Domain 3 Flashcards

1
Q

Code

A

Cryptographic systems of symbols that
operate on words or phrases and are
sometimes secret but don’t always
provide confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cipher

A

Ciphers, are always meant to hide

the true meaning of a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Stream Cipher

A

is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream). In a stream cipher, each plaintext digit is encrypted one at a time with the corresponding digit of the keystream, to give a digit of the ciphertext stream

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Block Cipher

A

is a method of encrypting text (to produce ciphertext) in which a cryptographic key and algorithm are applied to a block of data (for example, 64 contiguous bits) at once as a group rather than to one bit at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Substitution Cipher

A

uses the encryption algorithm to replace each character or bit of the plaintext message with a different character. The Caesar cipher is a good example.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Transposition Cipher

A

uses an encryption algorithm to rearrange the letters of a plaintext message, forming the ciphertext message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Initialization Vector (IV)

A

is a random bit string (a nonce) that is the same length as the block size that is XORed with the message. IVs are used to create a unique cipher text every time the same message is encrypted with the same key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Caesar Cipher

A

substitution cipher that shifts characters, uses a key of length one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Vigenère Cipher

A

cipher uses a longer key (usually a word or sentence),

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

One time Pad Cipher

A
  • For a one time pad to be successful, the key must be
  • Generated randomly without any known pattern.
  • Key at least as long as the message to be encrypted.
  • The pads must be protected against physical disclosure
  • Each pad must be used only one time and then discarded
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Zero-knowledge proof

A

is a communication concept.
A specific type of information is exchanged, but no real data is transferred, as with digital signatures and digital
certificates.

More simply: It enables one to prove knowledge of a fact to another
individual without revealing the fact itself .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Split knowledge

A

means that the information or privilege
required to perform an operation is divided among multiple users.

This ensures that no single person has sufficient privileges to compromise the security of the environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Work function or work factor

A

a way to measure the strength of a cryptography system by measuring the effort in terms of cost and/or time to decrypt messages.

The time and effort required to break a protective measure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Symmetric Key

A

Relies on the use of a shared secret key. Lacks support for scalability, easy key distribution, and nonrepudiation

Faster and for bulk encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Asymmetric

A

Public private key pairs for communication
between parties. Supports scalability, easy
key distribution, and nonrepudiation.

Stronger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

3DES Modes

A
  • Electronic Codebook Mode (ECB).
  • Cipher Block Chaining (CBC).
  • Cipher Feedback (CFB).
  • Output Feedback (OFB).
  • Counter (CTR).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

3DES Mode - Electronic Codebook Mode (ECB).

A

Simplest & least secure mode. Processes 64 bit blocks, encrypts block with the chosen key. If same block encountered
multiple times, same encrypted block is produced, making it easy to break.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

3DES Mode - Cipher Block Chaining (CBC).

A

Each block of unencrypted text is XORed with the block of ciphertext immediately preceding. Decryption process simply decrypts ciphertext and reverses the XOR operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

3DES Mode - Cipher Feedback (CFB).

A

Is the streaming version of CBC. Works on data in real time, using memory buffers of same block size. When buffer is full, data is encrypted and transmitted. Uses chaining, so errors propagate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

3DES Mode - Output Feedback (OFB).

A

Operates similar to CFB, but XORs the plain text with a seed value. No chaining function, so errors do not propagate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

3DES Mode - Counter (CTR).

A

Uses an incrementing counter instead of a seed. Errors do not propagate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Key Clustering

A

A Weakness in cryptography where a plain text message generates identical ciphertext messages using the same algorithm but using different keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Public Keys/Private Keys (asymmetric)

A
  • Public keys are shared among communicating parties
  • Private keys are kept secret.

DATA

  • To encrypt a message: use the recipient’s public key.
  • To decrypt a message: use your own private key.

