Chapter 9 Implementing Controls to Protect Assets Flashcards
____ ____ _____ help protect access to secure areas
Physical security controls
____ and ____ _____ strategies help eliminate single points of failure for critical systems.
Redundancy and fault-tolerance
_____ ensure that data remains available even after data is lost.
Backups
_____ ______ strategies help ensure mission critical functions continue to operate even if a disaster destroys a primary business location
Business continuity
____ ___ _____ refers to the security practice of implementing several layers of protection.
Defense in depth (aka layered security)
True or False: You must implement security at several different layers so if one layer fails you still have additional layers to protect you.
True
____ _____ is the use of different security control types, such as technical controls, administrative controls, and physical controls.
Control diversity
_____ ____ such as vulnerability assessments and penetration tests can help verify that these controls are working as expected
Administrative controls
____ ________ is the practice of implementing security controls from different vendors to increase security.
Vendor diversity
True or False: Many DMZs use two firewalls and vendor diversity dictates the use of firewalls from different vendors.
True
Example: One firewall could be a Cisco firewall and the other one could be a Check Point firewall.
_____ _______ also helps provide defense in depth.
User training
True or False: If users engage in risky behaviors, such as downloading and installing files from unknown sources or responding to phishing emails, they can give attackers a path into an organization’s network.
True
True or False: Providing regular user training on common threats, and emerging threats, helps them avoid these types of attacks.
True
A _____ ____ _____ is something you can physically touch, such as a hardware lock, a fence, an identification badge, and a security camera.
Physical security control
______ _____ _____ ______ attempt to control entry and exits, and organizations commonly implement different controls at different boundaries
Physical security access controls
List some physical security access controls
- Perimeter - Border around land
- Buildings
- Secure work areas - i.e. SOCC, NOC
- Hardware - Cabinet locks, cable locks, etc.
- Airgap
An ______ is a physical security control that ensures that a computer or network is physically isolated from another computer or network.
Airgap
True or False: A complex physical security control is a sign
False
It is a simple physical security control
True or False: It is common to secure access to controlled areas of a building with door locks, and there are many different lock types.
True
A ____ ____ ____ is one that only opens after some access control mechanism is used
Door access system
True or False: When implementing door access systems, it’s not important to limit the number of entry and exit points.
False
It is important
True or False: In the event of a fire, door access systems should allow personnel to exit the building without any form of authentication.
True
____ ____ often have four or five buttons labeled with numbers.
Cipher locks
Cipher locks can be ______ or ______
Electronic or manual
An _____ _____ _____ automatically unlocks the door after you enter the correct code into the keypad
Electronic cipher lock
A _____ _____ _____ requires a user to turn a handle after entering the code.
Manual cipher lock
True or False: To add complexity and reduce brute force attacks, many manual cipher locks include a code that requires two numbers entered at the same time.
True
True or False: One challenge with cipher locks is that they don’t identify the users.
True
True or False: Uneducated users cannot give out the cipher code to unauthorized individuals without understanding the risks
False
They can
_______ _____ are small credit card-sized cards that activate when they are in close proximity to a card reader.
Proximity cards
True or False: Many self-serve gasoline stations and fast-food restaurants use proximity card readers embedded in credit cards.
True
True or False: The proximity card does not require its own power source.
True
The electronics in the card include a capacitor and a coil that can accept a charge from the proximity card reader. When you pass the card close to the reader, the reader excites the coil and stores a charge in the capacitor. Once charged, the card transmits the information to the reader using a radio frequency.
True or False: Some door access systems include details on the user and record when the user enter or exists the area
True
When used this way, it’s common to combine the proximity card reader with a keypad requiring the user to enter a personal identification number (PIN). This identifies and authenticates the user with multifactor authentication. The user has something (proximity card) and knows something (PIN)
It is also possible to use _______ methods as an access control system.
Biometric
True or False: One of the benefits with using a biometric method for access control is that it provides both identification and authentication
True
True or False: It’s important to ensure you use an accurate biometric system and configure it to use a low false acceptance rate.
True
_______ occurs when one user follows closely behind another user without using credentials.
Tailgating (also called piggybacking)
True or False: If authorized users routinely do tailgating, it indicates the environment is susceptible to a social engineering attack where an unauthorized user follows closely behind an authorized user.
True
True or False: Social engineers take advantage of people’s polite and courteous manners
True
______ ______ areas are most susceptible to tailgating attacks.
High traffic
True or False: The best solution for preventing tailgating is a mantrap
True
A ____ is a physical security mechanism designed to control access to a secure area through a buffer zone.
Mantrap
True or False: Because they only allow one person through at a time, mantraps prevent tailgating
True
_______ get their name due to their ability to lock a person between two areas, such as an open access area and a secure access area, but not all of them are that sophisticated.
Mantraps
True or False: It’s also possible to require identification and authentication before allowing passage through a mantrap.
True
Cameras are connected to a _____ ____ ______ system which transmits signals from video cameras to monitors that are similar to TVs
Closed circuit televisions (CCTVs)
True or False: In addition to providing security, CCTV can also enhance safety by deterring threats.
True
______ _________ provides the most reliable proof of a person’s location and activity.
Video surveillance
True or False: Access logs provide a record, but it’s possible to circumvent the security of an access log.
True
Ex. someone can use another’s proximity card to enter an area but it will be recorded as the card owner not the person who used it.
True or False: When using video surveillance in a work environment, it’s important to respect privacy and to be aware of privacy laws.
True
List some things to consider with video surveillance and privacy
- Only record activity in public areas. It is often illegal to record activity in locker rooms and restrooms
- Notify employees of the surveillance - If employees aren’t notified of the surveillance, legal issues related to the video surveillance can arise.
