Security gap scenario

October 2005 Integrated Solutions

Mr CFO is travelling abroad, therefore has not checked into his office via his access control card at the main turnstile in the New York City office. He has, however, checked into his office in Paris, France and will be working there for the next 10 days. The physical access control system in New York is a different system, completely independent from the one securing the office in France. Therefore, the guards monitoring the system in New York City are not even aware that Mr CFO is not in the building.

In the meantime, a trusted employee has been looking over Mr CFO's shoulder and has acquired his login credentials, which are simply username and password. Knowing he is out of the country for 10 days, and on a very different time schedule, she logs onto the network, during normal working hours, and accesses sensitive files, which she will later share with competitors.

Will an alarm be annunciated anywhere? No. Why?

There is no apparent violation in either the physical access system, nor the network access system, which are operating independently.

* The employee committing the crime is authorised to enter the building during US, EST working hours, so nothing will be annunciated in the physical access system, or even flagged as abnormal.

* The network security system sees Mr CFO logging on and accessing files that he is authorised to view during time periods that are otherwise normal for him. Therefore, nothing will be annunciated or flagged as a network security breach. Effective security management combining both physical and IT controls could result in organisationally and operationally coordinated security.

* If the physical access systems were compatible, the guards monitoring the facilities may have at least known that Mr CFO was entering the facility in France, not locally in New York.

* If the physical access system was communicating activity to the network access system, Mr CFO's credentials may authorise him local access, only where he appears to be physically located.

* If the physical access system was communicating to the network access system, it would annunciate an alarm if Mr CFO logged onto the network remotely or in another location than he appears to physically be located based on the last doors he physically accessed.

* If the physical security department had procedures in place to communicate abnormal events such as this, they would notify the network security department of a possible security breech.

* If the credentials required for Mr CFO to enter the facility in France were also required for him to log onto the corporate network, another person would not be able to utilise his credentials.

By Laurie Aaron, Tyco Safety Products, courtesy of Faulkner Information Services.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Acronis and Metrofile Cloud announce partnership
Infrastructure Integrated Solutions
Acronis has appointed Metrofile Cloud as its premier disaster recovery (DR) partner in southern Africa, combining Acronis' technologies with Metrofile Cloud's local expertise to deliver secure and adaptable disaster recovery solutions for businesses across the region.

Read more...
The real cost of DHA’s verification fee
Ideco Biometrics Integrated Solutions
South Africa’s Department of Home Affairs has proposed a significant increase in its online ID-verification fee, which could have severe unintended consequences, potentially undermining the progress made in anti-money laundering initiatives and exposing individuals to greater risk of identity fraud.

Read more...
Digitising security solutions with AI and smart integration
Regal Security Distributors SA Technews Publishing Integrated Solutions
The Regal Projects Team’s decades of experience and commitment to integration have brought the digital security guard to life as a trusted force for safer, smarter living.

Read more...
Smart cities and the role of video security
Surveillance Integrated Solutions
As cities around the world continue to embrace smart technology, including IoT that not only connects to people, but also the surrounding activity, the integration of advanced video security systems is crucial to ensure safety and efficiency in environments.

Read more...
Surveillance to unjam the traffic
Integrated Solutions Transport (Industry)
Traffic is a challenge that affects urban areas across Africa. The city of Johannesburg, South Africa’s most populous city, experiences severe traffic resulting from a confluence of issues, including power outages, faulty traffic lights, and infrastructure theft.

Read more...
The benefits of offsite control rooms
Astrosec Surveillance Integrated Solutions
As the security landscape grows more intricate, control rooms – the crucial hub of security operations – need to adapt. With escalating costs, mounting threats, and a heightened demand for immediate responses, many organisations are reassessing the operations of their control rooms.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.