2.7 Explain the importance of physical security controls. Flashcards

1
Q

Used to control both foot traffic and vehicles. K-rails (often seen during road construction), large planters, zigzag queues, bollards, and tire shredders are all examples of barricades.

A

BOLLARDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A small room with two doors: one in the trusted environment and one opening to the outside. Access control vestibules often contain scales and cameras to prevent piggybacking.

A

ACCESS CONTROL VESTIBULE/ MANTRAPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When an employee is terminated or otherwise departs the organization, badges should be retrieved and destroyed. A facility’s security policy may require that badges be worn in plain view by each authorized person. Badges should be designed with security features to minimize the ability of intruders to replicate or duplicate. Day passes and/or visitor badges should be clearly marked as such with bright colors for easy recognition from a distance, especially for escort required visitors.

A

BADGES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Systems designed to detect attempted intrusion, breach, or attack; the use of an unauthorized entry point; or the occurrence of some specific event at an unauthorized or abnormal time.

A

ALARMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Can be used to declare areas off-limits to those who are not authorized, indicate that security cameras are in use, and disclose safety warnings.

A

SIGNAGE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Video surveillance, video monitoring, closed-circuit television (CCTV), and security cameras are all means to deter unwanted activity and create a digital record of the occurrence of events.

A

CAMERAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Some cameras are activated through motion recognition. Some can even automatically indentify individuals and track their motion across the monitored area. See section 2.4 heading “Gait analysis.” Simple motion recognition or triggered cameras may be fooled by animals, birds, insects, weather, or foliage. Motion recognition can trigger a retention of video or notify security personnel of the event.

A

Motion recognition (Cameras)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Some cameras are capable of object detection, which can include faces, devices, and weapons. Detection of an object or person could trigger retention of video, notification of security personnel, closing/locking doors, and/or sounding an alarm.

A

Object detection (Cameras)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a security camera system that resides inside an organization’s facility and is usually connected to monitors for the security guards to view as well as to a recording device. Most traditional CCTV systems have been replaced by remote controlled IP cameras.

A

Closed-circuit television (CCTV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The attempt to mask or hide the actual function, purpose, or operations of a facility by providing a façade presenting a believable or convincing alternative.

A

Industrial camouflage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

People can be used as protection components, and defenses against unauthorized personnel are needed as well.

A

PERSONNEL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

These are able to adapt and react to various conditions or situations, learn and recognize attack and intrusion activities and patterns, adjust to a changing environment, and make decisions and judgment calls.

A

Guards (Personnel)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

These can be used to automatically patrol an area to look for anything out of place. They often use facial recognition to identity authorized individuals as well as potentially identify intruders.

A

Robot sentries (Personnel)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This can be used as a choke point to block access to unauthorized visitors. This area should be segregated from the security areas with locked doors and monitored by security cameras. If a visitor is authorized, then an escort can be assigned to accompany them around the facility. If a valid worker arrives, the person staffing this area may be able to “buzz” the door open for them. Any unauthorized visitors can be asked to leave, security guards can be brought to bear, or police can be called.

A

Reception (Personnel)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A security procedure where any changes to an environment or system must be approved by two different people before the alteration is applied or committed. Any sensitive or risky activity requires two admins to agree to perform the task. This type of control can be useful in managing access to a backup or escrow of encryption keys/certificates as well as authorizing production deployment of updates or applications from development or a software library.

A

Two-person integrity/control (Personnel)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

These can be controlled in such a way that only authorized people can unlock and/or enter through them.
These are used to keep doors and containers secured to protect assets.

A

LOCKS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Doors used to control entrance into secured areas can be protected by biometric locks. Only after the biometric is verified is the door unlocked and the person allowed entry. When biometrics are used to control entrance into secured areas, they serve as a mechanism of identity proofing as well as authentication.

A

Biometrics (Locks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Many door access systems, whether supporting biometrics, smart cards, or even PINs, are designed around the electronic access control (EAC) concept (a.k.a. digital locks and crypto locks). An EAC system is a door-locking and door-access mechanism that uses an electromagnet to keep a door closed, a reader to accept access credentials, and a door-close spring and sensor to ensure that the door recloses within a reasonable timeframe.

A

Electronic (Locks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Hardware or physical conventional locks are used to keep specific doors or other access portals closed and prevent entry or access to all but authorized individuals. With the risks of lock picking and bumping, locks resistant to such attacks must be used whenever valuable assets are to be protected from tampering or theft. Physical locks include conventional locks, deadbolts, dual-key locks, and padlocks.

A

Physical (Locks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A cable lock is used to protect smaller devices and equipment by making them more difficult to steal. A cable lock usually isn’t an impenetrable security device, since most portable systems are constructed with thin metal and plastic. However, a thief will be reluctant to swipe a cable-locked device, because the damage caused by forcing the cable lock out of the K-Slot will be obvious when they attempt to pawn or sell the device.

A

Cable locks (Locks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A hardware adapter placed between a USB cable and the USB port on a PC. This device blocks the data channels of a USB device from connecting with the storage capabilities of a system. Such devices allow for powering/recharging of a USB device without the risk of data transfer (such as malware).

A

USB DATA BLOCKER

22
Q

A commonly used form of perimeter security control. Its primary purpose is to discourage casual intruders, trespassers, prowlers, or would-be thieves who would rather perform their misdeeds in the dark, such as vandalism, theft, and loitering.

