Chapter 11: Electronic Security Systems Flashcards

1
Q

What are the components of a full-featured access control system?

A

A credential reader, communication cabling, distributed processor, central database, software, supplementary interfaces to external systems and applications for request to exit devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is personnel access control?

A

the portion of an access control system used to authorize entry and to verify the authorization of personnel seeking entry to a controlled area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is single factor authentification?

A

When one identification is required for access authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is dual factor authorization?

A

When two forms of identification are required for access authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is it called when three forms of identification are required for access authorization?

A

Three factor Authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some ways to defeat access control points?

A
  1. Deceit
  2. Direct Physical Attack
  3. Technical Attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How can an adversary use deceit to defeat an access control point?

A

By using false pretenses to convince security personnel or an employee to permit entry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some way that an adversary can use direct physical attack to defeat an access control point?

A

Through force and the use of tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can an adversary defeat an access control point by using a technical attack?

A

forging a credential or guessing or obtaining pass codes or pins.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What types of measures are used to determine who is allowed access to a facility and who to deny?

A
  1. credentials or other items in a person’s possession (such as metal key; a proximity device, chip embedded insertion card, magnetic stripe card; or a photo identification card
  2. private information known by the individual (password or pin)
  3. biometric features of the person. (fingerprint, hand geometry, iris and retinal patterns, signature, or speech patterns) this provides the highest levels of security.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a comprehensive access control system designed to do?

A
  1. Permit only authorized personnel and vehicles to enter and exit.
  2. Provide ability to audit compliance with access control policies.
  3. Detect and prevent the entry of contraband material.
  4. Detect and prevent the unauthorized removal of assets.
  5. Provide information to ensure the timely assessment and response to events categorized as exceptions or alarms conditions.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a PIN numer?

A

a Personal Identification Number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some weaknesses associated with the use of pin numbers?

A
  1. An individual could pass the PIN and credential to an unauthorized individual
  2. The PIN could be observed surreptitiously by an adversary (Shoulder Surfing)
  3. The PIN could be obtained by coercion.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How many possible PIN combinations are there in a four digit PIN?

A

10,000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some examples of the types of credentials used in access control?

A
  1. photo identification badges
  2. exchange badges
  3. stored-image badges
  4. coded credentials
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What types of credentials require a high degree of vigilance from security?

A
  1. photo identification badges
  2. exchange badges
  3. stored-image badges
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are some weaknesses of a photo identification badge?

A
  1. a false photo identification badge can be made
  2. the individual can make up his or her face to match the face on a stolen badge.
  3. Guard inattentiveness
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is an exchange badge sytem?

A

a system that requires matching badges be held at each access point. When an employee presents a badge and requests entry, a guard compares the individual to the one on the corresponding exchange badge held at the access point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a positive aspect of the exchange badge system?

A

The actual credential, with access, is never allowed to leave the facility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a negative of the exchange badge system?

A

Someone can make up their face to match the face on the credential.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a stored image badge?

A

This is a system that requires a guard to verify an individual’s identity based on visual characteristics of a stored image.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a stored image badge system susceptible to?

A

The use of makeup as a disguise,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the most common techniques for coding a badge?

A
  1. Magnetic Stripe
  2. Wiegand Wire
  3. bar codes
  4. proximity
  5. smart cards.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Where is magnetic stripe encoding typically used?

A

In credit and debit card systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

How does Magnetic Stripe Encoding work?

A

A strip of magnetic material is located along edge of the badge and is encoded with data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

How is the data on a magnetic strip encoding read?

A

It is read when the magnetic strip is moved through or inserted into a magnetic reader.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

WHat is coercivity?

A

The measure of the resistance of a magnetic material to changes in the stored information when exposed to magnetic field.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the unit of magnetic intensity used to describe the coercivity?

A

The Oersted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are the two types of oersted used in cards?

A

300 oersted- used in credit cards
2,500 to 4,000 oersted- used in security credential applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which oersted magnetic strip is unlikely to get accidently erased?

