{"id":4064,"date":"2021-06-01T08:43:08","date_gmt":"2021-06-01T14:43:08","guid":{"rendered":"https:\/\/idzone.com.sa\/?p=4064"},"modified":"2021-06-01T08:43:09","modified_gmt":"2021-06-01T14:43:09","slug":"how-secured-is-your-pacs","status":"publish","type":"post","link":"https:\/\/idzone.com.sa\/arabic\/how-secured-is-your-pacs\/","title":{"rendered":"How SECURED is your PACS ?"},"content":{"rendered":"<p>Security of any premises comprises of critical systems like \u2013 Physical Access Control System<strong> (PACS<\/strong>), Video Surveillance, and Logical Access Control. Physical access control is the foremost line-of-defense against any breach of security followed by video surveillance that assists to analyze the intrusion incident. Hence, the security team and the management must know the significance of PAC system which helps to manage and identify any sort of threats &amp; vulnerabilities.<br>A few points below that explains the framework of PACS:<br>1. <strong>Safeguarding all Storage Locations<\/strong><br>For better security, ensure all the controller devices and its cabling are hidden from general public to avoid accessing for fabrications. <strong><em>\u0634\u0647\u0627\u062f\u0627\u062a\u0647<\/em><\/strong> play a major role in identifying users in PACS. Limit the storage of credential data to fewer components, such as controllers and server databases. Even if smart cards or readers get hacked, it becomes impossible for the intruder to gain sensitive information.<br>Here are some of the most effective ways to secure storage components of PACS credentials:<br><strong>a. Server Database Security<\/strong><br><em>\u2013  Use of standard RDBMS products offering secure authentication protocols<\/em><br><strong>b. Controller Memory Security<\/strong><br><em>\u2013   Crypto memory chip<br>\u2013   Biometric credential storage on the controller itself (publicly exposed devices such as readers should not carry any confidential credential data)<\/em><br><strong>c. Reader Memory Security<\/strong><br><em>\u2013   A secure element for the protection of keys and cryptographic operations<\/em><br><strong>d. Smart Card User Memory Security<\/strong><br><em>\u2013   Key-based secure user memory access (instead of just referring to card CSN)<\/em><\/p>\n\n\n\n<p><br><strong>2. Securing all Communication Networks<\/strong><br>The PACS framework is designed in a way that if any communication networks (server, controller, reader, cards) gets compromised, all the sensitive credential information becomes vulnerable.<\/p>\n\n\n\n<p><br>However, here are some of the most effective ways to secure the respective communication channels:<br><strong>a. Secure Communication between Card &amp; Reader<\/strong><br><em>\u2013   Symmetric Key Encrypted data transmission (instead of just referring to card CSN)<\/em><br><strong>b. Secure Communication between Reader &amp; Controlle<\/strong>r<br><em>\u2013   Use of communication protocol supporting encryption such as OSDP SC (instead of ubiquitous wiegand protocol)<\/em><br><strong>c. Secure Communication between Controller &amp; Server<\/strong><br><em>\u2013   TLS encryption or AES 128\/256 bit<br>\u2013   Cryptographic module, like OpenSSL FIPS Object Module RE for certified implementation of TLS<br>\u2013   IPV6, ensuring greater connection integrity and security<\/em><br><strong>d. Secure Communication between Server &amp; Clients<\/strong><br><em>\u2013   SSL (HTTPS)<\/em><\/p>\n\n\n\n<p><br><strong>3. Device\/ Application Access Management <\/strong> <br>PACS security threat continues on application access management levels, wherein hackers gain access to privileged user\u2019s credentials for unauthorized access.