DIGITAL SIGNATURE

  • To sign a message: use your own private key.
  • To validate a signature: use the sender’s public key.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

HASH FUNCTION REQUIREMENTS

A

Good hash functions have five requirements:

  1. They must allow input of any length.
  2. Provide fixed length output
  3. Make it relatively easy to compute the hash function for any input
  4. Provide one way functionality.
  5. Must be collision free.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Cryptographic Salts

A

A salt is random data that is used as an additional
input to a one way function that hashes data, a password or passphrase

Adding salts to the passwords before hashing them reduces the effectiveness of rainbow table attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

DSS

A

Digital Signature Standard

The Digital Signature Standard uses the SHA-1, SHA-2, and SHA-3 message digest functions…

Works in conjunction with one of three
encryption algorithms:
-Digital Signature Algorithm (DSA)
-Rivest, Shamir, Adleman (RSA) algorithm
-Elliptic Curve DSA (ECDSA) algorithm.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Certificate Authorities (CA)

A

generate digital certificates containing the public keys of system users.

Users then distribute certificates to people with whom they want to communicate.

Certificate recipients verify a certificate using the CA’s public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Email Traffic Encryption

A
  • S/MIME

- Pretty Good Privacy (PGP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Web Traffic Encryption

A

Transport Layer Security (TLS)

largely replacing the older SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Network Traffic Encryption

A

IPsec
protocol standard provides a common
framework for encrypting network traffic and is built into many common operating systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

IPsec

A

A security architecture framework that supports secure communication over IP.

Establishes a secure channel in 2 modes
transport mode or tunnel mode.

Can be used to establish direct communication between computers or over a VPN connection

Uses two protocols:
Authentication Header (AH)
Encapsulating Security Payload (ESP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Meet in the middle attack

A

exploits protocols that use two rounds of encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Birthday attack

A

an attempt to find collisions in hash functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Replay attack

A

an attempt to reuse authentication requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

DRM

A

Digital Rights Management

Commonly protect entertainment content, such as music, movies, and e-books

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Symmetric Algorithms

A
AES
Blowfish
Twofish
3DES
RC5
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

AES

A

Advanced Encryption Standard

Symmetric
Block Size: 128 bits
Key Size: 128, 192, 256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Blowfish

A

Symmetric
Block Size: 64 bits
Key Size: 32 - 448 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

3DES

A

Symmetric
Block Size: 64 bits
Key Size: 112 - 168 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Twofish

A

Symmetric
Block Size: 128 bits
Key Size: 1 - 256 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

RC5

A

Symmetric
Block Size: 32, 64, 128 bits
Key Size: 0-2,040 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Hash Algorithms

A

-HAVAL
-MD4, 5 - no longer in use due to collisions
SHA-224
SHA-256
SHA-384
SHA-512

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

HAVAL

A

Hash algorithm

Value length: 128, 160, 192, 224, 256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

SHA-2 (variants)

A

Secure Hash Algorithm

Hash algorithm

Used with digital signature standard (DSS)

Value length: 160, 224, 256, 384, 512

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

MD4, 5

A

Message Digest

Hash algorithm

No longer in use
Value length: 128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Public Key Cryptosystems (asymmetric)

A

RSA
is the most famous public key cryptosystem; it was developed by
Rivest, Shamir, and Adleman in 1977. It depends on the difficulty of factoring the
product of prime numbers.

El Gamal
is an extension of the Diffie
Hellman key exchange algorithm that depends on modular arithmetic.

(ECC) Elliptic curve
Algorithm depends on the elliptic curve discrete logarithm problem and
provides more security than other algorithms when both are used with keys of the same length.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Digital Signatures

A

Rely on public key cryptography and hashing functions DS algorithms suitable for use in FIPS 186 4 (the Digital Signature Standard) must use SHA 2 hashing functions.

