Get Instahack License - A Massive instagram Bruteforce tool. Contact Us Buy Now!

What is Physical Security...

physical , phy , security , hacking , termux , target

 Mostly, people talk about hacking from the attacking point of view and deal with logical security. Still, physical security is also a matter of concern from both malicious hackers and penetration tester's point of view. Penetration testing against physical targets is also a common phase of testing.






Table of Contents
1. What is Physical Security?
2. Information Security vs. Physical Security
3. Objectives of Physical Security
4. Factors on Which Physical Security Vulnerabilities Depend
5. Attack Points to Compromise Physical Security
6. Layers of Physical Security
7. Crime Prevention Through Environmental Design (CPTED)
8. Risk Assessment
9. Countermeasures and Protection Techniques

What is Physical Security?

Physical security can be defined as the protection and concern regarding information-related assets storage devices, hard drives, computers, organization's machines, and laptops and servers. The protection is mainly taken care of real-world threats and crimes such as unauthorized access, natural disasters like fire and flood, a human-made disaster like theft, etc. And so this type of security requires physical controls such as locks, protective barriers, in-penetrable walls and doors, uninterrupted power supply, and or security personnel for protecting private and sensitive data that are stored in servers.

Information Security vs. Physical Security

Both the term has a conceptual difference. Information security generally deals with protecting information from unauthorized access, disclosure, illegal use, or modification of information, recording, copying, or destroying information. Information security is based on a logical domain, whereas physical security is based on the physical domain.

Objectives of Physical Security

  • Understand the needs of physical security.
  • Identify threats to information security that are connected to physical security.
  • Describe the key physical security considerations for selecting a facility site.
  • Identify physical security monitoring components.
  • Understand the importance of fire safety programs.
  • Describe the components of fire detection and response.

Factors on Which Physical Security Vulnerabilities Depend

Any hack may result in success, despite the security if the attacker gets access to the organization's building or data-center who is looking for a physical security vulnerability. In small companies and organizations, this problem may be less. But other factors on which physical security vulnerabilities depend may be as follows:

  1. How many workplaces, buildings, or sites in the organization?
  2. Size of the building of the organization?
  3. How many employees work in the organization?
  4. How many entry and exit points are there in a building?
  5. Placement of data centers and other confidential information.

Attack Points to Compromise Physical Security

Hackers think like real masterminds and find exploits in buildings for physical unauthorized access. From the attacker's point of view, the tactics to compromise physical security are:

  • Are the doors propped open? If so, that can be an attack vector.
  • Check whether the gap at the bottom of critical doors allows someone to uses any device to trip a sensor inside the security room.
  • Check whether it would be easy or not to open the door by breaking the lock forcefully.
  • Are any doors or windows made of glass, especially the doors of the server room or other confidential areas?
  • Are the door ceilings with tiles that can be pushed up?
  • Are power supply, and protection equipment is faulty?
  • Obtain network access by a hacker, and then hackers can send malicious emails as logged in users.

Layers of Physical Security

Physical security depends on the layer defense model like that of information security. Layers are implemented at the perimeter and moving toward an asset. These layers are:

  1. Deterring.
  2. Delaying.
  3. Detection.
  4. Assessment.
  5. Response.

Crime Prevention Through Environmental Design (CPTED)

It is a discipline that outlines how the proper design of a real scenario can mitigate crime and hacking by directly affecting human behavior. This concept was developed in the 1960s and is still used mainly to prevent from social engineering. It has three main strategies, namely:

  1. Natural Access Control.
  2. Natural Surveillance.
  3. Territorial reinforcement.

Risk Assessment

Both physical intruders and cybercriminals have the same motive as money, social agenda, etc. Also, intruders try to seek opportunities to exploit by any means. So these three terms - motive, opportunity, and means are listed together to make a formula whose calculation is  resulted in the total risk i.e.

Countermeasures and Protection Techniques

Physical security has the fact that security controls are often reactive. From a security point of view, other experts need to be involved during the design, assessment, and retrofitting stages. Other than that the security measures that must be taken are:

  1. Strong doors and locks.
  2. Lights and security cameras, especially around entry and exit points.
  3. Windowless walls around data centers'.
  4. Fences (with barbed wire or razor wire).
  5. Closed-circuit televisions (CCTVs) or IP based network cameras need to be used and monitored in real-time.
  6. Intrusion detection system must be applied to detect unauthorized entries and to alert a responsible entry.
  7. Know the different types of IDS systems, such as electromechanical and volumetric.
  8. Security personnel and guards must be used to protect data against physical theft or damage.
  9. The organization should serve a simple form of biometric access system (such as facial or fingerprint scanning access).
  10. Ties physical security with information access control such as ID card and name badge.
  11. Different types of lock systems must apply, such as manual locks, programmable locks (controlled by computers), electronic locks, biometric locks (facial scan and retina scans).
  12. Alarm and alarm systems should have to be installed in the building infrastructure to notify if an event occurs, such as fire detection, intrusion detection, theft, environmental disturbances, or interruption in services.




       Previous Chapter : Information gathering ❯              Next Chapter : System Hacking 







Getting Info...

Post a Comment

Thanks For Connecting Us
Cookie Consent
We serve cookies on this site to analyze traffic, remember your preferences, and optimize your experience.
Oops!
It seems there is something wrong with your internet connection. Please connect to the internet and start browsing again.
AdBlock Detected!
We have detected that you are using adblocking plugin in your browser.
The revenue we earn by the advertisements is used to manage this website, we request you to whitelist our website in your adblocking plugin.
Site is Blocked
Sorry! This site is not available in your country.