CISSP Domain 3: Physical Security Flashcards
What are the logical (technical) controls for physical security?
- building access controls
- intrusion detection
- alarms
- CCTV and monitoring
- HVAC
- power supplies
- fire detection and suppression
What are administrative controls for physical security?
- facility construction
- facility selection
- site management
- building design
- personnel controls
- awarness trainig
- emergency response
- emergency procedure defined within the emergency response
What are the physical controls for physical security?
- fencing
- lightning
- locks
- construction materials
- mantraps (access control vestibules)
- dogs
- guards
Describe efficacy of fences by hight:
* 3-4 feet
* 6-7 feet
* 8+ feet (topped with barbed wire)
- 3-4 feet
- deters casual traspasser
- 6-7 feet
- too difficult to climb easily
- may block vision (providing additional security)
- 8+ feet (topped with barbed wire)
- will deter determined intruders
What’s PIDAS?
- Perimeter Intrusion Detection and Assessment System
- detects someone attmpting to climb a fence
- expensive and may generate false positive alarms
What is the role of a fence?
What type of control?
- to deter the potential intruder
- therefore deterrent control
What is the role of PIDS?
What type of control?
- detect potential intruder
- therefore detective control
What’s Blackout?
prolonged loss of power
What’s Brownout?
prolonged low voltage
What’s Fault?
short/momentary loss of power
What’s Surge?
prolonged high voltage
What’s Spike?
momentary/temporary high voltage
What’s Sag?
temporary low voltage
What are the different types of electrical impact?
Name from high voltage to low/none.
- surge
- spike
- sag
- brownout
- fault
- blackout
What is the rule of an effective lighting design?
should not illuminate of guards, dogs, patrol posts, or other similar security elements
How should be the lighting for perimeter detection designed?
lighting for perimeter protection should illuminate critical areas with 2 feet of candle power from a hight of 8 feet
How should be the light poles placed for perimeter protection?
- the same distance apart as the diameter of the illuminated area
- means 20 feet of coverage means poles 20 feet apart
What’s the ideal humidity?
40%-60%
What’s the ideal and damage temperature for computers?
- ideal = 60-75 F (15-23 C)
- damage = 175 F (80 C)
What is the temperature in which managed storaged devices can be damaged?
100 F or 38 C
What can be caused by too much humidity?
corrosion
What can be caused by too little humidity?
static electricity
What are the different classes of fire and suppression agents?
- Class A (ash) fires
- common combustibles such as wood, paper, etc
- most common and should be extinguished with water or soda acid
- Class B (biol) fires
- burning alcohol, oil, and other petroleum products
- extinguished with gas (CO2, halon) or soda acid
- never use water to extinguish a class B fire
- Class C (conductive) fires
- electrical fires which are fed by electricity and may occur in equipment or wiring
- electrical fires are conductive and the extinguishing agent must be non-conductive, such as any type of gas CO2, halon)
- Class D (dilythium) fires
- burning metals, which are extinguished with dry powder
- Class K (Kitchen) fires
- kitchen fires, such as burning oil or grease
- wet chemicals are used to extinguish class K fires
What are the categories of fire detection systems?
- smoke sensing
- flame sensing
- heat sensing
Water can be used to put out which types of fire?
only class A, everything else cannot be put out with water
Smoke is damaging to what equipment?
storage devices
Heat is damaging to what equipment?
electronic or computer components
Suppression mediums can do what type of damage?
can cause short circuits, initiate corrosion or otherwise render equipment useless
What are the different sprinkler systems?
- preaction systems
- wet pipe systems
- dry pipe systems
- deluge systems
Describe preaction systems
- use closed sprinkler heads
- the pipe is charged with compressed air instead of water
- good for areas with people and computers
Describe wet pipe systems
- have water present in the pipes at all times, posing an unacceptable level of risk for a data center containing electronics that might be damaged if a pipe leaks
Describe dry pipe systems
- filled with compressed air
- only contain water when triggered in the event of a possible fire
Describe deluge systems
- similar to dry pipes, except the sprinkler heads are open and larger than dry pipe heads