Three currently approved encryption algorithms:

Digital Signature Algorithm (DSA), as specified in FIPS 186 4

Rivest, Shamir, Adleman (RSA), specified in ANSI X9.31

Elliptic Curve DSA (ECDSA), specified in ANSI X9.62

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

RSA

A

Asymmetric Key

Most common

Size: 512

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

El Gamal

A

Asymmetric Key

Replaced Diffie-Hellman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

ECC

A

Asymmetric Key

Elliptic Curve

Size: Variable (smaller key size due to EC, 160 bit EC key = 1025 RSA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Integrity Security Models

A
  • Biba: State machine model (SMM)
  • Clark-Wilson: Access control triple
  • Goguen-Meseguer: THE noninterference model
  • Sutherland: preventing interference (information flow and SMM)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Confidentiality Security Models

A
  • Bell-LaPadula: no read up, no write down
  • Brewer and Nash: Chinese Wall
  • Take Grant: employs a “directed graph”
53
Q

Bell-LaPadula model

A

State machine model enforces confidentiality

Uses mandatory access control (mac) to enforce the DoD multilevel security policy

Simple security property
subject cannot read data at a higher level of classification. “no read up”

Star * security property subject cannot write info to lower level of classification
“no write

54
Q

Biba model

A

A lattice based model developed to address concerns of integrity.

Simple integrity property subject at one level of integrity is not permitted to read an object of lower integrity. “no read down”

Star * integrity property object at one level of integrity is not allowed to write to object of higher integrity.

Invocation property prohibits a subject at one level of integrity from invoking a subject at a higher level of integrity.
“no write up”

55
Q

Clark-Wilson model

A

A lattice based model developed to address concerns of integrity.

Simple integrity property subject at one level of integrity is not permitted to read an object of lower integrity. “no read down”

Star * integrity property object at one level of integrity is not allowed to write to object of higher integrity. “no write up”

Invocation property prohibits a subject at one level of integrity from invoking a subject at a higher level of integrity.

Features the “ACCESS CONTROL” Triple

56
Q

Take Grant model

A

another confidentiality based model that supports four basic operations: take, grant, create, and revoke.

57
Q

Brewer and Nash model

A

also called the ”Chinese Wall model”. It was developed to prevent conflict of interest (COI) problems. (confidentiality based)

58
Q

Graham-Denning model

A

This model uses a formal set of protection rules for which each object has an owner and a controller.

Eight primary protection rules:
Securely create an object
Securely create a subject
Securely delete an object
Securely delete a subject
Securely provide the read access right.
Securely provide the grant access right.
Securely provide the delete access right.
Securely provide the transfer access right
59
Q

Security Modes

A

Dedicated Mode

Multilevel Mode

System High Mode

Compartmented Mode

60
Q

Dedicated Mode

A

Security clearance that permits access to ALL info processed by system, approval for ALL info processed by system, valid need to know for ALL info processed by system.

61
Q

Multilevel Mode

A

Can process information at different levels even when all system users do not have the required security clearance to access all information processed by the system.

62
Q

System High Mode

A

Each user must have valid security clearance, access approval for ALL info processed by system, and valid need to know for at least SOME info on the system. Offers most granular control over resources and users of these models.

63
Q

Compartmented Mode

A

Goes one step further than System High. Each user must have valid security clearance, access approval for ALL INFO processed by system, but requires valid need to know for ALL INFO they will have access to on the system.

64
Q

State Machine Model (SMM)

A

Describes a system that is always secure
no matter what state it is in.

Based on the computer science definition of a finite state machine (FSM).

A state is a snapshot of a system at a specific
moment in time. All state transitions must be evaluated.

If each possible state transition results in another secure state, the system can be called a secure state machine.

65
Q

Information Flow Model

A

Focuses on the flow of information

Information flow models are based on a
state machine model

Biba and Bell LaPadula are both information flow models

Bell LaPadula preventing information flow from a high security level to a low security level

Biba focuses on flow from low to high security level

66
Q

TCB (Trusted Computing Base)

A

is a combination of hardware, software and controls that work together to form a “trusted base” to enforce your security policy

Includes reference monitor and security kernel

67
Q

Reference monitor

A

is the logical part of the TCB that confirms whether a subject has the right to use a resource prior to granting access.

enforces access control

68
Q

Security Kernel

A

is the collection of the TCB components that implement the functionality of the reference monitor.

implements access control

69
Q

Common Criteria (ISO IEC 15048)

A

The Common Criteria enable an objective evaluation to validate that a particular product or system satisfies a defined set of security requirements.