- Do not record audio - Recording audio is illegal in many jurisdictions, without the express consent of all parties being recorded.
_____ provide a barrier around a property and deter people from entering.
Fences
True or False: When using a fence, it’s common to control access to the area via specific gates.
True
True or False: When additional security is required, organizations sometimes configure dual gates, allowing access into one area where credentials are checked before allowing full access.
True
This effectively creates a cage preventing full access, but also prevents unauthorized individuals from escaping.
True or False: Many organizations use a combination of automation, light dimmers, and motion sensors to save on electricity costs without sacrificing security.
True
Installing _____ at all entrances to a building can deter attackers from trying to break in.
Lights
_______ provide an additional physical security protection
Alarms
True or False: You cannot combine motion detection systems with burglary prevention systems
False
_____ ______ sense infrared radiation sometimes called infrared light, which effectively sees a difference between objects of different temperatures
Infrared detectors
True or False: The use of infrared detectors can help eliminate false alarms by sensing more than just motion, but motion from objects of different temperatures
True
______, ______, and _____ (when combined) all provide layered physical security
Fencing, lighting, and alarms
Organizations often use _____, which are short vertical posts, composed of reinforced concrete and/or steel.
Bollards
True or False: Orgs often place the bollards in front of entrances about three or four feet apart.
True
True or False: Companies that don’t have the resources to employ advanced security systems often use hardware locks to prevent access to secure areas
True
___ _______ is an important concept to consider when using hardware locks.
Key management
True or False: Proper key management ensures that only authorized personnel can access the physical keys
True
____ ____ are a great theft deterrent for mobile computers, and even many desktop computers at work.
Cable locks
True or False: Another common use of a cable lock is for computers in unsupervised labs.
True
True or False: Often in server rooms, administrators use locking cabinets or enclosures to secure equipment mounted within bays.
True
You can store smaller devices such as external USB drives or USB flash drives in an ______ ____ or _______ _______ when they aren’t in use
Office safe or locking cabinet
____ _______ is the process of tracking valuable assets throughout their life cycles.
Asset management
True or False: An effective asset management system can help reduce several vulnerabilities
True
True or False: Asset management helps reduce architecture and design weaknesses by ensuring that purchases go through an approval process.
True
____ ____ occurs when an organization has more systems than it needs, and systems it owns are underutilized
System sprawl
True or False: Asset management begins before the hardware is purchased and helps prevent system sprawl by evaluating the purchase
True
True or False: Additionally after the asset is purchased, the process ensures the hardware is added into the asset management tracking system.
True
This ensures that the assets are managed and tracked from cradle to grave.
___ _____ ________ methods can track the movement of devices
Radio frequency identification (RFID)
Same as what stores use to prevent shoplifting
True or False: Mobile devices are easy to lose track of, so organizations often use asset tracking methods to reduce losses.
True
True or False: Environmental controls directly contribute to the availability of systems
True
True or False: Environmental controls include ensuring temperature and humidity controls are operating properly, fire suppression systems are in place, and proper procedures are used when running cables.
True
______, _________, and ___ ________ systems are important physical security controls that enhance the availability of systems.
Heating, ventilation, and air conditioning (HVAC)
True or False: If systems overheat, chips can actually burn themselves out.
True
_____ ______ HVAC systems provide more cooling capacity. This keeps server rooms at lower operating temperatures and results in fewer failures.
Higher tonnage
___ ___ ____ _____ help regulate the cooling in data centers with multiple rows of cabinets.
Hot and cold aisles
True or False: With hot and cold aisles, the back of all cabinets in one row faces the back of all the cabinets in an adjacent row. The same for the front of the cabinets. This way hot air for two row cabinets and cold air for two row cabinets flows through the same aisle
True
An HVAC also includes a _________ as a temperature control and additional humidity controls
Thermostat
In HVAC, the _______ ensures that the air temperature is controlled and maintained
Thermostat
_____ humidity can cause condensation on the equipment, which causes water damage
High
___ humidity allows a higher incidence of electrostatic discharge (ESD)
Low
True or False: HVAC systems are not often integrated with fire alarm systems.
False
They often are to prevent a fire from spreading
One of the core elements of a fire is ______
Oxygen
True or False: If an HVAC continues to operate normally while a fire is active, it continues to pump oxygen, which feeds the fire
True
True or False: When the HVAC is integrated with the fire alarm system, it controls the airflow to help prevent the rapid spread of the fire.
True
A _____ fire system can detect a fire and automatically activate to extinguish the fire
Fixed
The different components of a fire are ____, ______, ____, and a ______ ______ creating the fire
heat, oxygen, fuel, and a chain reaction
True or False: Fire suppression methods attempt to remove or disrupt one of these elements to extinguish a fire.
True
List methods of extinguishing a fire
- Remove the heat. Fire extinguishers but not water for electrical fires
- Remove the oxygen. Many methods use CO2 to displace oxygen. Common for fighting electrical fires because harmless to equipment.
- Remove the fuel
- Disrupt the chain reaction. Some chemicals can disrupt the chain reaction of fires to stop them.
True or False: When using CO2 to displace oxygen in a fire, it’s important to ensure that personnel can get out before the oxygen is displaced
True
True or False: It is important to ensure that an alternative allows personnel to exit even if the proximity card reader loses power.
True
True or False: Administrators can review HVAC system logs to review the performance.
True
________ helps prevent electromagnetic interference (EMI) and radio frequency interference (RFI) from interfering with normal signal transmissions.
Shielding
_______ also protects against unwanted emissions and helps prevent an attacker from capturing network traffic.
Shielding