5.4 Physical Security p2
RFID - Radio-Frequency Identification
They are used in hospitals to track expensive equipment or even patients
It sends radio waves which travel and are detected by antennas they then send a signal back to the desired destination
Advantages:
RFID systems can scan multiple items simultaneously
It is very good at tracking
RFID tags can contain 2kb therefore allows stronger encoded identification.
Can be read very quickly.
Disadvantages:
An RFID reader can scan a tag as long as it is within the frequency range.
Interference can cause an issue and block the signal which is transmitted.
Unauthorised devices could read contents and even change it.
Tokens
A security token (sometimes called an authentication token) is a small hardware device that the owner carries to authorize access to a network service.Unlike a password, a security token is a physical object.
Advantages:
No need to carry an extra hardware or device.
Can be integrated to the user’s choice.
Secure as not only does the user require their username
and password they also need a token to perform certain tasks.
Even if someone knew your token it will be useless by the time they use it.
Disadvantages:
Requires some amount of user training.
Limited coverage and low security.
Privacy Screen
Privacy filters are polarized sheets of plastic that are placed over a computer screen to prevent screen visibility from any angle other than straight on.
When browsing the internet
Shredding
Private documents should be shredded ones that are confidential to the person
Unnecessary documents or old ones that is needed any longer
Advantages:
Efficient and gets rid of documents.
Time efficient
Ensures all confidential
information can’t fall into the wrong hands.
Disadvantages:
It can be expensive depending on the model.
Pieces of paper can get stuck.
Some criminals use the shredded paper and reassemble it.