Chapter 7 Flashcards
An adversary may employ these three things.
- deceit, 2. physical attack, 3. a technical attack to defeat an access control point.
The use of ___ such as a turn-style or revolving door should be used to eliminate tailgating
Singe sentry devices
All levels of access should be ___ and entry should be provided on a need-to-access basis.
Periodically reassessed
System design is based on these five things.
- throughput requirements, 2. building and fore codes, 3. integration with other systems, 4. procedural requirements, 5. database management
___ should automatically guarantee admission to secured area.
possession of a credential
The ___ and ___ has become the de facto industry standard.
Weigand signal and Data protocol
What does PIV stand for.
Personal Identity Verification
A ___ system is based on biometrics. Biometrics verify a person’s specific characteristics. In verification mode, a persons initiates the claim of identity. In recognition mode, the equipment attempts to identify the person.
Personal identity Verification (PIV)
___ are a performance indicator of the system. Type 1 error is a false rejection. Type 2 error is a false acceptance. The point where the number of false rejections equals the number a false accepts is called the crossover point.
Error rates
___ check the iris structure of the eye— the colored part of the eye. The scan can be done for 10 to 12 inches away from the scanner’s video camera, so no physical contact is required.
Iris scans
___ have been used for more than 100 years and are still considered to be one of the most reliable means of distinguishing one person from another.
Fingerprint biometrics
___ should not be used as a standalone measure and must be used with other physical security measures to be effective.
Locks
There are two types of locks in general.
- Mechanical locks, 2. Electrified locks
The ___ was used in the WWII era and has no security benefit. It is the oldest type of mechanical lock in use today.
Warded lock
A ___ is based on the number of tumblers (typically 4). Theoretically, 100 dial positions with four tumblers could equal 1,000,000 combinations.
Dial combination
___ were developed in the 19th century by Linus Yale (who also developed the combination lock) and are used in many residential homes and businesses. The are the most commonly used locks.
Pin tumbler locks
Tight tolerances and increasing number of pins, wheels, disks, or levers is the best defense against all forms of ___
Lock manipulation
___ is where the adversary inserts a thin item between the strike and the latch bolt to pry the door open
Loiding
___ is where the locking devices are arranged in sets with defined rules such as; “if door A is locked, and door B is locked, then door C can be opened.” This is a useful design for vehicle portals, mantraps, and other high-security applications.
Boolean Logic
An ___ should have at least 1,200 pounds of holding force, contain no moving parts, and tamper resistant
Electromagnetic lock
The ___ greatest area of concern was the ability to exit a building safely. Egress can be broken into three parts. What are they?
- travel to an exit, 2. the exit itself and, 3. path to a safe area.
___ are still the most commonly used locking systems for restricting access.
Traditional lock and key systems.