Chapter 19: Physical Security Requirements Flashcards
What is the purpose of phyiscal security?
To protect against physical threats.
What are the most common physical threats?
fire and smoke, water (rising or falling), earch movement (earthquakes, landslides, volcanoes), storms (wind, lightning, rain, snow, sleet), sabotage and vandalism, explosion or destruction, building collapse, toxic materials, utility loss (power, heating, cooling, air, water), equipment failure, theft, personnel loss (illness, strikes, access, transport).
What is a Secure Facility Plan?
.
What is Critical Path Analysis?
A systematic effort to identify relationships between missin-critical applications, processes,a nd operations and all the necessary supporting elements.
What are administrative phyiscal security controls?
Facility construction and selection, site management, personnel controls, awareness training, and emergency response and procedures
What are technical phyiscal security controls?
access controls, intrusion detection, alarms, CCTV, monitoring, heating, ventilating, and air conditioning, power supplies, fire detection and suppression.
What are physical controls for physical security?
fencing, lighting, locks, construction materials, mantraps, dogs, and guards.
What is the functional order in which controls should be used?
- Deterrence
- Denial
- Detection
- Delay
What is the most important consideration in site selection?
Security. This includes susceptibility to riots, vandalism, break ins, location in a high crime area, or environmental factors such as flooding/weather/ fault lines, etc.
What are the tradeoffs on number of entrances?
Single entrances improve security, multiple improve evacuation.
What issues should be considered in facility design?
Combustibility, fire rating, construction materials, load rating, placement, control of walls, doors, ceilings, flooring, HVAC, power, water, sewage, gas.
Forced intrusion, emerency access, resistance to entry, direction of entries and exits, use of alarms and conductivity.
How should work areas be laid out with regards to asset value?
Higher value assets should have more restricted access. Duh.
How should areas of different sensitivity be separated?
Use floor to ceiling walls. If false or suspended ceilings, or raised floors exist, the walls should block those areas as well.
Should central server rooms be human-compatible?
They don’t have to be. The more incompatible they are, the more protection it offers. Making a room human-incompatible can be accomplished by using Halotron, PyroGen, or other oxygen displacement fire suppression. Also, closely spaced equipment and low or no lighting.
Where should server rooms be located?
In the center of the building.
What risk exists if visitors are not tracked?
Not tracking visitors when they are allowed into a protected area can result in malicious activity against the most protected assets.
How tall should a fence be to discourage casual trespassers?
3-4 feet
How tall should a fence be to discourage most intruders?
6-7 feet
How tall should a fence be to deter determined intruders?
8 feet with 3 strands of barbed wire
What is a gate?
A controlled entry point in a fence.
What are the design considerations of a gate?
It’s deterrent level must be the same as the fence to sustain its effectiveness. Hinges and locking mechanisms may need to be hardened against tampering. Keep the number of gates to a minimum.
What is a turnstile?
A form of gate that only allows one person to enter at a time.
What is a mantrap?
A set of double doors often protected bya guard taht prevents piggybacking and can trap individuals at the discretion of security personnel.
How should lighting be designed?
It shouldn’t highlight the positions of guards, dogs, patrol posts, or other similar security elements. It should be combined with those elements. It shouldn’t be a nuisance to neighbors, and shouldn’t cause a glare or distraction to security elements.
What is an alternative to security guards?
Dogs.
What are the trade offs to using dogs vs guards.
Guards are extremely effective, but costly and require a high level of mainenance. They also impose insurance and liability requirements.
What are preset locks?
Typical key based locks.
What is shimming?
An attack on key-basd locks. Picking.
What are the types of motion detectors?
Infrared, heat-based, wave pattern, capacitance, photoelectric, and passive audio.
How does an infrared motion detector work?
It monitors for significant or meaningful changes in the infrared lighting pattern of a monitored area.