Page 56 - Cyber Defense eMagazine June 2020 Edition
P. 56

Using a simple mobile or desktop interface, the security team can grant or revoke access to any user to
            any particular section of the building or office. The cloud offers enterprise grade security and trouble free
            management and mitigates the risk of data loss, hacking, malware, and physical threats.



            Access Control Devices


            Key Cards: Most RFID cards can be duplicated in a matter of minutes using $10 devices easily available
            on the market. HID and NFC cards can be copied to phones. There are access control companies that
            claim their cards are cyber secure because they use 128 bit AER encryption, TLS and PKI security.
            However, cards or fob access looks outdated with the advent of mobile and  face recognition access
            control.

            Smartphones: Smartphone access is a better choice from the cyber security standpoint. However, bad
            guys can steal or hack smartphones by using malware or even USB charging cables at public phone
            charging points. Theoretically speaking, someone can steal user credentials and clone them into another
            device to illegally enter the workplace.

            Face Recognition: Facial recognition based access control systems provide a better solution to cyber
            threats. Fraudsters may still be able to beat the system by wearing masks, but it would be like Mission
            Impossible.

            Smart Locks: Cnet reports that out of 16 different Bluetooth enabled locks were tested at the Las Vegas
            based hackers convention, 12 had inadequate BLE security. So, yeah, they can be hacked unless your
            access control solution provider has done a really good job at encryption.



            Communication Channels

            Bluetooth,  NFC  and  HID:  Bluetooth  has  several  known  vulnerabilities  that  make  it  as  secure  as  a
            padlock made from pizza dough. NFC and HID are no better—they are just channels that you have to
            make secure by encrypting the data stream.


            LAN/WAN:  Access  control  systems  that  run  on  internal  networks  are  not  cyber-  secure  at  all.  WiFi
            networks are easy to hack. There’s always a risk of data theft or the server crashing or network glitches
            that make the system unusable.

            Internet: Cloud based systems with robust transitory and endpoint encryption make the data stream
            impossible to crack. However, users should make sure their internet connection is secure.


            Face recognition based access control systems offer better protection against cyber security threats; not
            only because they use cyber-secure components and encryption, but also because they allow you to
            monitor and record everyone who’s entering the workplace or accessing its different sections. Moreover,
            you can implement two-factor authentication based on face and mobile credential to eliminate the risk of





            Cyber Defense eMagazine –June 2020 Edition                                                                                                                                                                                                                         56
            Copyright © 2020, Cyber Defense Magazine.  All rights reserved worldwide.
   51   52   53   54   55   56   57   58   59   60   61