5.4 Physical Security p2

RFID - Radio-Frequency Identification

They are used in hospitals to track expensive equipment or even patients
It sends radio waves which travel and are detected by antennas they then send a signal back to the desired destination

Advantages:

RFID systems can scan multiple items simultaneously

It is very good at tracking

RFID tags can contain 2kb therefore allows stronger encoded identification.

Can be read very quickly.

Disadvantages:

An RFID reader can scan a tag as long as it is within the frequency range.

Interference can cause an issue and block the signal which is transmitted.

Unauthorised devices could read contents and even change it.

Tokens

A security token (sometimes called an authentication token) is a small hardware device that the owner carries to authorize access to a network service.Unlike a password, a security token is a physical object.

Advantages:

No need to carry an extra hardware or device.

Can be integrated to the user’s choice.

Secure as not only does the user require their username
and password they also need a token to perform certain tasks.

Even if someone knew your token it will be useless by the time they use it.

Disadvantages:

Requires some amount of user training.

Limited coverage and low security.

Privacy Screen

Privacy filters are polarized sheets of plastic that are placed over a computer screen to prevent screen visibility from any angle other than straight on.

When browsing the internet

Shredding

Private documents should be shredded ones that are confidential to the person

Unnecessary documents or old ones that is needed any longer

Advantages:

Efficient and gets rid of documents.

Time efficient

Ensures all confidential
information can’t fall into the wrong hands.

Disadvantages:

It can be expensive depending on the model.

Pieces of paper can get stuck.

Some criminals use the shredded paper and reassemble it.