A

LIGHTING

23
Q

A perimeter-defining device. It protects against casual trespassing and clearly identifies the geographic boundaries of a property.

A

FENCING

24
Q

A controlled exit and entry point in a fence.

A

GATE

25
Q

Early detection and suppression of this will ensure that less damage is caused to the facility and equipment. Personnel safety is always of utmost importance.

A

FIRE SUPPRESSION

26
Q

A hardware or software tool used to monitor an activity or event to record information or at least take notice of an occurrence.

A

SENSORS

27
Q

A device that senses movement or sound in a specific area. Many types of motion detection exist, including infrared, heat, wave pattern, capacitance, photoelectric, and passive audio. The proper technology of motion detection should be selected for the environment where it will be deployed to minimize false positives and false negatives.

A

Motion detection (Sensors)

28
Q

A device that focuses on detecting a specific noise, such as the breaking of glass, or of an abnormal noise, such as a door opening at 3 a.m. when no one should be present.

A

Noise detection (Sensors)

29
Q

Proximity devices can be used to control physical access. A proximity device or proximity card can be a passive device, a field-powered device, or a transponder. When a proximity device passes a proximity reader, the reader is able to determine who the bearer is and whether they have authorized access. The passive proximity device has no active electronics; it is just a small magnet. A fieldpowered proximity device has electronics that activate when the device enters a specific magnetic field [see section 1.4 heading “Radio frequency identification (RFID)”]. A transponder proximity device is self-powered and transmits a signal received by the reader. This can occur continuously or only at the press of a button.

A

Proximity reader (Sensors)

30
Q

is a device that senses movement or sound in a specific area. Many types of motion detection exist, including infrared, heat, wave pattern, capacitance, photoelectric, and passive audio. The proper technology of motion detection should be selected for the environment where it will be deployed to minimize false positives and false negatives.

A

Moisture detection (Sensors)

31
Q

See section 1.4 headings “Radio frequency identification (RFID)” and “Near-field communication (NFC)” as well as section 2.4 heading “Smart card authentication.”

A

Cards (Sensors)

32
Q

See section 2.6 heading “Heating, ventilation, air conditioning (HVAC).”

A

Temperature (Sensors)

33
Q

See section 2.6 heading “Aircraft.”

A

DRONES/UAV

34
Q

Visitor logs are a manual or automated list of non-employee entries or access to a facility or location. Employee logs may also be useful for access tracking and verification. Logs of physical access should be maintained. These can be created automatically through the use of smart cards or manually by a security guard. The physical access logs establish context for the interpretation of logical logs. Logs are helpful in an emergency to determine whether everyone has escaped a building safely.

A

VISITOR LOGS

35
Q

An enclosure that blocks or absorbs electromagnetic fields or signals.

A

FARADAY CAGES

36
Q

An air gap is when there is no physical communication pathway (wired or wireless) between devices or networks. Air gaps are a network segmentation and isolation technique.

A

AIR GAP

37
Q

An extension of a private network where Internet users can access services such as the web and email to provide controlled public access to company resources while still allowing internal clients to access the services. See section 3.3 heading “Screened subnet (previously known as demilitarized zone).”

A

SCREENED SUBNET/DEMILITARIZED ZONE (DMZ)

38
Q

The means by which cables are protected against unauthorized access or harm.

A

PROTECTED CABLE DISTRIBUTION/PROTETED DISTRIBUTION SYSTEM (PDS)

39
Q

protected locations in a facility where access is restricted to only specifically authorized personnel.

(Page 219).

A

SECURE AREAS

40
Q

An air gap is when there is no physical communication pathway (wired or wireless) between devices or networks. Air gaps are a network segmentation and isolation technique.

A

Air gap (SECURE AREAS)

41
Q

A permanent safe or strongroom that is integrated into a building’s construction.

A

Vault (SECURE AREAS)

42
Q

A movable secured container that is not integrated into a building’s construction. Any portable device or removable media containing highly sensitive information should be kept locked securely in a safe when not in active use.

A

Safe (SECURE AREAS)

43
Q

A means of maintaining optimum operating temperature in large server rooms.

A

Hot/Cold aisle (SECURE AREAS)

44
Q

Focuses on the secure disposal and destruction of storage media and printed material.

A

SECURE DATA DESTRUCTION

45
Q

Burning or incineration can be an effective means to destroy paperwork as well as media storage devices.

A

Burning (SDD)

46
Q

Shredding is the tearing or cutting of media into small pieces. Shredding can be an effective destruction technique for both paperwork and media storage devices; however, different equipment will be needed for these two techniques.

(Page 218).

A

Shredding (SDD)

47
Q

Pulping is a paperwork destruction process that involves shredding paper and mixing it with a liquid to create a fibrous mush.

A

Pulping (SDD)

48
Q

Pulverizing is a means of device destruction that goes beyond the shredding level to a point where the devices are reduced to fragments or powder.

A

Pulverizing (SDD)

49
Q

Degaussing is a means of media storage device data destruction using strong magnetic fields. It is effective only on magnetic media, such as hard drives and tapes; it is not effective on other forms of media, such as optical discs, SSDs, and flash memory cards.

A

Degaussing (SDD)

50
Q

There are third-party solutions or services that will perform paperwork and media destruction on site or off site.

A

Third-party solutions (SDD)