Chapter 9 Flashcards

1
Q

Where to focus for Physical Security (4 factors)?

A
  • Physical security controls
  • Protecting people
  • Protecting data
  • Protecting equipment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Physical security: What to protect?

A
  1. People
  2. Data
  3. Equipment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Physical threats

A
oExtreme temperature
oGases
oLiquids
oLiving organisms
oProjectiles
oMovement
oEnergy anomalies
oPeople
oToxins
oSmoke and fire
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Physical security controls are…

A

The devices, systems, people, and other methods we put in place to ensure our security in a physical sense.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The 3 types of Physical security controls are…

A
  1. Deterrent
  2. Detective
  3. Preventive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Deterrent Physical security controls:

A

Designed to discourage those who might seek to violate security controls from doing so

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Examples of Deterrent Physical security controls

A

Signs in public places that indicate that video monitoring is in place
oSigns with alarm company logos that we might find in residential areas
oPolicies and regulations
oSecurity measures: guards, dogs, or fences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Detective physical security controls:

A

Serve to detect and report undesirable events that are taking place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What Detective physical security controls monitor:

A

oUnauthorized activity: doors or windows opening, glass being broken
oUndesirable environmental conditions: flooding, smoke and fire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Examples of Detective Physical security controls

A

Burglar alarms
oPhysical intrusion detection system
oHuman or animal guards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Preventive physical security controls:

A

Used to physically prevent unauthorized entities from breaching our physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Examples of Preventive Physical security controls

A

oLocks
oHigh fences
oBollards (prevent vehicles from driving into building)
oGuards and dogs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How we use physical access controls in the real world:

A

Residences: locks

oCommercial facilities: locks, alarm systems, and signs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An important consideration of physical access controls is :

A

What to protect?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The primary concern of physical security is…

A

protecting people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why is protecting people most important?

A

oRecovering data: backup system
oRecovering equipment: buy new equipment
oRecovering experienced people: ?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The _____ __ _____ is the first and foremost concern on physical security

A

safety of people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

When an emergency is taking place, our priority should be the ________

A

evacuation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Evacuation:

Where:

How:

Who:

A

Where: where we will be evacuating too

How: the route we will follow to reach the evacuation meeting place

Who: everyone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Second only to the safety of our personnel is the safety of our ____.

A

data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Second only to the safety of our personnel is the safety of our ____.

A

data

22
Q

One of our primary solutions for protecting data:

A

Encryption

23
Q

Problem with Encryption: Attacks may render it useless by…

A

oBreaking encryption algorithm itself

oObtaining the encryption keys

24
Q

Based on the concept of defense in depth:

oAnother layer: ______ ______

A

physical element

25
Q

Physical concerns for data include…

A

Depending on the type of physical media on which our data is stored.

Such media are often sensitive to temperature, humidity, magnetic fields, electricity

26
Q

Magnetic media:

A
  • hard drives, tapes, or floppy disks
  • Strong magnetic fields can harm the integrity of data
  • Jolting such media while it is in motion
27
Q

Flash media:

A
  • memory chips
  • Electrical shocks
  • Humidity or liquid
28
Q

Optical media:

A
  • CDs and DVDs
  • Small scratches on the surface may render it unusable
  • Very temperature sensitive
29
Q

The availability often depends on both _____ and ______ remaining in functioning condition

A

equipment and facilities

30
Q

Not only can we have issues in reading the data, but we may also have problems in…

A

… getting to where the data is stored.

Outage: network, power, computer systems, or other components

31
Q

Backup:

A

ensure the availability of data

32
Q

oRedundant arrays of inexpensive disks (RAID)
oReplicate data to another machine

Are examples of:

A

Backing up data

33
Q

Residual data:

A

Not only have data available, but also render data inaccessible when it is no longer required

34
Q

Media that stored sensitive data:

A

oComputing-related devices: CD, DVD, flash drives, computers
•Media or device might contain some sensitive data

oOffice equipment: copiers, printers, fax machines
•Copies of the documents that have been processed by drive

35
Q

Last on the list of concerns for physical security is protecting…

A

equipment

It is the easiest and cheapest segment of assets to replace

36
Q

Even in the case of a major disaster, as long as we sill have the _____ needed to operate and restore or access ___, we can be back in working order shortly.

A

people

data

37
Q

Physical security in the real world:

A
Physical controls:
oLocks
oFences
oCameras
oSecurity guards

•Protecting people:
oEvacuation maps
oBackground checks

•Protecting data:
oKeeping backups for data

•Protecting equipment:
oSite selection
oAccess control

38
Q

Protecting people: foremost concern

A

Best step: remove people from dangerous situation (evacuation)

39
Q

Protecting data: second only to protecting people

A

oEnsure availability when it is needed

oEnsure that we can completely delete it when we no longer need it

40
Q

Protecting equipment: the lowest

A

oSite selection
oAccess control
oEnvironmental conditions

41
Q

Which one is not a major concern for physical security

a. Protecting people
b. Protecting equipment
c. Protecting property
d. Protecting data

A

c.Protecting property

42
Q

________ controls are used to physically prevent unauthorized entities from breaching our physical security.

a. Deterrent
b. Detective
c. Preventive
d. None of the above

A

c.Preventive

43
Q

Which one is not an example of detective control

a. Locks
b. Guards or dogs
c. Burglar alarms
d. Physical intrusion detection system

A

a.Locks

44
Q

Give three examples of a physical control that constitutes a deterrent

A

Answer: The signs that indicate that video monitoring; The yard sings with alarm company logos; Policies and regulations; guards and dogs; fences

45
Q

Give three examples that constitute a threat to people

A

Answer: Extreme temperature; Gases; Liquids; Living organisms; Movement; Energy anomalies; People; Toxins; Smoke and fire

46
Q

Which one is not a type of physical media that we introduced in lecture

a. Magnetic media
b. Paper media
c. Flash media
d. Optical media

A

b.Paper media

47
Q

Give three examples that constitute a threat to equipment

A

Answer:Extreme temperature; Liquids; Living organisms

48
Q

Which category of physical control might include a lock

a. Deterrent
b. Detective
c. Preventive
d. None of the above

A

c.Preventive

49
Q

Describe how you design a securing access to an equipment or facility

A

Answer: Consider the concept of defense in depth. We must provide security measures on multiple areas: inside and outside. We can see measures for securing access outside facility. For example, tress, large boulders, and fences that prevent vehicle entry. We can also see the measures at facility itself, like locks. Once inside the facility, we might use access control

50
Q

Name the three major concerns for physical security, in order of importance

A

Answer:Protecting people, Protecting data, Protecting equipment