<br>Here are some of the most effective ways to secure against unauthorized application access:<br><strong>a. Robust Password Policy Implementation, such as-<\/strong><br><em>\u2013   Enforcing strong passwords<br>\u2013   Password expiry\/Portal lockout (multiple incorrect login attempts)<br>\u2013   Audit trails<br>\u2013   CAPTCHA<\/em><br><strong>b. Ensure Server Application Security with:<\/strong><br><em>\u2013   VAPT certification<br>\u2013   ISO 27001:2013 (ISMS) certified processes<\/em><\/p>\n\n\n\n<p><em><br><\/em>To know more about PACS, contact our experts at IDZONE. <br><\/p>","protected":false},"excerpt":{"rendered":"<p>Security of any premises comprises of critical systems like \u2013 Physical Access Control System (PACS), Video Surveillance, and Logical Access Control. Physical access control is the foremost line-of-defense against any breach of security followed by video surveillance that assists to analyze the intrusion incident. Hence, the security team and the management must know the significance [&hellip;]<\/p>","protected":false},"author":2,"featured_media":4069,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7],"tags":[],"class_list":["post-4064","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How SECURED is your PACS ? - IDZONE - Access Control System<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idzone.com.sa\/arabic\/how-secured-is-your-pacs\/\" \/>\n<meta property=\"og:locale\" content=\"ar_AR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How SECURED is your PACS ? - IDZONE - Access Control System\" \/>\n<meta property=\"og:description\" content=\"Security of any premises comprises of critical systems like \u2013 Physical Access Control System (PACS), Video Surveillance, and Logical Access Control. Physical access control is the foremost line-of-defense against any breach of security followed by video surveillance that assists to analyze the intrusion incident. Hence, the security team and the management must know the significance [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idzone.com.sa\/arabic\/how-secured-is-your-pacs\/\" \/>\n<meta property=\"og:site_name\" content=\"IDZONE - Access Control System\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-01T14:43:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-01T14:43:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idzone.com.sa\/wp-content\/uploads\/2021\/06\/lock_circuit_board_bullet_hole_computer_security_breach_thinkstock_473158924_3x2-100732430-large.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"IDZONE Systems\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0643\u064f\u062a\u0628 \u0628\u0648\u0627\u0633\u0637\u0629\" \/>\n\t<meta name=\"twitter:data1\" content=\"IDZONE Systems\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631\" \/>\n\t<meta name=\"twitter:data2\" content=\"\u062f\u0642\u064a\u0642\u062a\u0627\u0646\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/idzone.com.sa\/how-secured-is-your-pacs\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/idzone.com.sa\/how-secured-is-your-pacs\/\"},\"author\":{\"name\":\"IDZONE Systems\",\"@id\":\"https:\/\/idzone.com.sa\/#\/schema\/person\/031230d91dcda2bc172697046d2ba819\"},\"headline\":\"How SECURED is your PACS ?\",\"datePublished\":\"2021-06-01T14:43:08+00:00\",\"dateModified\":\"2021-06-01T14:43:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/idzone.com.sa\/how-secured-is-your-pacs\/\"},\"wordCount\":449,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/idzone.com.sa\/#organization\"},\"image\":{\"@id\":\"https:\/\/idzone.com.sa\/how-secured-is-your-pacs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/idzone.com.sa\/wp-content\/uploads\/2021\/06\/lock_circuit_board_bullet_hole_computer_security_breach_thinkstock_473158924_3x2-100732430-large.jpg\",\"articleSection\":[\"Blogs\"],\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/idzone.com.sa\/how-secured-is-your-pacs\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/idzone.com.sa\/how-secured-is-your-pacs\/\",\"url\":\"https:\/\/idzone.com.sa\/how-secured-is-your-pacs\/\",\"name\":\"How SECURED is your PACS ? - IDZONE - Access Control System\",\"isPartOf\":{\"@id\":\"https:\/\/idzone.com.sa\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/idzone.com.sa\/how-secured-is-your-pacs\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/idzone.com.sa\/how-secured-is-your-pacs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/idzone.com.sa\/wp-content\/uploads\/2021\/06\/lock_circuit_board_bullet_hole_computer_security_breach_thinkstock_473158924_3x2-100732430-large.jpg\",\"datePublished\":\"2021-06-01T14:43:08+00:00\",\"dateModified\":\"2021-06-01T14:43:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/idzone.com.sa\/how-secured-is-your-pacs\/#breadcrumb\"},\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/idzone.com.sa\/how-secured-is-your-pacs\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/idzone.com.sa\/how-secured-is-your-pacs\/#primaryimage\",\"url\":\"https:\/\/idzone.com.sa\/wp-content\/uploads\/2021\/06\/lock_circuit_board_bullet_hole_computer_security_breach_thinkstock_473158924_3x2-100732430-large.jpg\",\"contentUrl\":\"https:\/\/idzone.com.sa\/wp-content\/uploads\/2021\/06\/lock_circuit_board_bullet_hole_computer_security_breach_thinkstock_473158924_3x2-100732430-large.