Physical Intrusion Detection
Describe physical intrusion detection methodologies and products.
For this section, physical intrusion detection is presented in the form of a fairly long table. A key point to remember: Do not be blinded by technology; sensors and detection must be guided by intelligent risk assessment and must be part of a complete strategy.
However good a perimeter security mechanism is, sooner or later it will be defeated. When this occurs, there should be a method for detecting the intrusion. The key to a good defense is a defined monitoring and response mechanism.
Many kinds of sensors and other detection mechanisms are available. Table 10.2 lists some of these mechanisms and some characteristics and issues related to them. ...
Get CISSP Training Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.