security

= SECURITY  =

There are different types of security, they involve:

- Physical Security - Procedural Security - Electronic Security - Biometric Security

=- Physical Security -=

Physical security describes both measures that prevent or deter attackers from accessing a facility, resource, or information stored on physical media.

This includes the following:

- Security cables or cradles to bolt down or tie computers to furniture - Locks on computer cases so they can't be opened and hard disks removed - Glue up USB ports to prevent portable mass-storage devices being plugged in   - Removal of floppy disk drives & optical drives from file server to prevent the loading of hacking tools - UPS (uninterruptible power supply) - Simple cable ties to lock mouse cable to a computer to discourage theft

Also can include; Fences, locked doors, bars on windows, alarms, armed guards, guard dogs etc.

=﻿- Procedural Security -=

Procedural Security is a dministrative and management constraints to prevent unauthorized access to a system.

This includes the following:

- Not letting the public near computers - Never logging in with an outsider watching - Shredding all paper waste - Never give passwords over the phone or in email - Monitor email to detect suspiciously large data exports or sending of passwords - Mandate the use of corporate procedures for backups, file naming ect. - Staff hand in keys before going on holiday

=﻿- Electronic Security -=

Electronic Security includes the following:

- Usernames and passwords on computer start up, operation system, databases, office documents - Audit trails (electronic record of something that has happened) - Encryption (securing files through code, scrambled encrypted code, scrambling documents so it can’t be read.) - Biometric identification. (Unique human characteristics, e.g. finger prints, voice, iris)

Electronic security also includes swipe cards rather then keys.

= - Biometric Security - = Biometric Security is a security science where body or physical attributes are used for secure identification and authentication, fingerprints, voice patterns, face geometry, hand geometry, retinal scans, signatures, and typing patterns

Biometric Security can be more effective security rather then things like keys and passwords, as they only prove someone possesses the key/password, rather then them actually being entitled to use them. It is also more effective then keys or passwords as biometric security cannot be stolen, lost, forgotten or copied where as keys and passwords can be. Biometric ID ensures that a person requesting access is actually the person who was granted access.

Biometric security is most often used with the following:

- Fingerprints - Retinal scans (blood vessels at the back of the eye) - Iris scans (coloured part at the front of the eye) - Hand vein pattern.

These all are different on every person, this also includes identical twins, as no one has the same biometric features.

The least reliable biometric features are things such as:

- Face recognition as look-alikes can pass - Voice recognition as voices can be imitated