Security Blog

Our Recent Posts

Archive

Tags

Logical Security - Network Layer Introduction

Nowadays our life are connected to the world with or without our knowledge. In such world, we cannot afford to neglect the importance of logical security. The seven layers of network shall be carefully planned and properly secured. Here are the seven layers of network put into context for easy understanding: 1) Physical: such as the metal copper or optical fibre 2) Datalink: your network switch works in this layer. MAC (media access control) address works in this layer and allows two or more devices to talk to each other effectively. 3) Network: Routers and Internet Protocol (IP) address are in this layer. 4) Transport: TCP works here. 5) Session: establishing working communications between

Biometric Data Introduction

Biometric can be any information that is contained in a natural body. We select the types of biometric that is unique to each person and can be easily presented for security purposes. Okay, that was a long way to saying things such as fingerprints, irises, veins, hand geometry, facial features, and the list goes on. Which biometric information shall we use and when shall we use it? That question has many answers, but here are some basic ideas based on our practical experience. 1) Fingerprints: for in-door, where lighting interference can be controlled, optical based fingerprint readers serve most purposes; for out-door, capacitance based fingerprint readers is better than their optical count

Is your access card still secure?

Experience tells us that most access card technology cannot stay hack-proof for more than three years. However, that does not mean your three year old card would automatically become worthless. Even if a certain card technology is hacked in theory, but in practice, it may not be feasible to carry out the hacking. There are physical constraints such as distance from your card and hacking device portability. One thing for sure is: your card _is_ your key. Keep your card close to you concealed and never re-use a lost card.

Hong Kong Police Response Level

The Hong Kong police (HKP) is a very good police force even in international standard. HKP generally respond quickly (less than 15 minutes to arrive), and that response quality has to give thanks to the phased response policy by the Intruder Alarm Inspection Unit that discourages false alarm and encourages deployment of robust alarm systems that generate genuine alarms. Here are questions that we need to ask ourselves: 1) Do I have frequent false alarms? 2) What is my current response level? 3) What can I do to improve it?

Common false sense of security

We have been coming across so many bad security designs that look secure but actually nothing more than a piece of fragile decoration in the eyes of professionals be them good or bad willed. For example: 1. Having a big metal lock but the surrounding supporting frames were flimsy 2mm aluminium plates. It would take anyone two to three minutes using simple hand tools to break the plates that hold the lock. 2. Installing these simple keypad locks that costs about HKD $300. All one would need is a block of magnet the size of a thumb to gain access in literally one second. 3. Installing the magnetic locks on the unsecured side (outside) _and_ with the power cabling exposed without proper cable c

    © Guardian Forest Security Limited
    Your Personal Security Consultant
    Est. 2017 Hong Kong