Chapter 19: Physical Security Requirements Flashcards

1
Q

What is the purpose of phyiscal security?

A

To protect against physical threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the most common physical threats?

A

fire and smoke, water (rising or falling), earch movement (earthquakes, landslides, volcanoes), storms (wind, lightning, rain, snow, sleet), sabotage and vandalism, explosion or destruction, building collapse, toxic materials, utility loss (power, heating, cooling, air, water), equipment failure, theft, personnel loss (illness, strikes, access, transport).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Secure Facility Plan?

A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Critical Path Analysis?

A

A systematic effort to identify relationships between missin-critical applications, processes,a nd operations and all the necessary supporting elements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are administrative phyiscal security controls?

A

Facility construction and selection, site management, personnel controls, awareness training, and emergency response and procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are technical phyiscal security controls?

A

access controls, intrusion detection, alarms, CCTV, monitoring, heating, ventilating, and air conditioning, power supplies, fire detection and suppression.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are physical controls for physical security?

A

fencing, lighting, locks, construction materials, mantraps, dogs, and guards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the functional order in which controls should be used?

A
  1. Deterrence
  2. Denial
  3. Detection
  4. Delay
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the most important consideration in site selection?

A

Security. This includes susceptibility to riots, vandalism, break ins, location in a high crime area, or environmental factors such as flooding/weather/ fault lines, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the tradeoffs on number of entrances?

A

Single entrances improve security, multiple improve evacuation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What issues should be considered in facility design?

A

Combustibility, fire rating, construction materials, load rating, placement, control of walls, doors, ceilings, flooring, HVAC, power, water, sewage, gas.

Forced intrusion, emerency access, resistance to entry, direction of entries and exits, use of alarms and conductivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How should work areas be laid out with regards to asset value?

A

Higher value assets should have more restricted access. Duh.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How should areas of different sensitivity be separated?

A

Use floor to ceiling walls. If false or suspended ceilings, or raised floors exist, the walls should block those areas as well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Should central server rooms be human-compatible?

A

They don’t have to be. The more incompatible they are, the more protection it offers. Making a room human-incompatible can be accomplished by using Halotron, PyroGen, or other oxygen displacement fire suppression. Also, closely spaced equipment and low or no lighting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Where should server rooms be located?

A

In the center of the building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What risk exists if visitors are not tracked?

A

Not tracking visitors when they are allowed into a protected area can result in malicious activity against the most protected assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How tall should a fence be to discourage casual trespassers?

A

3-4 feet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How tall should a fence be to discourage most intruders?

A

6-7 feet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How tall should a fence be to deter determined intruders?

A

8 feet with 3 strands of barbed wire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a gate?

A

A controlled entry point in a fence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the design considerations of a gate?

A

It’s deterrent level must be the same as the fence to sustain its effectiveness. Hinges and locking mechanisms may need to be hardened against tampering. Keep the number of gates to a minimum.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a turnstile?

A

A form of gate that only allows one person to enter at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a mantrap?

A

A set of double doors often protected bya guard taht prevents piggybacking and can trap individuals at the discretion of security personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How should lighting be designed?

A

It shouldn’t highlight the positions of guards, dogs, patrol posts, or other similar security elements. It should be combined with those elements. It shouldn’t be a nuisance to neighbors, and shouldn’t cause a glare or distraction to security elements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is an alternative to security guards?

A

Dogs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are the trade offs to using dogs vs guards.

A

Guards are extremely effective, but costly and require a high level of mainenance. They also impose insurance and liability requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are preset locks?

A

Typical key based locks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is shimming?

A

An attack on key-basd locks. Picking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are the types of motion detectors?

A

Infrared, heat-based, wave pattern, capacitance, photoelectric, and passive audio.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

How does an infrared motion detector work?

A

It monitors for significant or meaningful changes in the infrared lighting pattern of a monitored area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

How does a heat-based motion detector work?

A

It monitors for significant or meaningful changes in the heat levels or patterns of a monitored area.

32
Q

How does a wave pattern motion detector work?

A

It transmits a constant low ultrasonic or high microwave frequency signal into the monitored area and monitors for changes or disturbances in the reflected pattern.

33
Q

How does a capacitance motion detector work?

A

It senses changes in the electrical or magnetic field surrounding a monitored object.

34
Q

How does a photoelectric motion detector work?