TWO FLAVORS
community Protection Profile (cPP) black box
Evaluation Assurance Level (EAL)white box

CC Has replaced TCSEC and ITSEC!

70
Q

TCSEC (Trusted Computer System Evaluation)

A

A structured set of criteria for evaluating computer security within products and systems.

71
Q

ITSEC (Information Technology Security Evaluation Criteria)

A

The ITSEC represents an initial attempt to create security evaluation criteria in
Europe. TSEC uses two scales to rate functionality and assurance.

72
Q

Common Criteria (CC) EAL valuation Standards

A

EAL0, EAL1 - Functionally Tested
EAL2 - Structurally Tested
EAL3 - Methodically Tested & Checked
EAL4 - Methodically Designed, Tested, and Reviewed (labels)
EAL5 - Semi Formally Designed and Tested
EAL6 - Semi Formally Verified Design and Tested
EAL7 - Formally Verified Design and Tested

73
Q

TCSEC and ITSEC Evaluation Standards

A

TCSEC ITSEC
D F-D+E0 Minimal/no protection
C1 F-C1+E1
C2 F-C2+E2
B1 F-B1+E3 Labeled security protection
B2 F-B2+E4
B3 F-B3+E5
A1 F-B3+E6 Verified security design

74
Q

Covert Channels

A

Two types:
covert timing channel
covert storage channel

A method that is used to pass information over a path that is not normally used for communication.

Because it’s not normally used, it may not be protected by the system’s normal security controls.

75
Q

TPM

A

Trusted Platform Module

A chip that resides on the motherboard of the device.

Multi purpose, like storage and management of keys used for full disk encryption (FDE) solutions.

Provides the operating system with access to keys, but prevents drive removal and data access

76
Q

Mandatory Access Control

A

Enforces an access policy that is
determined by the system, not the object owner. Relies on classification labels that are representative of security domains and realms.

77
Q

Discretionary Access Control

A

Permits the owner or creator of an object to control and define its accessibility, because the owner has full control by default.

78
Q

Non-discretionary Access Control

A

Enables the enforcement of system

wide restrictions that override object specific access control.

79
Q

Rule-based Access Control

A

Defines specific functions for access to requested objects. Commonly found in firewall systems.

80
Q

Role-based Access Control

A

Uses a well defined collection of named job roles to endow each one with specific permissions, thereby seeking to ensure that users who occupy such roles can
access what they need to get their jobs done.

81
Q

Certification

A

The technical evaluation of each part of a

computer system to assess its concordance with security standards

82
Q

Accreditation

A

The process of formal acceptance of a
certified configuration from a designated
authority.

83
Q

Open System

A

are designed using industry standards and are usually easy to integrate with other open systems

84
Q

Closed System

A

are generally proprietary hardware and/or
software. Their specifications are not
normally published, and they are usually
harder to integrate with other systems.

85
Q

Confinement

A

restricts a process to reading from and

writing to certain memory locations.

86
Q

Bounds

A

are the limits of memory a process cannot

exceed when reading or writing.

87
Q

Isolation

A

is the mode a process runs in when it is

confined through the use of memory bounds.

88
Q

Factors of Authentication

A

Something you know (pin or password)
Something you have (trusted device)
Something you are (biometric)

89
Q

AuthN

A

Authentication (AuthN) is the process of
proving that you are who you say you are.

Identity

Authentication can be achieved with both
symmetric and asymmetric cryptosystems.

90
Q

AuthZ

A

Authorization (AuthZ) is the act of granting an authenticated party permission to do something.

Access

Permissions, rights , and privileges are then granted to users based on their proven identity.

