Page 690 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 690

signal, the alarm triggers automatically. Both measures are designed
               to prevent intruders from circumventing the detection and alarm

               system.


               Access Abuses

               No matter what form of physical access control is used, a security
               guard or other monitoring system must be deployed to prevent abuse,
               masquerading, and piggybacking. Examples of abuses of physical
               access controls are propping open secured doors and bypassing locks
               or access controls. Masquerading is using someone else’s security ID

               to gain entry into a facility. Piggybacking is following someone
               through a secured gate or doorway without being identified or
               authorized personally. Detecting abuses like these can be done by
               creating audit trails and retaining access logs.

               Audit trails and access logs are useful tools even for physical access
               control. They may need to be created manually by security guards. Or
               they can be generated automatically if sufficient automated access

               control mechanisms (such as smartcards and certain proximity
               readers) are in use. The time at which a subject requests entry, the
               result of the authentication process, and the length of time the secured
               gate remains open are important elements to include in audit trails
               and access logs. In addition to using the electronic or paper trail,
               consider monitoring entry points with closed circuit television (CCTV)
               or security cameras. CCTV enables you to compare the audit trails and

               access logs with a visual recording of the events. Such information is
               critical to reconstruct the events for an intrusion, breach, or attack.


               Emanation Security

               Many electrical devices emanate electrical signals or radiation that can
               be intercepted by unauthorized individuals. These signals may contain
               confidential, sensitive, or private data. Obvious examples of
               emanation devices are wireless networking equipment and mobile
               phones, but many other devices are vulnerable to interception. Other

               examples include monitors, modems, and internal or external media
               drives (hard drives, USB thumb drives, CDs, and so on). With the right
               equipment, unauthorized users can intercept electromagnetic or radio
   685   686   687   688   689   690   691   692   693   694   695