Chapter 7 Flashcards
Explain key bumping.
Key bumping involves using a separate key with even bitting to open a lock by causing pins to jump.
Describe cylinder pulling technique.
Cylinder pulling involves using a hardened screw attached to a handle to rip the cylinder from the lock.
What is Boolean Logic used for in electrified locking systems?
Boolean Logic in electrified locking systems sets rules for operations like ‘if door A is locked, and door B is locked, then door C can be opened.’
Explain the process of jamb peeling.
Jamb peeling involves removing portions of the jamb to disengage the bolt from the strike, like using a crowbar.
Define loiding in the context of physical access control.
In Btwn the S and the LB to….
Loiding is inserting a thin item between the strike and the latch bolt to pry the door open.
Describe the technique of drilling in lock opening.
Drilling is using a drill to modify the shear line and open the lock, followed by turning the lock plug.
What is Physical Access Control (PAC) designed to permit?
It is designed to permit only authorized users and vehicles to enter and exit a site, area, building, or room.
How may an adversary defeat an access control point according to the notes?
An adversary may employ deceit, physical attack, or a technical attack.
What are the forms of credentials for Electronic Access Control (EAC) systems?
Something you know,
something you have,
something you do, and
something you are.
Why should a PIN code not be a number that is meaningful to the individual?
To prevent easy guesses or potential security breaches.
What is one million combinations possible for according to the notes?
A 6-digit PIN code, which has one million combinations.
What should be collected prior to employee separations?
All access cards and key fobs should be collected.
What is the concept of Fail Secure?
The lock will remain locked under any failure condition.
Explain the Fail Soft concept in lock systems.
The lock operates briefly after a failure before going into fail secure mode.
Describe Electromagnetic Locks.
They use powerful electromagnets to secure doors or gates.
What is the typical mounting location for Electromagnetic Locks?
Typically mounted at the head of a door but can also be on the side.
What is the purpose of a request to exit button in Electromagnetic Locks?
It usually has an automated egress feature or a single-press button for egress.
What level of holding force should an Electromagnetic lock have?
At least 1,200 pounds (544 kg) of holding force.
Why are Electromagnetic locks recommended to be fail-safe?
To remain unlocked during power failures; higher security may require backup power.
What are Electromechanical locks?
Access control locks that do not use magnets but use breakaway strikes.
Explain Electric Strike.
It operates with a S M L to H______ or o____ the door
It operates with a standard mechanical lock to hold or open the door.
What is an Electric Latch in terms of functionality?
A S-a be la that closes by…….
A solenoid-activated beveled latch that closes by pushing the door.
Describe an Electric Deadbolt.
The O E L D, not commonly used for A D O during fires.
The oldest electrical locking device, not commonly used for automatic door opening during fires.
What is an Electric Lockset?
A regular mortise lockset that has been electrified to control handle turning.
What are Electronic Crash/Panic Bars used for?
Exit devices on high-occupancy doors with a delayed egress function.
How are codes and standards in building construction governed?
Governed by the Authority Having Jurisdiction (AHJ) and codes like the International Building Code (IBC).
What did the International Building Code (IBC) replace?
It replaced the Uniform Building Code for standardization and safety in building construction.
What is a Photo Identification Badge?
A badge requiring manual check comparing the person to the photo on the badge.
What technology (3) makes forgeries difficult for Photo Identification Badges?
Only heroes defend
Only Heroes Defend”
• Only → Overlays
• Heroes → Holograms
• Defend → Dye Sublimation
How does an Exchange Badge work for access control?
An officer exchanges the badge at the checkpoint, which then opens the portal.
What is a Stored Image Badge?
A credential where a security officer compares the image on the screen to the person.
What 6 features can be included in Coded Credentials?
T
D
U U N
A-P B F
In
Au
• T - Time
• D - Date
• U - Unique User Number
• A - Anti-Pass-Back Feature
• I - Interfaces
• A - Auditing
How do Barcodes work for authentication?
They use a series of readable lines but are not suitable for high security applications.
What type of data is encoded on Magnetic Stripe credentials?
Data is encoded on the magnetic stripe of the card.
What distinguishes Low coercivity magnetic cards from High coercivity cards?
Low - ______ oersteds (credit cards)
High - _____ to ______ oersteds (security applications)
Low coercivity - 300 oersteds (credit cards), High coercivity - 2500 to 4000 oersteds (security applications).
What can alter the contents of the magnetic stripe on cards?
Rare earth magnets, but not common household magnets.
What is Weigand Wire used for in access control?
It stores data and has become an industry standard for data protocol.
How do Proximity cards emit frequencies when used for access control?
The have E M that E F when near the reader.