If user has rights to a resource, they are granted authorization.

91
Q

Multitasking

A

simultaneous execution of more than one

application on a computer and is managed by the operating system.

92
Q

Multithreading

A

Permits multiple concurrent tasks to be

performed within a single process.

93
Q

Multiprocessing

A

The use of more than one processor to

increase computing power.

94
Q

Multiprogramming

A

Similar to multitasking but takes place on
mainframe systems and requires specific
programming.

95
Q

Single state and Multistate processors

A

Single state processors are capable of
operating at only one security level at a time, whereas multistate can simultaneously operate at multiple security levels.

96
Q

Privileged Mode

A

Controlled operations are performed in
privileged mode, also known as system
mode, kernel mode, and supervisory mode.

97
Q

User Mode

A

Applications operate in a limited instruction set environment known as user mode

98
Q

Memory Types

A
  • ROM. Read only. Contents burned in at factory.
  • RAM. Static RAM (SRAM) uses flip flops, dynamic RAM (DRAM) uses capacitors
  • PROM. Programmable chip similar to
  • EPROM. Erasing, Clearing (overwriting w/ unclassified
    data) .
  • EEPROM. Have a small window that, when illuminated with special ultraviolet light, erases content of chip
  • Flash Memory. Derivative concept from EEPROM. nonvolatile, can be electronically erased and rewritten.
99
Q

Storage types

A

-Primary storage is the same as memory.
-Secondary storage consists of magnetic, flash, and optical media that must be first read into primary memory before
the CPU can use the data.
-Random access storage devices can be read at any point
-Sequential access storage -devices require scanning
through all the data physically stored before the desired

100
Q

Firmware

A

Software stored on a ROM chip, containing basic instructions needed to start a computer. Also used to provide operating instructions in peripheral devices such as printers

101
Q

Process isolation

A

ensures that individual processes can access only their own data.

102
Q

Layering

A

creates different realms of security within a process and limits communication between them.

103
Q

Abstraction

A

creates “black box” interfaces for programmers to use without requiring knowledge of an algorithms or device’s inner workings.

104
Q

Data hiding

A

prevents information from being read from a different security level. Hardware segmentation enforces process isolation with physical controls.

105
Q

Hypervisor

A

The hypervisor, also known as a virtual machine monitor (VMM), is the component of virtualization that creates, manages, and operates the virtual machines (VMs).

106
Q

Type I Hypervisor

A

A native or bare metal hypervisor. In this configuration, there is no host OS; instead, the hypervisor installs directly onto the hardware where the host OS would normally reside.

107
Q

Type II Hypervisor

A

A hosted hypervisor. In this configuration, a standard regular OS is present on the hardware, and the hypervisor is then installed as another software application.

108
Q

CASB

A

A cloud access security broker (CASB) is a security policy enforcement solution that may be installed on premises or in the cloud.

Shadow IT

109
Q

Buffer overflow

A

occurs when the programmer fails to check the size of input data prior to writing the data into a specific memory location.

110
Q

Functional Order of Security Controls

A

Deterrence
Denial
Detection
Delay

111
Q

Physical Security Controls

A

Administrative
also known as management controls and include policies and procedures, like site management, personnel controls, awareness training, and emergency response and procedures

Logical
also known as technical controls and are implemented through technology like access controls, intrusion detection, alarms, CCTV, monitoring, HVAC, power
supplies, and fire detection and suppression.

Physical
use physical means to protect objects and includes fencing, lighting, locks, construction materials, mantraps, dogs and guards

112
Q

Technical/Logical controls for physical security

A
  • access controls
  • intrusion detection
  • alarms
  • CCTV and monitoring
  • HVAC
  • power supplies
  • fire detection and suppression
113
Q

Administrative controls for physical security

A
  • facility construction
  • facility selection
  • site management
  • personnel controls
  • awareness training
  • emergency response
  • emergency procedure
114
Q

Physical controls for physical security

A
  • fencing
  • lighting
  • locks
  • construction materials
  • mantraps
  • dogs
  • guards
115
Q

Fences

A
3-4 feet deters casual trespasser
6-7 feet too hard to climb easily
8 feet (w/ barbed wire) will deter intruders
116
Q

Temperatures and humidity

A

Humidity: 40% 60% ideal

Temps: for computers 60-75F (15
23C), damage at 175F.
Manage storage devices damaged at 100F

Too much humidity can cause corrosion. Too little humidity causes static electricity. Even on nonstatic carpet, low humidity can generate 20,000 volt static discharg!

