1C - Physical Security Controls Flashcards

1
Q

Why are physical security controls put in place?

A

Stop unauthorised access to the company or access to data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 3 groups of physical controls?

A

Perimeter security, Building security, Device protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 7 perimeter security solutions? (With examples if necessary)

A
  1. Signage - highly visible warning signs
  2. Fences / gates - fence controlled by gate, bollard
  3. Access Control - armed guards checking identity
  4. Lighting
  5. Cameras - CCTV around perimeter and on doorways
  6. Robot Sentries
  7. Industrial Camouflage - disguising entrances, make buildings look like residential housing from above
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why do you use signage at the perimeter?

A

As a deterrent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 2 reasons for using lighting at the perimeter?

A
  1. Those trying to enter at night can be seen

2. Safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What do Robot Sentries do?

A

Robot Sentries parol the perimeter, shout out warnings and can be armed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why do you use Industrial Camouflage?

A

So that it is difficult for surveillance operatives to spot it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 14 Building Security solutions? (With examples if necessary)

A
  1. (Armed) Security guards - one being a dog-handler
  2. Two-person integrity / control
  3. Badges
  4. Key Management (when keys are signed out and in)
  5. Mantraps (turnstile devices that only let 1 person in at a time)
  6. Proximity cards
  7. Tokens
  8. Biometric locks
  9. Electronic locks
  10. Burglar alarms
  11. Fire alarms / smoke detectors
  12. Internal protection - toughened glass container with locks, sturdy mesh with locks), protected distribution cabling, screen filters.
  13. Conduits / cable distribution
  14. Environmental Controls - HVAC, fire suppression systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some requirements for badges

A
  1. Visitors badges are only awarded after signing a visitor book and they are on an access control list.
  2. Visitor badges must be a different colour to employee badges
  3. Employee badges must have a name, signature and photograph of badge holder.
  4. Badges should be visible at all times and if not the person should be challenged.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose of key management?

A

Prevents someone from taking the keys away and cutting a copy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Types of biometric locks?

A

Fingerprint, retina, palm, voice, iris scanners, facial recognition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the settings for electronic locks?

A

Fail open: door opens during a power cut

Fail safe: door shuts during a power cut

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are conduits? Why are they used?

A

Cables placed inside. They protect cables from tampering and being chewed by rodents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 6 device protection solutions? Explain each.

A
  1. Cable Locks - secures laptops and tablets so that nobody can steal them
  2. Air Gap - computer taken off network with no cable or wireless connection
  3. Laptop Safe
  4. USB Data Blocker - blocks data pins on USB device
  5. Vault - where data can be encrypted and stored in the cloud.
  6. Faraday Cage - metal mesh structure built into walls to prevent wireless / cellular phones working and from electronic emissions escaping.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do you extract data from an Air Gap device?

A

USB or CD Rom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why use a USB Data Blocker?

A

Prevent juice jacking - the stealing of data during the charging of USB devices.