They have embedded microprocessors that emit frequencies when near the reader.
What are the different frequencies used by Proximity cards?
Low frequency _____khz
High frequency _____mhz to ____GHz
Low frequency (125 kHz) and high frequency (2.5 MHz to 1 GHz).
What distinguishes Active card readers from Passive card readers?
Active readers transmit RF signals continuously and have a battery, while passive readers detect and power the card.
What are Dual/Triple Technology cards?
Cards with multiple technologies like barcodes and magnetic stripes for added security.
What are the 3 main features of Smart Cards?
Durable and difficult to counterfeit
They store data and have embedded processors,
can be contactless/contact,
How does Near Field Communications (NFC) function as a credential?
It uses a cellular phone as a credential and is becoming more common.
What are the three parts egress can be broken into?
1) Travel to an exit,
2) the exit itself, and
3) the path to a safe area
Which organizations were merged to create the International Building Code (IBC)?
BO__, CBO, SB _ i
BOCA, ICBO, SBCCI
What was the IBC’s greatest area of concern?
The ability to exit a building safely
What is the most commonly used locking system for restricting access?
Traditional lock and key systems
What is the policy driver for the lock program within an organization?
Written policy
Who developed the pin tumbler lock?
Linus Yale developed the pin tumbler lock in the 19th century.
How do pin tumbler locks operate?
Using pins and depth settings aligned by a key.
What security measures do high-security pin-tumbler locks often deploy?
PR, DR and BR measures
High-security pin-tumbler locks deploy pick resistant, drill resistant, and bump resistant measures.
What is the purpose of master keying in locks?
Master keying allows one key to open multiple locks, reducing the number of keys needed.
What is the advantage of reusable cores in locks?
Reusable cores offer a cost-effective solution for key loss or theft.
What is a vulnerability of padlocks?
Vulnerable to L_____ which involves R the S
Mechanical padlocks are susceptible to loiding, which involves releasing the shackle.
How do high-security cylinders enhance security in locks?
High-security cylinders In____ Pi____ using W____ and may have p-R features.
High-security cylinders interlock pins using wards and may have pick-resistant features.
What is the purpose of using facial recognition technology?
To verify identity based on facial characteristics.
What are the challenges faced by Face Geometry biometrics?
Issues include face angle,
lighting,
glasses, and
facial expressions affecting accuracy.
How does Keystroke biometrics identify individuals?
By analyzing typing patterns for computer logon.
What types of biometrics are being tested in addition to facial recognition and keystroke?
Gait, fingernail beds, ear shape, and body odor.
Why should locks not be used as standalone security measures?
They must be used with other physical security measures for effectiveness.
What are the two general types of locks discussed?
Mechanical locks and electrified locks.
What are the functional components of a mechanical lock?
B or L
S or K
TA
K or unlocking D
Bolt or latch,
strike or keeper,
tumbler array,
key or unlocking device.
Why should warded locks not be used in a modern lock program?
They have no security benefit and are outdated.
How do lever locks operate?
Using flat metal levers that interact with a key to withdraw the bolt.
Where are wafer (disk) locks typically found?
In automobiles, utilizing flat tumblers that can be master keyed.
What locks are common on safes and resemble lever locks?
Dial combination locks.
What security measures do wafer locks offer?
They can be designed with double-bitted keys.
What is the purpose of Security Presidential Directive 12 (HSPD-12)?
To standardize access credential cards for all US government agencies.
What standard is the high-security credential card based on?
Federal Information Processing Standard 201 (FIPS 201).
What is the basis of a Personal Identity Verification (PIV) system?
Biometrics.
What are Type I and Type II errors in biometric systems?
Type I: False rejection of an authorized person. Type II: False acceptance of an unauthorized person.
What is the crossover point in a biometric system?
Where the number of false rejections equals the number of false accepts.
Why might a higher security area choose to have higher Type I errors?
To prioritize rejecting unauthorized persons over falsely accepting authorized persons.
What biometric technology measures hand and finger dimensions?
Hand or Finger Geometry.
What is the method fingerprint readers predominantly use to validate identity?
MP
R E and
B on the fingers
Minutia points,
ridge endings, and
bifurcations on the fingers.
How does the eye pattern biometric technology work?
It scans patterns in the eye, like Retina scans using LED light.
What is unique about iris scans compared to other biometric methods?
No physical contact required, making it less likely to transmit illness.
What are some reasons for individuals not being able to use an Iris scanner?
Blindness, dark irises, or dilated pupils in approximately 2 percent of the population.
What does the Voice Pattern biometric technology use to verify access?
Voice characteristics like P, W and RF
It uses voice characteristics like pitch, waveform, and resonant frequencies.