A

It sense changes in visible light levels for the monitored area. Usually deployed in internal rooms that are kept dark.

35
Q

How does a passive audio motion detector work?

A

It listens for abnormal sounds in the monitored area.

36
Q

What are the different types of intrusion alarms?

A

deterrent, repellant, notification

37
Q

What are the different location types of intrusion alarms?

A

Local, central/proprietary, auxilary.

38
Q

What is secondary verification?

A

Another method to determine if an alarm is false. For example, CCTV coverage of an area with motion detectors.

39
Q

What is a smart card?

A

A credit-card sized ID, badge, or security pass with an embedded magnetic strip, bar code, or IC.

40
Q

What is a proximity reader?

A

A passive, field powered device, or a transponder that reads a smart card to control access.

41
Q

List the different access abuses we need to look for.

A

Propping open doors, bypassing locks, masquerading, piggybacking.

42
Q

What is TEMPEST?

A

Intercepting electronic signals from equipment to gain information.

43
Q

How do you defeat TEMPEST?

A

Use a faraday cage to control signal propagation, broadcast white noise to mask or hide the presence of real emanations, or implement a control zone, which is just a smaller faraday cage.

44
Q

What should the priority of physical security be?

A

Protecting human life, then restoring the safety of the environment, then restoring utilities necessary for IT infrastructure.

45
Q

What is a UPS?

A

A self-charging battery that can be used to supply consistent, clean power to sensitive equipment.

46
Q

What is a power fault?

A

A momentary loss of power.

47
Q

What is a blackout?

A

A complete loss of power.

48
Q

What is a (power) sag?

A

A momentary low voltage.

49
Q

What is a brownout?

A

Prolonged low voltage.

50
Q

What is a (power) spike?

A

Momentary high voltage.

51
Q

What is a (power) surge?

A

Prolonged high voltage.

52
Q

What is a (power) inrush?

A

An initial surge of power usually associated with connecting to a power source.

53
Q

What is (power) noise?

A

A steady interfering power disturbance or fluctuation.

54
Q

What is a (power) transient?

A

A short duration of line noise disturbance.

55
Q

What is clean power?

A

Nonfluctuating, pure power.

56
Q

What is a ground?

A

The wire in an electrical circuit that is grounded.

57
Q

What are the two types of electromagnetic interference?

A

Common mode and transverse mode.

58
Q

What is common mode electromagnetic interference?

A

Noise generated by a difference in power between the hot and ground wires of a power source or operating electrical equipment.

59
Q

What is transverse mode electromagnetic interference?

A

Generated by a difference in power between the hot and neutral wires of a power source or operating electrical equipment.

60
Q

What is RFI?

A

Radio Frequency Interference

61
Q

What causes RFI?

A

A wide range of common electrical appliances, such as lights, electrical cables, space heaters, computers, elevators, motors, electric magnets.

62
Q

Within what limits should rooms intended to house computers be kept?

A

60-75F, 40-60 % humidity.

63
Q

Fire triangle?

A

Dubious p 767

64
Q

What is the cause of most data center fires?

A

Overloaded electrical distribution outlets

65
Q

What is a class A fire extinguisher for?

A

Common combustibles

66
Q

What is a class B fire extinguisher for?

A

Liquids

67
Q

What is a class C fire extinguisher for?

A

Electrical

68
Q

What si a class D fire extinguisher for?

A

Metals

69
Q

What is the suppression material in a class A fire extinguisher?

A

Water, soda acid

70
Q

What is the suppression material in a class B fire extinguisher?

A

CO2, halon, soda acid

71
Q

What is the suppression material in a class C fire extinguisher?

A

CO2, halon

72
Q

What is the suppression material in a class D fire extinguisher?

A

Dry powder

73
Q

What are the four main types of water suppression systems?

A

wet pipe, dry pipe, deluge, preaction

74
Q

What is a wet pipe water suppression system?

A

One that is always full of water. Immediate discharge.

75
Q

What is a dry pipe water suppression system?

A

One containing compressed air. When triggered, a water valve opens that then fills the pipes.

76
Q

What is a deluge water suppression system?

A

A dry pipe system that uses larger pipes and therefore delivers a significantly larger volume of water. Inappropriate for areas containing IT systems.

77
Q

What is a preaction suppression system?

A

A combination dry/wet pipe system. It’s dry until the initial stages of a fire, but doesn’t trigger until a head is melted by heat. Can manually stop release.