The ATM of a bank is robbed by breaking the ATM machine. Which of the following physical security
devices can now be used for verification and historical analysis of the ATM robbery?
A.
Key card
B.
Biometric devices
C.
Intrusion detection systems
D.
CCTV Cameras
Explanation:
Closed-circuit television (CCTV) is a device that uses video cameras to transmit a signal
to a specific place, on a limited set of monitors. It
differs from broadcast television in that the signal is not openly transmitted, though it may employ
point to point wireless links. CCTV is often
used for surveillance in areas that may need monitoring such as banks, casinos, airports, military
installations, and convenience stores.
Answer option A is incorrect. Key card cannot be used for verification now as the key card was not
used during the robbery. The doors of ATM
machines are attached with a unique key card recognition system that works as an access regulator
for users.
Answer option B is incorrect. Biometrics is a method of authentication that uses physical
characteristics, such as fingerprints, scars, retinal
patterns, and other forms of biophysical qualities to identify a user. Nowadays, the usage of
biometric devices such as hand scanners and
retinal scanners is becoming more common in the business environment.
Answer option C is incorrect. An Intrusion detection system (IDS) is used to detect unauthorized
attempts to access and manipulate computer
systems locally or through the Internet or an intranet. It can detect several types of attacks and
malicious behaviors that can compromise the
security of a network and computers. This includes network attacks against vulnerable services,
unauthorized logins and access to sensitive
data, and malware (e.g. viruses, worms, etc.). An IDS also detects attacks that originate from within a
system. In most cases, an IDS has
three main components: Sensors, Console, and Engine. Sensors generate security events. A console
is used to alert and control sensors and
to monitor events. An engine is used to record events and to generate security alerts based on
received security events. In many IDS
implementations, these three components are combined into a single device. Basically, following
two types of IDS are used :
Network-based IDS
Host-based IDS