117
Q

Electrical Impacts

A
Blackout: prolonged loss of power
Brownout: prolonged low voltage
Fault: short loss of power
Surge: prolonged high voltage
Spike: temporary high voltage
Sag: temporary low voltage
118
Q

Lights

A

8 feet high with 2 feet candle power

119
Q

3 Categories of Fire Detection Systems

A

smoke sensing
flame sensing
heat sensing

120
Q

Fire Classes

A
A - common combustibles - water, soda acid
B - liquids - CO2, halon, soda acid
C - electrical - CO2, halon
D - metals - Dry powder
K - kitchen - wet chemicals
121
Q

Electromagnetic interference types

A

-Common mode noise. Generated by the
difference in power between the hot and
ground wires of a power source operating electrical equipment

-Traverse mode noise. Generated by a
difference in power in the hot and neutral wires of a power source operating electrical

122
Q

Radio frequency interference (RFI)

A

is the source of interference that is generated by electrical appliances, light sources, electrical cables and circuits, and so on.

123
Q

Damage from fire and fire suppression

A
  • Smoke is damaging to most storage devices.
  • Heat can damage any electronic or computer component.
  • Suppression mediums can cause short circuits, initiate corrosion, or otherwise render equipment useless.
124
Q

Water Suppression Systems

A

-Preaction systems. use closed sprinkler heads, and the pipe is charged with
compressed air instead of water. The water is held in check by an electrically
operated sprinkler valve and the compressed air.

-Wet pipe systems. are filled with water. Dry pipe systems contain compressed
air until fire suppression systems are triggered, and then the pipe is filled with water; and flame activated sprinklers trigger when a predefined temperature is reached.

-Dry pipe systems. also have closed sprinkler heads: the difference is the pipes are filled with compressed air. The water is held back by a valve that remains
closed as long as sufficient air pressure remains in the pipes. Often used in areas
where water may freeze, such as parking garages.

-Deluge systems. are similar to dry pipes, except the sprinkler heads are open
and larger than dry pipe heads. The pipes are empty at normal air pressure; the
water is held back by a deluge valve.

125
Q

Halon

A

is effective, but bad for environment (ozone depleting), turns to toxic gas at 900F.

Suitable replacements
•FM 200 (HFC 227ea)
•CEA 410 or CEA 308
•NAF S III (HCFC Blend A)
•FE 13 (HCFC 23)
•Argon (IG55) or Argonite (IG01)
•Inergen (IG541)
•Aero K
126
Q

Lock Types

A

Electronic Combination Locks
(aka Cipher lock) Something you know

Key Card Systems
Something you have

Biometric Systems
Something you are

Conventional Locks
Easily picked / bumped & keys easily duplicated

Pick-and-Bump Resistant Locks
Expensive, harder to pick & keys not easily duplicated.

127
Q

Threats to physical access controls

A
  • Abuses of physical access control include propping open secured doors and bypassing locks or access controls.
  • Masquerading is using someone else’s security ID to gain entry to a facility.

-Piggybacking is following someone through a secured
gate or doorway without being identified or authorized personally.

128
Q

Media storage facility protections

A
  • locked cabinets or safes
  • using a librarian/custodian
  • implementing a check-in/check-out process
  • using media sanitization
129
Q

Protections for evidence storage

A
  • locked cabinets or safes
  • dedicated/isolated storage facilities
  • offline storage
  • access restrictions and activity tracking
  • hash management and encryption