Please enable JavaScript.
Coggle requires JavaScript to display documents.
5.4 Physical security (advantages and disadvantages (These are very secure…
5.4 Physical security
-
-
-
Locks should be used on all doors at all times to ensure maximum security and give them regular checks based on the level of confidentiality on the information that is inside.
This will be able to protect anything inside. But they can be broken if the right equipment/tools are used.
An authentication token is a small hardware device that the owner carries to authorize access to a network service. The device may be in the form of a smart card or may be embedded in a commonly used object such as a key fob.
Fingerprint - This is where they have a reader that scans the finger of some one, and checks a database to ensure they have access to this information and/or area.
Iris - This is where they have a reader that scans the iris of someone, and checks it against a database to ensure that they are allowed access to this information and/or area.
Retina - This is where they have a scanner that reads the retina of a person,
and checks a database to ensure they have access to this information.
Voice - This is where they have a recorded sample of your voice on a database and you have to talk into a microphone to then have it run by the sample to see if you are allowed access.
they are secure as there is only one copy of you and every part of you is unique. It would be very difficult to replicate any biometric system to trick your way into the system hence the secure nature of this type of security. They would have to make a copy of your eye to break into a retina reading lock and it’s obvious how difficult it is to break into that.
These would be used by workers in a school to gain access to the facility through staff entrances on the sides of the grounds. This could be done on a business complex to allow access for the right people over others.