Structure that encloses an area using interconnected panels or posts
Fence
Provides a visual deterrent by defining a boundary that should not be violated by unauthorized personnel
1
Purposes of fencing
Establishes a physical barrier against unauthorized entry
Purposes of fencing 2
Delays intruders, which helps provide security personnel with longer window of time to react
Purposes of Fencing 3
Robust, short vertical posts, made of steel or concrete, that are designed to manage or redirect vehicular traffic
Bollards
Involves manipulating security devices to create new vulnerabilities that can be exploited
Tampering with security devices
Involves the direct confrontation or attack of security personnel
Confronting Security Personnel
Brute force attack that uses a car, truck, or other motorized vehicle to ram into the organization’s physical security barrier
Ramming a Barrier with a Vehicle
Maintain the security and safety of facilities, including business, home, or commonly used public areas
Surveillance Systems
Flexible and adaptable form of surveillance that organizations use
Security Guards
Proper lighting is crucial for conducting effective surveillance using both voice and security gurads
Lighting
Devices that detect and respond to external changes in the environment and convert the information into readable signals or data
Sensors
Activate when a specified minimum amount of weight is detected on the sensor that is embedded into the floor or a mat
Pressure Sensor
Blocking the camera’s line of sight (paint on camera, etc)
Visual obstruction
Overwhelming the sensor or camera with a sudden burst of light to render it ineffective for a limited period of time
Blind the sensor or camera
Jamming or playing loud music to disrupt the microphone’s functionality
Accoustic Interference
Jamming the signals that surveillance systems rely on to monitor the environment
EMI
Exploring the environment around the surveillance equipment to compromise its functionality
Physical Environment Attack
Double-door system that is designed with 2 doors that are electronically controlled to ensure that only one door can be opened at a given time
Access Control Vestibules
Person with legitimate access intentionally allows another person without authorization to enter a secure area with them
Piggyback
Physical security control that is designed to secure entryways by restricting and regulating access to a particular space or property
Door Locks
The rate that the system authenticates a user as valid, even though that person should not have been granted access to the system
False Acceptance Rate (FAR)
Occurrs any time the biometrics system denies a user who should have been allowed access to the system
False Rejection Rate (FRR)
More commonly called Crossover Error Rate (CER), which uses a measure of the effectiveness of a given biometric system to achieve a balance
Equal Error Rate (EER)