01.06.2020 Views

Cyber Defense eMagazine June 2020 Edition

Cyber Defense eMagazine June Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine June Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Using a simple mobile or desktop interface, the security team can grant or revoke access to any user to<br />

any particular section of the building or office. The cloud offers enterprise grade security and trouble free<br />

management and mitigates the risk of data loss, hacking, malware, and physical threats.<br />

Access Control Devices<br />

Key Cards: Most RFID cards can be duplicated in a matter of minutes using $10 devices easily available<br />

on the market. HID and NFC cards can be copied to phones. There are access control companies that<br />

claim their cards are cyber secure because they use 128 bit AER encryption, TLS and PKI security.<br />

However, cards or fob access looks outdated with the advent of mobile and face recognition access<br />

control.<br />

Smartphones: Smartphone access is a better choice from the cyber security standpoint. However, bad<br />

guys can steal or hack smartphones by using malware or even USB charging cables at public phone<br />

charging points. Theoretically speaking, someone can steal user credentials and clone them into another<br />

device to illegally enter the workplace.<br />

Face Recognition: Facial recognition based access control systems provide a better solution to cyber<br />

threats. Fraudsters may still be able to beat the system by wearing masks, but it would be like Mission<br />

Impossible.<br />

Smart Locks: Cnet reports that out of 16 different Bluetooth enabled locks were tested at the Las Vegas<br />

based hackers convention, 12 had inadequate BLE security. So, yeah, they can be hacked unless your<br />

access control solution provider has done a really good job at encryption.<br />

Communication Channels<br />

Bluetooth, NFC and HID: Bluetooth has several known vulnerabilities that make it as secure as a<br />

padlock made from pizza dough. NFC and HID are no better—they are just channels that you have to<br />

make secure by encrypting the data stream.<br />

LAN/WAN: Access control systems that run on internal networks are not cyber- secure at all. WiFi<br />

networks are easy to hack. There’s always a risk of data theft or the server crashing or network glitches<br />

that make the system unusable.<br />

Internet: Cloud based systems with robust transitory and endpoint encryption make the data stream<br />

impossible to crack. However, users should make sure their internet connection is secure.<br />

Face recognition based access control systems offer better protection against cyber security threats; not<br />

only because they use cyber-secure components and encryption, but also because they allow you to<br />

monitor and record everyone who’s entering the workplace or accessing its different sections. Moreover,<br />

you can implement two-factor authentication based on face and mobile credential to eliminate the risk of<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 56<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!