Domain 4: Physical (Environment) Security Flashcards
What is a Mantrap?
A Preventive physical control with two doors; each door requires a separate form of authentication to open.
What is a Bollard?
A post designed to stop a car, typically deployed in front of a building entrance.
What is a Tailgating?
Following an authorized person into a building without providing credentials.
What is a Smart Card?
A physical access control device containing an integrated circuit.
What is the paramount concern for teh physical and environmental domain and trumps all other considerations?
Physical Safety of people
What is the purpose of perimeter defense?
The help prevent, detect and correct unauthorized physical access.
What is defense in depth?
Any one defense may fail so critical assets should have multiple physical security controls
Name four Physical “Defense in depth” measures.
Fences
Doors
Walls
Locks
What tytpe of controls do fences facilitate?
Can range from simple deterrents to preventive devices
What is the design purpose of a fence?
Design them to steer ingress and egress to controlled points
What are the four Classes of Gates?
I: Residential (Home Use); ornamental; deterrence
II: Commercial / General Use (Parking Grarge)
III: Industrial / Limited Access (Loading dock)
IV: Restricted Access (Prison)
Where should a gate go on the perimeter?
Gates should be placed at controlled points at the perimeter.
How do you steer people to a gate?
Secure sites use fences and topography to steer traffic to these points.
What type of control is a light?
Detective
and
Deterrent
What is a lumen?
Lumen: the amount of light one candle creates
How did we historoically measure Light ?
Light was historically measured in foot candles
How is a lumen measured?
One lumen = on lumen per square foot
What light unit measurement is replacing the Lumen?
Lux
What is a Lux equal to?
Lux = one lumen per square meter
What does CCTV stand for?
CCTV (Closed Circuit Television):
What type of control is a CCTV (Closed Circuit Television)?
Detective
What is a ;imitation of CCTV (Closed Circuit Television)?
Uses the normal light spectrum and requires sufficient visibility to illuminate the field of vision
What type of CCTV (Closed Circuit Television) system allows you to see in the dark by seeing heat
Infrared
Older tube cameras in CCTV (Closed Circuit Television) systems are analog or digital?
Analog
MModern CCTV (Closed Circuit Television) systems use what kind of cameras?
Digital Charged Couple Discharge cameras
What does the acronym, CCD, stand for in regard to CCTV (Closed Circuit Television) systems?
Charged Couple Discharge cameras which are digital
What does the mechanical irise in a cmera do?
Act as human irises; controlling the amount of light that enters the lens by changing the size of the aperture.
Is the aperture larger or smaller at low light conditions?
The aperture is larger at low light conditions
In regards to CCTV systems, what is Depth of Field?
Depth of Field: the area in focus
In regards to CCTV systems, what is Field of View?
Field of View: the entire area viewed by the camera
In regards to CCTV systems, what does more light make possible?
Smaller aperture
Larger Depth of Field (more of the image in focus)
In regards to CCTV systems, how does low light affect the system?
Wide aperture used is low light conditions
lowers depth of field (smaller area of focus)
In regards to CCTV systems, what does Pan do?
Pan: move horizontally
In regards to CCTV systems, what does Tilt do?
Tilt: move vertically
In regards to CCTV systems, what are the three typical views you can get?
Fixed: one camera
Autoscan: show one for a few seconds and then show a different camer
Multiplexing: multiple camera feeds on one display
In regards to CCTV systems, what are the three typical vstorage systems?
Magnetic Tape (VHS) for tube cameras
DVR (Digital Video Recorder) for digital cameras
NVR (Network Video Recorder)
In regards to CCTV systems, what does DVR stand for?
DVR (Digital Video Recorder) for digital cameras
In regards to CCTV systems, what does NVR stand for?
NVR (Network Video Recorder)
In regards to CCTV systems, what is the advantage of DVR (Digital Video Recorders) over NVRs (network Video Recoders)?
NVR has the advantage for centralized storage of all video.
What is the difference between CRTs (Cathode Ray Tube) cameras and CRT displays.
CRT Tube Cameras are older model cameras and CRT displays project images on a screen.
What type of control is a lock?
Preventative
Name the three types of locks.
Mechanical
Electronic
Combination
What is one limitation to key locks?
Keys can be shared or copied which lowers the accountability of key locks
How does a key lock work?
Inserting the correct key makes the pins align with the Shear Line allowing the lock tumbler (Plug) to turn.
How does a warded lock work?
Uses a set of obstructions, or wards,
to prevent the lock from opening unless the correct key is inserted.
The correct key has notches or slots corresponding to the obstructions in the lock, allowing it to rotate freely inside the lock.
What is a limitation to a warded lock?
a well-designed skeleton key can successfully open a wide variety of warded locks.