A

The 2,500 to 4,000 oersted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

True or False. Credential Forgery is relatively easy to use on magnetic strips?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Is the Wiegand Wire Technology still in use?

A

No.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

IS the Wiegand Data Protocol still in common use?

A

Yes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is the Open Supervised Device Protocol (OSDP)?

A

The OSDP is an access control communication protocol that improves interoperability among access control and security products.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

When was the OSDP standard adopeted.

A

In 2020 it was adopted by the Security Industry Association (SIA) after it became the international IEC standard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is a proximity badge?

A

A card whose information can be read without the badge being physically placed into a reader device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is the major weakness of proximity cards?

A
  1. An attacker with an RFID tool can intercept, read, and copy the proximity cards that are not as secure.
  2. readers with compromised firmware allow attacker to compromise what information is stored in the reader.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What are the frequency ranges are proximality cards?

A

125 kHz for low-frequency badges
2.5 MHz to over 1 GHz for high frequency badges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What are the types of smart cards?

A
  1. contact
  2. contactless (RF)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

How do contactless smart cards communicate?

A

Through RF

41
Q

What is the memory size of most smart cards?

A

8 kb to 64 kb

42
Q

What does NFC stand for ?

A

Near Filed Communications

43
Q

What is the most widely used method of controlling physical access?

A

locks.

44
Q

Locks can be divided into what two general classes?

A
  1. those that operate on purely mechanical principles
  2. those that combine electrical energy with mechanical operations and are commonly associated with automated access control systems.
45
Q

What are the two major components of a mechanical lock?

A

the coded mechanism and the fastening device.

46
Q

What is the coded mechanism in a mechanical lock?

A

a key cylinder in a key lock or a wheel pack in a mechanical combination lock.

47
Q

What is the fastening device in a mechanical lock?

A

a latch or bolt assembly.

48
Q

How does a latch react when the door closes?

A

It automatically retracts.

49
Q

How does a bolt react?

A

A bolt stays in the same position unless it is intentionally moved.

50
Q

Which is more secure, a latch or a bolt?

A

Bolt.

51
Q

How can you make a bolt more secure?

A

ensure that it extends beyond the door edge at least one inch.

52
Q

What are the functional assemblies of components of a mechanical lock?

A
  1. the bolt or latch that actually holds the movable part (door, window, etc.) to the immovable part (jamb, frame, etc.)
  2. the keeper or strike into which the bolt or latch fits (not an integral part of the lock mechanism but a secure housing for the bolt when in a locked position.
  3. The tumbler array, which is the barrier or labyrinth that must be passed to move the bolt.
  4. The key or unlocking device, which is specifically designed to pass the barrier and operate the bolt.
53
Q

What are the primary types of mechanical locks?

A
  1. Warded Locks
  2. Lever Locks
  3. Pin Tumbler Locks
54
Q

What is a warded lock?

A

The mechanical lock longest in use. It features an open, see-through keyway and the long, barrel-like key

55
Q

Where are Warded locks typically found?

A

older homes, farm buildings, and older inns.

56
Q

What is the greatest weakness of Warded Locks?

A

Its vulnerability to spring manipulation by any key that is not stopped by the wards and corrosion due to weathering and age.

57
Q

True or False. A well planned, modern locking program can include Warded Locks.

A

False.

58
Q

If Warded locks are present, what should you do?

A

Plan for phased replacement or augmentation with other locks.

59
Q

Describe a lever lock.

A

A lock that features levers that are flat pieces of metal held to a common pivot and retained in place inside the lock case by the tension of the spring wire.

60
Q

Where are Lever Locks used today?

A

Desks, Cabinets, locker, bank safe deposit boxes, and U.S. Mailboxes.

61
Q

What is a weakness of Lever Locks.

A

It is inherently susceptible to picking.

62
Q

When was the pin tumbler lock developed and by who?

A

Linus Yale in the 19th century.

63
Q

What is the most widely used lock in the United States?

A

The pin tumbler lock.

64
Q

Where are pin tumbler locks typically used?

A

exterior and interior building doors.

65
Q

What is the principle of master keying?

