Time
8 hours 33 minutes
Difficulty
Beginner
CEU/CPE
9

Video Transcription

00:06
so access controls methods to be to protect sensitive areas and restrict unauthorized access. So, like I was talking about earlier, you know, access controls, they're not just in place to keep outsiders out, but the, you know, they're also used to,
00:25
uh,
00:26
prevents people that don't have authorization to access a particular area or certain certain data. It's it's also to keep the insiders out of areas that they should not be should not have access to.
00:43
So things like separating work areas, you know? Bye bye departments, separation of duties, biometric access controls. You know, that's ah, the mean of using, you know, biometric tokens to prevent you know, certain people from accessing
01:00
certain areas, entry cards on tokens. And we'll talk about those in a minute. Man traps. So a man trap, it's ah, it's an automated portal, which, which only allows a single person to go through it at the time they're usually seen in high security areas.
01:19
What kind of attack would does a man trapped Prevent?
01:23
Thanks. Robert.
01:25
Use a bank robber.
01:26
I guess it could. Yeah.
01:30
You said piggybacking.
01:32
Yeah, piggybacking. So So the idea with piggy backing, right? Is it? I mean, it's real simply, you're walking into a building and someone just kind of walks in right behind you, and they just kind of kind of go right in. So the way that the man trap works is, you know, since only one person can go through it at a time. So one person goes, you know,
01:52
enters the man trap.
01:53
They authorize themselves, and then you know, if they're if they're authenticated, they walk through and then the next person can walk in. So, you know, just just by how that device is set up, it prevents someone from being ableto piggyback into into a building or into an area
02:13
on dhe facility signing procedures. So just having procedures for recording visitors, you know who they're who they're visiting the purpose for their visit, that type of thing and identification badges. You're just having having badges for
02:30
employees and then also for visitors. So it's easily recognizable.
02:34
You know who is who is an employee of the organization who is a visitor, and then also having, you know, policies in place for requiring those badges to be visible. So if you see someone walking around on, they don't have a visitor badge or a employee badge, and that immediately can,
02:53
you know,
02:54
send a red flag

Up Next