9) Physical Security Flashcards
Security guards and guard dogs are a part of which type(s) of physical security controls?
a) Detective
b) Environmental
c) Preventive
d) Deterrent
a) Detective
c) Preventive
d) Deterrent
Which storage media is least sensitive to temperature, humidity, magnetic fields, and impacts?
a) Floppy disks
b) Optical media
c) Magnetic media
d) Flash media
d) Flash media
The top three safety concerns for an organization are prioritized and one criterion is the relative ease of replacement. The first concern is always ___, followed up with ___, and then ___.
Choose from data, equipment, and people.
people, data, equipment
Deterrent, detective, and preventive security controls, when used in isolation, are not a complete solution. To have a stronger, more complete solution, we need to use ___.
a) defense in depth
b) RAID
c) environmental controls
d) CIA
a) defense in depth
A type of security that is concerned with the protection of people, equipment, and data.
Physical security
The plans we put in place to ensure that critical business functions can continue operations in the event of an emergency.
BCP
BCP is the plans we put in place to ensure that critical business functions can continue operations in the event of an emergency. What does BCP stand for?
Business continuity planning
The plans we put in place in preparation for a potential disaster, and what exactly we will do during and after.
DRP
DRP is the plans we put in place in preparation for a potential disaster, and what exactly we will do during and after. What does DRP stand for?
Disaster recovery planning
The devices, systems, people, and other methods we put in place to ensure our security in a physical sense.
Physical security controls
Name three main types of physical controls.
Deterrent, detective, and preventive
Controls designed to discourage those who might seek to violate our security controls.
Deterrent controls
Controls designed to detect and report undesirable events that are taking place.
Detective controls
Controls designed to physically prevent unauthorized entities from breaching our physical security.
Preventive controls
Data that is unintentionally left behind on a storage device.
Residual data