Group 4 Presentation Physical Security
Group 4 Presentation Physical Security
GROUP 4
MARANGE C (R1814123E) MUREWI A (1814315V)
TAVARWISA E (R176595P) ZISHIRI M (R191526P)
DZINGAI R (R1813742R) CHIWESHE P (R192731A)
MPARAMOTO S (R191062Q) MAPINDU G (R191678H)
INTRODUCTION
Physical security is broadly defined as the use of
physical measures to protect valuables, information or
access to restricted resources (Goodrich and Tamassia,
2014).
• Human-Caused Threats
• Human-caused threats are more difficult to deal
with than the environmental and technical threats.
• They are less predictable than other types of
physical threats.
• Worse, human-caused threats are specifically
designed to overcome prevention measures and or
seek the most vulnerable point of attack.
PHYSICAL SECURITY THREATS
• Human-Caused Threats can be categorised as:
• Unauthorized physical access. Unauthorized
physical access can lead to other threats such as
theft, vandalism or misuse.
• Theft. It includes theft of equipment and data
exfiltration. Eavesdropping and wiretapping also
fall into this category. Theft can be at the hands
of an outsider who gains unauthorized access or
by an insider.
• Vandalism. This threat includes destruction of
equipment and deletion of data.
• Misuse. Misuse is improper use of resources by
those who are authorized to use them and by
unauthorized persons.
AUTHORISATION
• This is the determination of whether a user has
permission to access, read, modify, insert, or
delete certain data, or to execute certain
programs (Kizza, 2020).
• In particular, it is a set of access rights and
access privileges granted to a user to benefit
from a particular system resource.
• Authorization is also commonly referred to as
access permissions, and it determines the
privileges a user has on a system and what the
user should be allowed to do to the resource.
Access permissions are normally specified by a
list of possibilities.
AUTHORISATION
• While access control consists of defining an
access policy for each system resource, the
enforcement of each one of these access
policies is what is called authorization.
• Facial recognition
• Facial recognition matches the different face
characteristics of an individual trying to gain access to an
approved face stored in a database. Face recognition can
be inconsistent when comparing faces at different angles
or comparing people who look similar, like close relatives
or identical twins. Facial liveness like passive facial
liveness prevents spoofing.
AUTHENTICATION MECHANISMS
• Biometric authentication
• Speaker Recognition
• Speaker Recognition also known as voice biometrics,
examines a speaker’s speech patterns for the formation of
specific shapes and sound qualities. A voice-protected
device usually relies on standardized words to identify
users, just like a password.
AUTHENTICATION MECHANISMS
• Biometric authentication