Page 71 - Cyber Warnings
P. 71







building options. Such systems give business owners a high degree of control over physical
facility attendance.

The embedded Data Manager tool can be used to track employees’ electronic entries, assign
card holders to certain user groups depending on the access area and time.

The tool also allows recording card holders’ locations and shows at what time and at which door
the user was granted or denied access. To prevent data loss in case of system failures,
controllers should be synchronized with the central database.

2) Security Manager

Any type of interaction with the system should be also tracked. That’s why it’s vital to use a
special tool to control card holders’ actions: logins, addition records, different kinds of editing,
deletion, and more.

3) Hardware Manager

To avoid damage caused by malefactors, it also seems logical to use a hardware management
tool to configure diverse hardware, such as controllers, doors with door panels and door
readers, etc. Such a tool allows running all the needed reports; it is easy to implement and
integrate, that’s why Hardware Manager can be effectively used by companies of all stripes and
colors.

To fulfill its function of an insider and outside threats/attacks tracker and show all its possibilities
(including reports delivery), the above-mentioned software has to be correctly integrated into the
enterprise control system, as shown in this case study, and if needed to go through a proper
customization process.

Conclusion:

The article touched slightly upon the problem of physical security enterprises constantly face.
With the development of new sophisticated techniques, both cyber and physical attackers feel
free to conduct illegal deceitful activities to pursue their own aims, that’s why a response should
be also refined and effective.

About The Author

Yana Yelina graduated from Minsk State Linguistic University with a
bachelor’s degree in Translation/Interpretation (English, Spanish, and
Italian) and Public Relations. After that, she has worked as a
copywriter/journalist for a number of Belarusian companies. At EffectiveSoft
Yana holds a position of a Tech Journalist and writes about modern
technologies, covering software development practices in a broad array of
business domains: trading and finance, e-commerce, education, healthcare, logistics, etc. Yana
can be reached online at [email protected] or http://www.effectivesoft.com. You can
also connect with her on LinkedIn or Twitter.

71 Cyber Warnings E-Magazine November 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   66   67   68   69   70   71   72   73   74   75   76