A

a single lock may be operated by more than one key by designing various keys to engage or work on different tumblers or different aspects of the same tumblers.

66
Q

What are the major security difficulties with master keying?

A
  1. master key accountability must be maintained.
  2. Additional positions or possibilities are presented for surreptitiously unlocking
  3. increased maintenance.
67
Q

What are the security vulnerabilites of mechanical locks?

A
  1. attack by force.
  2. Surreptitious attack
  3. attack by impression-making and “try keys”
68
Q

What is Attack by Force in relation to locks?

A

separating the door or movable element from the jamb or immovable element; removing the lock from its housing and exposing the bolt to manual manipulation; or snapping pin tumblers to turn the plug freely.

69
Q

What is an example of a surreptitious attack in relation to locks?

A

picking, raking, bumping, or mechanical manipulation due to engineering flaws or vulnerabilities with various specialty locksmith tools.

70
Q

What is an example of an attack by impression-making and “try keys”?

A

by inserting a key blank that has been designed for a particular keyway into the lock before any biting cuts have been made, it may be possible, by applying turning pressure, to make faint marks on the key blank. “Try keys” or “jingle keys” are key blanks that are correctly milled to fit the particular keyway and that contain random biting. Insertion in the keyway and combined turning and raking movements may cause the lock to open.

71
Q

What do electrified locks allow?

A

doors to be locked and unlocked by a remote device.

72
Q

What is a fail safe lock?

A

A lock that will unlock when the power goes out.

73
Q

What is a fail secure lock?

A

a lock that will stay locked when the power goes out.

74
Q

What are the primary types of electrified looking mechanisms?

A
  1. Electric Deadbolt
  2. Electric Latch
  3. Electric Strike
  4. Electric Lock Set
  5. Exit Device
  6. Electromagnetic Lock
75
Q

How does an electric deadbolt work?

A

A solenoid (electromagnet) moves a deadbolt, typically mounted on a doorframe, wither into or out of a strike plate on a door.

76
Q

Should an electric deadbolt be used on a door that automatically unlocks during a fire?

A

No.

77
Q

Why shouldn’t an electric deadbolt be used on a door that needs to open during a fire?

A

People can push on the door, causing tension on the deadbolt which could cause it not to unlock.

78
Q

What is another name for an exit device?

A

panic bar or crash bar

79
Q

What does Homeland Security Presidential Directive 12 (HSPD12) require?

A

Directs the entire Federal Government and all contract agencies to use a single, high security credential.

80
Q

What is UL 294, 7th Edition?

A

The UL standard for access control system units and is used to evaluate the construction, performance, and operation of access control systems.

81
Q

What year was the International Building Code adopted?

A

2000

82
Q

What is the IBC?

A

International Building Code

83
Q

Who publishes the IBC?

A

The International Code Council

84
Q

What is the acronym for the International Code Council?

A

The ICC

85
Q

Where is the IBC primarily used?

A

The United States

86
Q

What other plan is used in the US where the IBC is not used?

A

The NFPA 101 life safety code.

87
Q
A
88
Q

What does NFPA stand for?

A

The National Fire Protection Association.

89
Q

What does ADA stand for?

A

The Americans with Disabilities Act of 1990

90
Q

In what areas, does ADA affect physical security?

A

Access Control and Lifer Safety Systems.

91
Q

In regard to the ADA what is the area of greatest concern and compliance concerning installations?

A

The ability to exit the structure.

92
Q

What are some methods of Contraband Detection?

A
  1. Metal Detectors.
  2. Package Search
  3. Explosives Detection
  4. Chemical and Biological Agent Detection
93
Q

What type of system detects metal

A

Magnetometer

94
Q

What is a magnetometer?

A

A passive device that monitors the earth’s magnetic field and detects changes to that field caused by the presence of ferromagnetic materials.

95
Q

What are ferromagnetic materials?

A

Metals that are attracted to a magnet.

96
Q

What types of metals does a magnetometer not detect?

A

copper, aluminum, and zinc.

97
Q

What are metal detectors used for?

A

To screen entrants to an area to mitigate against firearms and other weapons.

98
Q
A