Читать книгу The Official (ISC)2 SSCP CBK Reference - Mike Wills - Страница 111

Perimeter

Оглавление

At the outer boundary of the property, security controls can be implemented for access control.

 Fences/walls: While generally seen as deterrent or preventive controls, fences and walls can also be combined with additional mechanisms to offer detection capabilities.

 Cameras: Cameras serve a deterrent purpose but can be combined with monitoring capabilities (such as guards watching a video feed or motion sensors) for detection functions. Know that it's fairly easy for dedicated attackers to separate the cameras that are actually monitored from those that are “perimeter dressing” and most often ignored.

 Buried lines: While these serve no deterrent function, underground sensors can be used for intrusion detection within the border of a property.

 Access control points: Guard stations or gates can be staffed or equipped with additional mechanisms (card readers, cameras, turnstiles, etc.).

 Patrols: Guards (human or canine) can provide deterrent, detective, corrective, and recovery controls.

 Motion sensors: There are a variety of technologies that support the organization's ability to surveil the perimeter and any area outside facilities, including the cameras and buried lines, as well as microwave, laser, acoustic, and infrared systems.

 Lighting: Well-lit areas serve both deterrent and detective purposes. Continual maintenance of all lighting sources is crucial, as a burned-out or broken bulb can defeat any security benefit the light might provide.

The Official (ISC)2 SSCP CBK Reference

Подняться наверх