Domain 3B - Security Architecture and Engineering Flashcards
number one overarching primary goal of physical security is?
safety of people, people are the most valuable asset of an organization
what are the 5 pieces to physical security
- deter
- delay
- detect
- assess
- respond
deter control explain
- discourage things like trespassing, property damage, theft and intrusion with signage and other environmental design of a building and the land around it
delay control explain
- delay an attacker from gaining unauthorized access
example: locks delay and attacker from gaining unauthorized access
detective control explain
- detect if a risk has occurred
example: CCTV
assess controls
- used to determine the method of attack and the target
respond controls
- take appropriate action to remediate the risk
what is the best way to secure a perimeter
- minimize the number of entrances and exits
landscape - what role does this play in physical security
- part of perimeter control
- foliage should be maintained to provide clear sight lines for cameras and that would-be attacker cant just climb up a tree and into the building
physical security grading (perimeter) explain
- part of perimeter control
- the ground should slope down and away from the building so if there was a flood you are not part of the flood
passive infrared devices - what must happen if ambient air temp changes
- they must automatically recalibrate themselves
lighting does what
- helps deter crime
- important to safety of people
2 major types of card reader systems
- contact
- contactless
contact card reader
- employee must swipe their card through the reader for older magnetic readers
contactless card reader
- employee only need to hold their card near the rfid (radio frequency identification system) reader
social engineering attack on doors is called what
- tailgating
- piggybacking
- - an intruder follows and authorized person through the door after they have unlocked it
what are preventions for tailgating and piggybacking
- mantraps
- turnstiles
explain mantrap
- it involves 2 doors
- you must unlock the fist door, and walk into a small space, close the door behind you, then can you unlock the second door
should locks ever be used as a single line of defense
no, locks are delay only and should only be part of a layered defense
sensors to help monitor if a window has been broken
- shock - detects a small shock wave when a window breaks
- glass break sensors - essentially microphones listening for specific frequencies of sound when glass breaks
what is skimming
an attacker uses an electronic device to steal card information from valid transaction.
example: install an small electronic device attacked to an ATM machine to record debit card numbers.
what are two devices used to provide a consistent supply of clean power
- UPS
- Generator
what is a black out
no power for a long period of time
what is a brownout
prolonged low voltage
what is a power fault
short loss of power
what is a power surge
prolonged high voltage
what is a power spike
temporary high voltage
what is a sag and a dip
temporary low voltage
4 goals of cryptography and its mnemonic
P.A.I.N
- Privacy (confidentiality)
- authenticity
- integrity
- non-repudiation
class A fire –
- what is it
- what puts it out
- common fire (ash)
- water, soda, acid
class B fire –
- what is it
- what puts it out
- Liquid (boil)
- Gas (halon, C02 etc.) and soda acid
class C fire –
- what is it
- what puts it out
- electrical (conductive)
- any gas (C02, Halon etc.)
class D fire –
- what is it
- what puts it out
- metal
- dry powder
humidity in data centers
- if its too dry what do you get
- if its too humid what do you get
- static electricity
- condensation
explain positive pressurization when it comes to HVAC units in data centers
nice clean filtered air is blown into the data center slightly above ambient temperature, positively pressurizing the data center
why do you want positive pressurization
if there are any cracks in the data center. the clean air is blowing out rather than dirty (outside) air blowing into the data center
why do you want positive pressurization
if there are any cracks in the data center or someone opens an door, the clean air (HVAC) is blowing out rather than dirty (outside) air blowing into the data center
whenever we implement controls we want what combination if possible
- preventive
- detective
- corrective
fire detection - 3 main types are
- flame detectors
- smoke detectors
- heat detectors
flame detectors do what
detect the infrared and ultraviolet light created by flames - essentially video cameras
smoke detection why use them and what are the two main types and when to use each type
- one of the best ways to detect fire as early as possible
- ionization - respond more quickly to flaming or fast fires
- photoelectric - (called optical detectors) respond quickly to smoldering fires
define heat sensors
- thermal sensors
- temp sensors, monitoring for rapid rise in temperature
- what is the earliest fire detection
smoke detection (smoke before fire)
- what is the most concerning fire
- what detection system do we use for it
- flaming or fast fires
- ionization detection
two major types of fires suppressions systems
- water based - office spaces , motels etc.
- gas based - cost justified in data centers
4 types of water based suppression systems
- wet
- dry
- pre-action
- deluge
wet pipe system attributes
- cheapest
- pressurized water at all time
- cant be used where it can freeze
- eventually will have leaks
dry pipe system attributes
- look identical to wet pipe systems
- pressurized with gas so they can be used where it can freeze
- water is only realized when triggered
- closed sprinkler head
deluge attributes
- similar to dry pipe
- sprinkler heads are open
- larger sprinkler heads
- pipes are not pressurized
- water held back by deluge valve
4 types of gas-based fire suppression systems
- Inergen
- Argonite
- FM-200
- Aero-K - supposedly safe for servers and people
why is halon no longer used at a gas-based fires suppression
- ozone depleting
- turns to toxic gas at 900F
- like many gas-based fires suppression, it removes oxygen = bad for human life
why is C02 fire suppression preferred in data centers
- non-corrosive
- it does not leave residue
- will not damage equipment
- doesn’t conduct electricity
5 if you do not use too much, its not harmful to humans
social engineering - cryptographic attacks is what
going after the weakest link - people
birthday attacks - cryptographic attacks
finding collisions in hashing
rainbow tables - cryptographic attacks
how do you defeat rainbow tables
- a giant database of most common passwords and their associated hash values
- salting the password before hashing
dictionary attack - cryptographic attacks
- a form of brute force
- dictionary attack try the most likely combinations first
- can be more efficient and faster than brute force
radiation emissions - cryptographic attacks
a side channel attack - the electromagnetic waves that are emanated are closely monitored
timing attack - cryptographic attacks
- measure how long certain operations take
power attack - cryptographic attacks
- measure how much power is consumed during certain calculations
side channel attack explain - cryptographic attacks
- any attack where sensitive information is gathered by carefully monitoring a system that is performing some cryptographic tasks
implementation attack - cryptographic attacks
- target weaknesses in how an algorithm, cryptosystem, protocol or application has been implemented.
example: WEP (wired equivalency protocol) does a terrible job of implementing rc4 encryption algorithm.
IV (initialization vectors) too short, a portion is static among other issues
temporary files attack - cryptographic attacks
- temporary files my not be sufficiently secured.
- in a temporary file attack the attacker gains access to the sensitive plaintext or encryption keys by accessing encrypted and decrypted temp files
replay attack attributes - cryptographic attacks
- a form to man-in-the-middle
- attacker eavesdrops and intercepts data being
sent - they not necessary can decipher the data. they replay it, resend it later on in an attempt to use that information to their advantage
example: intercepting a users hashed password being sent to a server to authenticate the user. the attacker could resend that hash of a users password later on to gain unauthorized access
man-in-the-middle - cryptographic attacks
- attacker places themselves in the middle of a conversation, allowing them to eavesdrop on the communication
- possibly alter communications or decipher them
factoring (cryptanalytic) -what algorithm would this be used against?
RSA
chosen ciphertext - (cryptanalytic)
- the attacker has access to the machine or algorithm that is performing the encryption and decryption
- the attacker is choosing what ciphertext to feed into the algorithm then looking at the resultant plaintext to try and deduce the key