1C - Physical Security Controls Flashcards
Why are physical security controls put in place?
Stop unauthorised access to the company or access to data
What are the 3 groups of physical controls?
Perimeter security, Building security, Device protection
What are the 7 perimeter security solutions? (With examples if necessary)
- Signage - highly visible warning signs
- Fences / gates - fence controlled by gate, bollard
- Access Control - armed guards checking identity
- Lighting
- Cameras - CCTV around perimeter and on doorways
- Robot Sentries
- Industrial Camouflage - disguising entrances, make buildings look like residential housing from above
Why do you use signage at the perimeter?
As a deterrent
What are the 2 reasons for using lighting at the perimeter?
- Those trying to enter at night can be seen
2. Safety
What do Robot Sentries do?
Robot Sentries parol the perimeter, shout out warnings and can be armed.
Why do you use Industrial Camouflage?
So that it is difficult for surveillance operatives to spot it.
What are the 14 Building Security solutions? (With examples if necessary)
- (Armed) Security guards - one being a dog-handler
- Two-person integrity / control
- Badges
- Key Management (when keys are signed out and in)
- Mantraps (turnstile devices that only let 1 person in at a time)
- Proximity cards
- Tokens
- Biometric locks
- Electronic locks
- Burglar alarms
- Fire alarms / smoke detectors
- Internal protection - toughened glass container with locks, sturdy mesh with locks), protected distribution cabling, screen filters.
- Conduits / cable distribution
- Environmental Controls - HVAC, fire suppression systems
What are some requirements for badges
- Visitors badges are only awarded after signing a visitor book and they are on an access control list.
- Visitor badges must be a different colour to employee badges
- Employee badges must have a name, signature and photograph of badge holder.
- Badges should be visible at all times and if not the person should be challenged.
What is the purpose of key management?
Prevents someone from taking the keys away and cutting a copy
Types of biometric locks?
Fingerprint, retina, palm, voice, iris scanners, facial recognition
What are the settings for electronic locks?
Fail open: door opens during a power cut
Fail safe: door shuts during a power cut
What are conduits? Why are they used?
Cables placed inside. They protect cables from tampering and being chewed by rodents.
What are the 6 device protection solutions? Explain each.
- Cable Locks - secures laptops and tablets so that nobody can steal them
- Air Gap - computer taken off network with no cable or wireless connection
- Laptop Safe
- USB Data Blocker - blocks data pins on USB device
- Vault - where data can be encrypted and stored in the cloud.
- Faraday Cage - metal mesh structure built into walls to prevent wireless / cellular phones working and from electronic emissions escaping.
How do you extract data from an Air Gap device?
USB or CD Rom