what happens along will go off, and authority will be notified.
09:28
A screen foot is a martyr screen overly that dramatically reduced the feel of you off the mark or screen other words, it produces the like. If somebody is passing by being observed, what's on your screen?
09:39
Cameras to capture activity around your presented to gain the benefit of being able to replayed activity later, potentially happen to track down responsible people in an incident
09:52
eight back system where they do the hip to provide ability to service in a data center, ensuring that they don't overheat.
10:01
And our upcoming video will be taking a look at a brand new module, which is marginal before which in fact, is domain, for we're just tired of identity and access management.
10:13
They're learning objective. We take a look at. In the next video, we'll be title, compare and contrast, identity and access management concepts
10:22
again, I look forward to seeing you in a very next video.

Up Next

CompTIA Security+

Interested in the cybersecurity industry? The CompTIA Security+ is the gold standard for those looking to enter the cybersecurity industry. Join thousands of professionals who have gained this certification through this course and launched their careers in information security.

Instructed By

Instructor Profile Image
Jim Hollis
Independent Contractor
Instructor