You are on page 1of 22

WHAT IS PHYSICAL

SECURITY?

Physical Security is the


protection of personnel,
hardware, software, networks
and data from physical
actions and events that could
cause serious loss or damage
3 MAIN COMPONENTS OF PHYSICAL
SECURITY

1.ACCESS
CONTROL

2.SURVEILLANCE

3.TESTING
ACCESS
CONTROL
To limit and control what people
have access to sites, facilities and
materials. Access control
encompasses the measures taken to
limit exposure of certain assets to
SURVEILLANCE
This is one of the most important
physical security components for
both prevention and post-incident
recovery. Surveillance refers to the
technology, personnel and
resources that organizations use to
monitor the activity of different
TESTING
Physical penetration testing is a simulated intrusion attempt that
is designed to identify weaknesses in your business’ physical
security. This is different from our other types of testing as the
target is not a cyber one, instead, it is your physical location.

Successful and partially successful attempts to break into your


premises will highlight vulnerabilities in your physical security
which could be exploited by criminals. This is important
information which is key to improving your security.
1. Protect the computer from climate
condition as well as from intruders, theft ,
crime, and unauthorized personnel and
attacks who use or attempt to use physical
access to the computer to break into it.

2. Implementing a physical security policy for


surveillance throughout the premises help
organizations track and monitor the
productivity and security of employees

3. In special cases like crime, anything that


has been recorded in the CCTV can be
EXAMPLES OF
PHYSICAL SECURITY
LOG AND TRAIL
MAINTENANCE
Keeping a record of what is accessed and what people attempt to
access is reliable way to not only discourage unauthorized users,
but create a forensic-friendly data
RISK-BASE APPROACH
One of the most effective ways to optimize a physical security
investment is to use a risk-based approach. This is a data analysis
technique used to evaluate scenarios based on one’s risk profile.

ACCOUNTABLE ACCESS
CONTROL
By tying access control to individuals, an organization can
improve its visibility over personnel activity.
MOBILE SECURITY
WHAT IS MOBILE
SECURITY?

Is the protection of smart phones,


tablets, laptops and other
portable computing devices, and
the networks they connect to,
from threats and vulnerabilities
associated with wireless
computing.
A lack of mobile security can
lead to compromised employee,
business or customer data. If an
employee leaves a tablet or smart
phone in a taxi or at a restaurant,
for example ,sensitive data such
as customer information or
corporate intellectual property
IT pros should keep an eye out for these mobile
threats.
MALWARE ATTACK is a common cyber attack
where malware (normally malicious software)
executes unauthorized actions on the victim's
system. The malicious software (a.k.a. virus)
encompasses many specific types of attacks
such as ransom ware, spyware, command and
control, and more.

PHISHING is the practice of trying to trick


people into giving secret financial information
by sending emails that look as if they come
from a bank. The details are then used to steal
people's money, or to steal their identity in
order to commit crimes
LOST OR STOLEN DEVICES

CROSS-APP DATA SHARING

UNPATCHED OSes.- OUTDATED SYSTEM


HOW DOES MOBILE
SECURITY WORK?
Device security. From a device configuration standpoint, many organizations
put policies into place requiring devices to be locked with a password or to
require biometric authentication Organizations also use mobile device security
software that allows them to deploy matches to devices, audit the OS levels that
are used on devices and remote wipe a device

End-user practices. Some end-user mobile security best practices might


include avoiding public Wi-Fi or connecting to corporate resources through a
virtual private network (VPN). IT staff can also educate users on mobile threats
such as malicious software and seemingly legitimate apps that are designed to
steal data.
BENEFITS OF MOBILE
SECURITY

1. Preventing sensitive data from being leaked or stolen.

2. Diligently adhering to security best practices, an


organization may be able to prevent ransom ware attacks
that target mobile devices.

3. Help to ensure regulatory compliance.


What is the example of mobile
protection?

At a very basic level, even a password, fingerprint sensor or


facial recognition software is a type of security feature for
mobile devices because it protects others from gaining access to
your content
HOW TO SECURE MOBILE
DEVICE
1. USE STRONG PASSWORD OR BIOMETRICS - Strong passwords coupled
with biometric features, such as fingerprint authenticators, make unauthorized access
nearly impossible. Your passwords should be eight or more characters long and
contain alphanumeric characters. If your mobile device allows two-factor
authentication, don’t hesitate to use it. You don’t want to be subject to unforeseen
attacks.

2. ENSURE PUBLIC OR FREE WIFI IS PRORECTED- That’s because most of


the free Wi-Fi points are not encrypted. These open networks allow malicious people
to eavesdrop on the network traffic and easily get your passwords, usernames and
other sensitive information.

3. UTILIZE VPN- If you’re not sure about the security status of the network to which
you’re connected, using VPN (Virtual Private Network) client is mandatory. A VPN
will enable you to connect to a network securely. At the same time, any browsing
activity you do on the public Wi-Fi will be shielded from prying eyes.
1. ENCRYPT YOUR DEVICE- Encryption is the process of making data unreadable.
Decryption is converting the unreadable data into normal data. This is important in case of
theft, and it prevents unauthorized access. You simply need to locate this feature on your
mobile device and enter a password to encrypt your device.

2. UPDATE TO THE LATEST SOFTWARE- New loopholes might be exploited leaving


your device open to threats, to avoid that, always update your firmware/device
AGYAMAN !!!

You might also like