Common Physical Security Threats

Perimeter Security

Social Engineering
Social engineering attacks prey on human nature and good will. A con artist tries to gain the trust of an inside person using deception techniques (e.g., impersonation or conniving behavior such as false flattery). Additional human traits that social engineering attackers strive to exploit are: desire to provide assistance, a propensity to boast, and general lack of vigilance. In other words, social engineering attacks attempt to bypass IT and physical security controls by targeting humans.
With respect to physical security, the goal of the attacker is to use the social engineering attack as a stepping-stone to the organization’s IT infrastructure or physical facility. By way of illustration, a malicious actor could attempt to infiltrate a particular building under the guise of a repair technician. Once he achieves this goal, he can choose then to install a sniffer to capture all kinds of sensitive data.

Piggybacking and Tailgating
Piggybacking and Tailgating happen when someone who does not have access takes advantage of another person who has to infiltrate into a secure area.
Tailgating occurs when an intruder creeps into a protected zone with a person or a group of persons without their knowledge. An example of this act is when an intruder follows an unsuspecting employee. The employee unlocks a door to a secure area, but he is not observant of everything around him, and the intruder manages to set his foot on the closing door and eventually to enter the restricted zone.
Piggybacking, on the other hand, happens when an intruder (“being given a piggyback ride”) goes inside a security perimeter accompanied by a person who has access and who is fully aware of the fact that he lets in another person. However, he usually does not recognize the intruder as such.

Dumpster Diving
The act of going through the thrash of a given entity in search of information that might be helpful for refining strategies for a potential attack. Often what is found in the dumpsters is combined with other information.
What are the most common types of intelligence the attackers are looking for when they ransack someone’s garbage? Mostly things like network configurations, access documents, discarded storage media, information on employees; all sensitive information that might be used in a social engineering scenario.

Source: Infose Iinstitute

23 Perimeter Security

Perimeter Security

Perimeter Security, Video Intrusion Detection, Fiber Optic Security System, Marine Security, Marine Net, Under Water Marine Net Detection, Under Water Marine Detection, Under Water Security, Security Under Water, Perimeter Security, Fiber Optic Sensor, Fence Detection, Fiber Optic Net, Airport Security, Nuclear Facilities Security, Nuclear Security, Government Security, Perimeter Security for Federal Government, Fiber Optic for Perimeter Security, Perimeter Security for Oil and Gas, Perimeter Security for Water Utilities, Perimeter Security for Treatment Plants, Perimeter Security for Storage Tanks, Perimeter Security for Dams, Perimeter Security for Reservoirs, Perimeter Security for Electric Utilities, Perimeter Security for Generation Plants, Perimeter Security for Sub-Stations, Perimeter Security for Switchyards, Perimeter Security for Chemical Facilities, Perimeter Security for Chemical Plants, Perimeter Security for Refineries, Perimeter Security for LNG Plants,Perimeter Security for Storage Facilities, Perimeter Security for Transportation Industry, Perimeter Security for Airports, Perimeter Security for Seaports, Perimeter Security for Roads and Railroads, Perimeter Security for High Security Sites, Perimeter Security for Government Facilities, Perimeter Security for Nuclear Plants, Perimeter Security for Military Bases, Perimeter Security for Prisons, Perimeter Security for Oil and Gas, Perimeter Security for Oil Fields, Perimeter Security for Storage Facilities, Perimeter Security for Refineries.