Chapter 13: Security Flashcards

1
Q

Asset

A

An employee, contractor, or any physical, technological, or intellectual possession.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Compartmentalization

A

The isolation or segregation of assets from threats using architectural design or countermeasures, including physical barriers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Countermeasures

A

The procedures, technologies, devices, or organisms (dogs, humans) put into place to deter, delay, or detect damage from a threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Layering

A

The use of many layers of barriers, other countermeasures, or a mixture of both is used to provide the maximum level of detterance and delay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threats

A

The agents by which damage, injury, loss, or death can occur; threats are commonly classified as originating from temperature extremes, liquids, gases, projectiles, organisms, movement, or energy anomalies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Vulnerability

A

A physical, procedural, or technical weakness that creates an opportunity for injury, death, or loss of an asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a data center security plan?

A

The security plan is a document providing the framework, policies, and procedures to establish security for data center staff, contractors, and visitors along with the ITE, network technology, telecom assets, and the sites and buildings that house them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What should be included in the data center security plan?

A
  • Physical Security
  • IT/ cyber security
  • Disaster recovery plan
  • Emergency operation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Give three examples of regulatory and legal documents affecting the operation of the data center.

A
  • Sarbanes-Oxley
  • Industry-specific standards
  • Federal Information Processing Standards (FIPS)
  • Health Insurance Portability and Accountability Acts (HIPAA)
  • National Association of Security Dealers Conduct Rules 3010, 3013, and 3110
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

__________ is the isolation or segregation of assets from threats using architectural design or countermeasures, including physical barriers.

A

Compartmentalization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is CPTED?

A

The crime-reducing concepts and strategies of Crime Prevention Through Environmental Design (CPTED)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three underlying principles of CPTED?

A
  • Natural access control
  • Natural surveillance
  • Territorial enforcement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Regarding CPTED, what is a private space type?

A

Spaces that are restricted from most pedestrians, including unauthorized employees. Typical private areas might include print rooms, call centers, private manager offices, a bank vault, a surgery site, and the executive floor of an office tower.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Identify one way proper lighting may be a security measure.

A
  • It prevents concealment for unauthorized access to the data center site or buildings
  • It protects the safety of pedestrians, vehicles, and assets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the three types of physical access control?

A

Type 1: What a person has (keys, cards)
Type 2: What a person knows (passwords)
Type 3: What is person is (fingerprints, iris recognition)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Give an example of a multifactor authentication to sensitive areas of a data center.

A
  • A two-factor authentication scheme for the computer room where both fingerprint scan and proximity card are required to enter.
  • A three-factor authentication scheme for any critical facility area would be a proximity card, fingerprint scan, and entry of a valid work order ticket number for the specific area.
17
Q

What are electrified locksets?

A

Locksets are locked and unlocked remotely and are commonly layered and integrated with other systems in the electronic access control system.

18
Q

What is a fail-safe lock?

A

A fail-safe lock is one in which the locking mechanism unlocks under any failure condition.

19
Q

Which strategy should be utilized when attempting to maintain security during normal operation, loss of power, and emergency conditions?

A

Combinations of more than one lock type should be utilized when attempting to maintain security during normal operation, loss of power, and emergency conditions.

20
Q

When using cipher lock combinations, what is the maximum time allowed without changing the combination?

A

90 days

21
Q

What should automated EAC systems record?

A
  • Entry and exit times
  • Identification of the entrant
  • Authorization mechanism
  • Location (and direction if applicable) of access.
22
Q

What is the role of an anti-passback feature on electronic card access systems?

A

This feature should only permit one entry without accompanying exit. When activated, this feature should not interfere with normal and authorized movement within the data center or computer room but limit the ability of more than one employee, contractor, or visitor to use the card for the same ingress or egress.

23
Q

What is the “two-man rule”?

A

When a restricted room or area is empty, two authorized persons must use their access cards within a specific period (typically 45 seconds) or entry is denied and a log entry or some sort of notification was made.

24
Q

What are the two types of surveillance employed by security?

A

Physical and technical

25
Q

What is technical surveillance?

A

The use of electronic equipment, typically cameras and other elements of video surveillance systems, to afford central monitoring of multiple locations.

26
Q

Barriers are one of the most common security measures. What are the types of penetration for which barriers should be used?

A
  • Force
  • Deception or stealth
  • Accident
27
Q

What is the thickness of concrete walls that are found in the construction of blast resistant benkers?

A

Greater than 200 mm (8 “)

28
Q

Why are fences not to be considered permanent barriers to forced entry?

A

They introduce delay but not prevention and should be layered with other countermeasures like alarms, surveillance, and guards.

29
Q

Expanded metal fabric consists of sheets of metal (Carbon, galvanized, stainless steel, aluminum, and others) that have been cut or shaped and somewhat flattened or thinned to create metal barriers. What are the four acceptable styles of metal barriers?

A
  1. Standard
  2. Grate or diamond plate
  3. Flattened
  4. Architectural
30
Q

What is the minimum total thickness requirement for burglar-resistant windows?

A

6mm (0.25”) plus 60 mil vinyl film “sandwiched” between the glass.

31
Q

What phases of emergency are included in a data center disaster recoveryplan?

A

Phase 1: Planning
Phase 2: Pre-disaster/incident activities
Phase 3: The disaster/incident
Phase 4: Response
Phase 5: Recovery from the disaster/incident

32
Q

What is compartmentalization?

A

The isolation or segregation of assets from threats using architectural design or countermeasures, including physical barriers.

33
Q

Natural access control, nature surveillance, and territorial enforcement are underlying principles of what concept?

A

Crime Prevention Through Environmental Design (CPTED)

34
Q

These are locked and unlocked remotely and are commonly layered and integrated with other systems in the electronic access control system.

A

Electrified locksets

35
Q

Entry and exit times and identification of the entrant are two pieces of information that should keep a record of in __________.

A

EAC systems

36
Q

True or False: The anti-passback feature in electronic card access systems allows no more than two people entrance to a given area at once.

A

False

37
Q

__________ is the use of electronic equipment, typically cameras and other elements of video surveillance systems, to afford central monitoring of multiple locations.

A

Technical surveillance