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/idzone.com.sa\/how-secured-is-your-pacs\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/idzone.com.sa\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How SECURED is your PACS ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/idzone.com.sa\/#website\",\"url\":\"https:\/\/idzone.com.sa\/\",\"name\":\"IDZONE - Access Control System\",\"description\":\"IDZONE - Access Control System\",\"publisher\":{\"@id\":\"https:\/\/idzone.com.sa\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/idzone.com.sa\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ar\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/idzone.com.sa\/#organization\",\"name\":\"IDZONE\",\"url\":\"https:\/\/idzone.com.sa\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/idzone.com.sa\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/idzone.com.sa\/wp-content\/uploads\/2020\/10\/logo-1.png\",\"contentUrl\":\"https:\/\/idzone.com.sa\/wp-content\/uploads\/2020\/10\/logo-1.png\",\"width\":703,\"height\":301,\"caption\":\"IDZONE\"},\"image\":{\"@id\":\"https:\/\/idzone.com.sa\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/idzone.com.sa\/#\/schema\/person\/031230d91dcda2bc172697046d2ba819\",\"name\":\"IDZONE Systems\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/idzone.com.sa\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7f6f32b51f2f63b386f40fb254fc88593193dbb8168f035720e56bdd72dd249f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7f6f32b51f2f63b386f40fb254fc88593193dbb8168f035720e56bdd72dd249f?s=96&d=mm&r=g\",\"caption\":\"IDZONE Systems\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How SECURED is your PACS ? - IDZONE - Access Control System","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idzone.com.sa\/arabic\/how-secured-is-your-pacs\/","og_locale":"ar_AR","og_type":"article","og_title":"How SECURED is your PACS ? - IDZONE - Access Control System","og_description":"Security of any premises comprises of critical systems like \u2013 Physical Access Control System (PACS), Video Surveillance, and Logical Access Control. Physical access control is the foremost line-of-defense against any breach of security followed by video surveillance that assists to analyze the intrusion incident. Hence, the security team and the management must know the significance [&hellip;]","og_url":"https:\/\/idzone.com.sa\/arabic\/how-secured-is-your-pacs\/","og_site_name":"IDZONE - Access Control System","article_published_time":"2021-06-01T14:43:08+00:00","article_modified_time":"2021-06-01T14:43:09+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/idzone.com.sa\/wp-content\/uploads\/2021\/06\/lock_circuit_board_bullet_hole_computer_security_breach_thinkstock_473158924_3x2-100732430-large.jpg","type":"image\/jpeg"}],"author":"IDZONE Systems","twitter_card":"summary_large_image","twitter_misc":{"\u0643\u064f\u062a\u0628 \u0628\u0648\u0627\u0633\u0637\u0629":"IDZONE Systems","\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631":"\u062f\u0642\u064a\u0642\u062a\u0627\u0646"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/idzone.com.sa\/how-secured-is-your-pacs\/#article","isPartOf":{"@id":"https:\/\/idzone.com.sa\/how-secured-is-your-pacs\/"},"author":{"name":"IDZONE Systems","@id":"https:\/\/idzone.com.sa\/#\/schema\/person\/031230d91dcda2bc172697046d2ba819"},"headline":"How SECURED is your PACS ?","datePublished":"2021-06-01T14:43:08+00:00","dateModified":"2021-06-01T14:43:09+00:00","mainEntityOfPage":{"@id":"https:\/\/idzone.com.sa\/how-secured-is-your-pacs\/"},"wordCount":449,"commentCount":0,"publisher":{"@id":"https:\/\/idzone.com.sa\/#organization"},"image":{"@id":"https:\/\/idzone.com.sa\/how-secured-is-your-pacs\/#primaryimage"},"thumbnailUrl":"https:\/\/idzone.com.sa\/wp-content\/uploads\/2021\/06\/lock_circuit_board_bullet_hole_computer_security_breach_thinkstock_473158924_3x2-100732430-large.jpg","articleSection":["Blogs"],"inLanguage":"ar","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/idzone.com.sa\/how-secured-is-your-pacs\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/idzone.com.sa\/how-secured-is-your-pacs\/","url":"https:\/\/idzone.com.sa\/how-secured-is-your-pacs\/","name":"How SECURED is your PACS ? - IDZONE - Access Control System","isPartOf":{"@id":"https:\/\/idzone.com.sa\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idzone.com.sa\/how-secured-is-your-pacs\/#primaryimage"},"image":{"@id":"https:\/\/idzone.com.sa\/how-secured-is-your-pacs\/#primaryimage"},"thumbnailUrl":"https:\/\/idzone.com.sa\/wp-content\/uploads\/2021\/06\/lock_circuit_board_bullet_hole_computer_security_breach_thinkstock_473158924_3x2-100732430-large.jpg","datePublished":"2021-06-01T14:43:08+00:00","dateModified":"2021-06-01T14:43:09+00:00","breadcrumb":{"@id":"https:\/\/idzone.com.sa\/how-secured-is-your-pacs\/#breadcrumb"},"inLanguage":"ar","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idzone.com.sa\/how-secured-is-your-pacs\/"]}]},{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/idzone.com.sa\/how-secured-is-your-pacs\/#primaryimage","url":"https:\/\/idzone.com.sa\/wp-content\/uploads\/2021\/06\/lock_circuit_board_bullet_hole_computer_security_breach_thinkstock_473158924_3x2-100732430-large.jpg","contentUrl":"https:\/\/idzone.com.sa\/wp-content\/uploads\/2021\/06\/lock_circuit_board_bullet_hole_computer_security_breach_thinkstock_473158924_3x2-100732430-large.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/idzone.com.sa\/how-secured-is-your-pacs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idzone.com.sa\/"},{"@type":"ListItem","position":2,"name":"How SECURED is your PACS ?"}]},{"@type":"WebSite","@id":"https:\/\/idzone.com.sa\/#website","url":"https:\/\/idzone.com.sa\/","name":"IDZONE - Access Control System","description":"IDZONE - Access Control System","publisher":{"@id":"https:\/\/idzone.com.sa\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idzone.com.sa\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ar"},{"@type":"Organization","@id":"https:\/\/idzone.com.sa\/#organization","name":"IDZONE","url":"https:\/\/idzone.com.sa\/","logo":{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/idzone.com.sa\/#\/schema\/logo\/image\/","url":"https:\/\/idzone.com.sa\/wp-content\/uploads\/2020\/10\/logo-1.png","contentUrl":"https:\/\/idzone.com.sa\/wp-content\/uploads\/2020\/10\/logo-1.png","width":703,"height":301,"caption":"IDZONE"},"image":{"@id":"https:\/\/idzone.com.sa\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/idzone.com.sa\/#\/schema\/person\/031230d91dcda2bc172697046d2ba819","name":"IDZONE Systems","image":{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/idzone.com.sa\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7f6f32b51f2f63b386f40fb254fc88593193dbb8168f035720e56bdd72dd249f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7f6f32b51f2f63b386f40fb254fc88593193dbb8168f035720e56bdd72dd249f?s=96&d=mm&r=g","caption":"IDZONE Systems"}}]}},"_links":{"self":[{"href":"https:\/\/idzone.com.sa\/arabic\/wp-json\/wp\/v2\/posts\/4064","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idzone.com.sa\/arabic\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idzone.com.sa\/arabic\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idzone.com.sa\/arabic\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/idzone.com.sa\/arabic\/wp-json\/wp\/v2\/comments?post=4064"}],"version-history":[{"count":0,"href":"https:\/\/idzone.com.sa\/arabic\/wp-json\/wp\/v2\/posts\/4064\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idzone.com.sa\/arabic\/wp-json\/wp\/v2\/media\/4069"}],"wp:attachment":[{"href":"https:\/\/idzone.com.sa\/arabic\/wp-json\/wp\/v2\/media?parent=4064"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idzone.com.sa\/arabic\/wp-json\/wp\/v2\/categories?post=4064"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idzone.com.sa\/arabic\/wp-json\/wp\/v2\/tags?post=4064"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}