Cyber Defense eMagazine June 2020 Edition
Cyber Defense eMagazine June Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES
Cyber Defense eMagazine June Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Using a simple mobile or desktop interface, the security team can grant or revoke access to any user to<br />
any particular section of the building or office. The cloud offers enterprise grade security and trouble free<br />
management and mitigates the risk of data loss, hacking, malware, and physical threats.<br />
Access Control Devices<br />
Key Cards: Most RFID cards can be duplicated in a matter of minutes using $10 devices easily available<br />
on the market. HID and NFC cards can be copied to phones. There are access control companies that<br />
claim their cards are cyber secure because they use 128 bit AER encryption, TLS and PKI security.<br />
However, cards or fob access looks outdated with the advent of mobile and face recognition access<br />
control.<br />
Smartphones: Smartphone access is a better choice from the cyber security standpoint. However, bad<br />
guys can steal or hack smartphones by using malware or even USB charging cables at public phone<br />
charging points. Theoretically speaking, someone can steal user credentials and clone them into another<br />
device to illegally enter the workplace.<br />
Face Recognition: Facial recognition based access control systems provide a better solution to cyber<br />
threats. Fraudsters may still be able to beat the system by wearing masks, but it would be like Mission<br />
Impossible.<br />
Smart Locks: Cnet reports that out of 16 different Bluetooth enabled locks were tested at the Las Vegas<br />
based hackers convention, 12 had inadequate BLE security. So, yeah, they can be hacked unless your<br />
access control solution provider has done a really good job at encryption.<br />
Communication Channels<br />
Bluetooth, NFC and HID: Bluetooth has several known vulnerabilities that make it as secure as a<br />
padlock made from pizza dough. NFC and HID are no better—they are just channels that you have to<br />
make secure by encrypting the data stream.<br />
LAN/WAN: Access control systems that run on internal networks are not cyber- secure at all. WiFi<br />
networks are easy to hack. There’s always a risk of data theft or the server crashing or network glitches<br />
that make the system unusable.<br />
Internet: Cloud based systems with robust transitory and endpoint encryption make the data stream<br />
impossible to crack. However, users should make sure their internet connection is secure.<br />
Face recognition based access control systems offer better protection against cyber security threats; not<br />
only because they use cyber-secure components and encryption, but also because they allow you to<br />
monitor and record everyone who’s entering the workplace or accessing its different sections. Moreover,<br />
you can implement two-factor authentication based on face and mobile credential to eliminate the risk of<br />
<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 56<br />
Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.