05- Physical Security Flashcards

1
Q

access controls

A

the use of photo identity cards, swipe cards, biometric identification, or a PIN number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attack

A

occurs when a system is compromised based on a vulnerability by an unknown exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

countermeasure

A

A way to protect against an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Crime prevention through environmental design (CPTED)

A

a discipline which outlines how the properly designed physical environment can prevent crime by directly affecting human behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Fencing

A

the first line of defense in your list of physical security measures; an effective physical barrier; may not stop an intruder from entering but it can delay the intruder in his attempts and it acts as a deterrent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

intrusion detection systems (IDSs)

A

Detect unauthorized entries; can monitor entries, doors, windows, devices, or removable coverings of equipment; expensive and require human intervention to respond to the alarms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Life safety

A

protecting human life as the first priority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Lighting

A

one of the most important aspects of physical security; can act as a deterrent; gives a feeling to the intruder that he could be detected easily

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Locks

A

widely accepted access control mechanisms; slows down intruder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Manmade threats

A

include unauthorized access ? both internal and external ? explosions, damage by disgruntled employees, employee errors and accidents, vandalism, fraud, and theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

natural access control

A

The guide of people entering and leaving the environment through doors, fences, lighting, and even landscaping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Natural environmental threats

A

floods, earthquakes, storms and tornadoes, fires, extreme temperature conditions, and so on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

natural surveillance

A

using and placing physical environmental features, personnel walkways, and activity areas in ways that maximize visibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

perimeter

A

the place where you must start your defense mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Perimeter security

A

the first layer of defense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Physical access control systems

A

use software and auditing features to produce audit trails or access logs pertaining to access attempts

17
Q

physical access controls

A

identifying individuals who want to enter a facility or an area

18
Q

Physical security threats

A

include interruption of services, theft, fraud, sabotage, vandalism, and accidents

19
Q

Politically motivated threats

A

strikes, riots, civil disobedience, terrorist attacks, bombings, etc.

20
Q

resources

A

a combination of people, processes, procedures, technology, and equipment

21
Q

Response procedures

A

use of fire suppression mechanisms, emergency response processes, law enforcement notification, and consultation with outside security professionals

22
Q

Safety

A

the protection of life and assets against fire, natural disasters, and devastating accidents

23
Q

Security

A

should protect against vandalism, theft, and attacks by individuals

24
Q

Supply system threats

A

power distribution outages, communication interruptions, and interruption of other resources such as water, gas, and air filtration

25
Q

territorial reinforcement

A

creates physical designs to emphasize an organization?s physical atmosphere of influence to make legitimate users feel a sense of ownership of that environment

26
Q

threat

A

In terms of physical security, a threat is any real or perceived threat to one of these key areas: natural environmental, supply system, manmade, or politically motivate.

27
Q

Threat profiles

A

vary from one organization to other; the types of attackers, the capabilities of these attackers, and the resources and tactics these individuals would use

28
Q

uninterruptible power supplies (UPSs)

A

use AC line voltage to charge a bank of batteries; short-term solutions compared to generators

29
Q

Vulnerability

A

a weak link in the software, settings, etc., through which, if not fixed early, someone can get access to the computer, application, and/or network and can cause damage