Methods of entry: Difference between revisions
From Lockwiki
Jump to navigationJump to search
No edit summary |
mNo edit summary |
||
Line 24: | Line 24: | ||
==See also== | ==See also== | ||
Add to me! | Add to me! | ||
{{Stub}} | |||
[[Category:Methods of entry]] | [[Category:Methods of entry]] |
Latest revision as of 23:33, 2 February 2021
Methods of entry
A 'method of entry refers to a means by which the physical security of a container (a building, room, safe, etc.) can be defeated. In general, methods of entry are separated between those that are destructive and non-destructive, where non-destructive methods leave the container and all physical security mechanisms on/in it undamaged and functional from the end-user point of view.
Common methods of entry
- Destructive entry
- Non-destructive entry
- Covert entry
- Surreptitious entry
- Manipulation (e.g. combination safe manipulation)
- Use of an existing key or combination
- Unauthorized key duplication
- Varied (may be covert or surreptitious depending on specifics)
Some methods of entry vary widely in the amount of forensic evidence they leave behind, making them both covert and surreptitious based on the specifics of the physical security mechanisms, entry tools, and entry techniques used.
See also
Add to me!
This article is a stub. You can help Lockwiki by expanding it. |