Chapter 9 Flashcards
Defense in Depth
The use of multiple layers of security to protect resources
Control diversity and vendor diversity are two methods organizations implement to provide defense in depth
Control Diversity
The use of different security control types, such as technical controls, administrative controls, and physical controls
Compare with Vendor Diversity
Vendor Diversity
The practice of implementing security controls from different vendors to increase security
Compare with control diversity
Perimeter
Filler
Buildings
Filler
Secure Work Areas
Filler
Server and Network Rooms
Filler
Hardware
Filler
Airgap
A physical security control that provides physical isolation
Systems separated by an airgap don’t typically have any physical connections to other systems
Proximity Cards
Small credit card-sized cards that activate when they are in close proximity to a card reader
They are often used by authorized personnel to open doors
Tailgating
A social engineering attack where one person follows behind another person without using credentials
Mantraps help prevent tailgating
Mantrap
A physical security mechanism designed to control access to a secure area
A mantrap prevents tailgating
Bollards
Short vertical posts that act as a barricade
Bollards block vehicles but not people
Hot and Cold Aisles
A method commonly used in data centers to keep equipment cool
Cool air flows from the front of the cabinets to the back, making the front aisle cooler and the back aisle warmer
Faraday Cage
A room or enclosure that prevents signals from emanating beyond the room or enclosure
Redundancy
The process of adding duplication to critical system components and networks to provide fault tolerance
Fault Tolerance
The capability of a system to suffer a fault, but continue to operate
Said another way, the system can tolerate the fault as if it never occured
Single point failure
A component within a system that can cause the entire system to fail if the component fails