How does a Spring Bolt / Dead Bolt lock work?
A locking mechanism that automatically “springs” in and out of the strike plate of the door jamb.
A locking mechanism that mechanically rotates in and out of the strike plate of the door jamb.
With a spring bolt exposed, can you close the door?
Yes
With a dead bolt exposed, can you close the door?
No
What is lock picking?
The art of opening a lock without a key
How are lock picks used?
Lock Picks can be used to lift the pins in a pin tumbler lock
What is lock Bumping:?
Lock Bumping: Use a shaved down key that will fit into the lock. Attacker fits the key into the lock and whacks it a few times to cause the pins to jump and the attacker quickly turns the key and opens the lock.
can all locks be picked or bumped?
All locks can be picked or bumped. The question is how long will it take.
What is a Master Key?
The master key opens all locks in a given zone.
What is a Core Key?
The core key is used to remove the lock core in interchangeable locks.
Name three controls you can use to protect the Master Key and the Core Key.
1: Keep the key in a secure place
2: Only allow a few critical employees access
3: Accountability
Name four limitations to combination locks?
1: Limited accountability due to shared combinations.
2: Prolonged use of Buttons or keypads can cause wear on the most used buttons.
3: Prone to brute force attack
4: Prone to shoulder surfing
Name three uses for Smart Cards?
1: Keys for electronics locks
2: credit card purchases (many international cards)
3: Dual-factor authentication systems.
What does the “Smart” mean in Smart Cards?
“Smart” means that card contains a computer circuit
What is another name for Smart Cards?
Also called Integrated Circuit cards (ICC)
IN regards to Smart Cards, what does ICC stand for?
Integrated Circuit cards (ICC)
In regards to Smart Cards, what are two methods for communicating witht electronic locks ?
1: Contact (where the card must be inserted)
2: Contactless (wirelessly)
In regards to Contactless Smart Cards, what is one technology example?
Radio Frequency Identification (RFID)
In regards to Contactless Smart Cards, how does Radio Frequencey Identification (RFID) work?
1: Cards contain RFID Tags (Transponders)
2: Read by RDIF transceivers
What are Smart Cards used for?
Used in combination electronic locks to provide physical access control
Whay are Smart Cards better than mechanical locks?
better then mechanical locks because of audit capability
What is the difference between a Smart Cards and a Magnetic Stripe card?
The stripe in a magnetic stripe card is passive; read only.
In regard to Smart Card systems. what is the Common Access Card (CAC)?
A multipurpose Smart Card deployed by the US Department of Defense.
In regard to Smart Card systems. what does CAC stand for?
Common Access Card
In regard to Smart Card systems. name the three functions of the DOD Common Access Card
1: physical access control
2: dual-factor authentication
3: Digitally signing documents
In regard to Smart Card systems. how does the DOD Common Access Card work?
Stores cryptographic certificates as part of the DOD’s Public Key Infrastructure (PKI)
What is Tailgating/Piggybacking
An unauthorized person follows an authorized person into the building after the authorized person unlocks the door.
In regards toTailgating/Piggybacking, what is one example of using Social Engineering to improve the success rate?
Added social engineering element (carrying large boxes) may aid the attacker
What type of control is a Mantrap?
A preventive physical control
What is a Mantrap?
A preventive physical control with two doors.
The first door must close and lock before the second door can open
Each door requires a separate form of authentication
What is a turnstile designed to do?
Designed to prevent tailgating
What is the most important design characteristics in a turnstile and a mantrap?
Both must be designed to allow safe egress during emergencies
Name two things that you can use Contraband Checks for
Used to detect incoming metals, weapons, explosives and illegal drugs.
Used to detect outgoing sensitive data
Example: Port Blocking
In regards to motion detectors, how do Ultrasonic and Microwave systems work
like Doppler radar
A wave of energy is sent out and the echo is returned. If an echo returns more quickly then it normally does, that indicates something has stepped in front of the sensor.
In regards to motion detectors, how does Photoelectric systems work?
Sends a beam of light across a monitored space to a sensor. If the beam is broken, the sensor alerts.
In regards to motion detectors,
What is the common characteristic of Ultrasonic, Microwave and Photoelectric sensors
They are all active sensors; they actively send energy.
In regards to motion detectors,
What is one example of a passive sensor?
Passive Inared (PIR): detects energy created by the human body.
In regards to motion detectors,
What does PIR stand for?
Passive Inared (PIR): detects energy created by the human body.
In regards to motion detectors,
What is the difference between physical intrusion detection and network intrusion detection?
Motion Detectors provide physical Intrusion Detection.
Network Intrusion Detection detect attacks on the network.
In regards to perimeter alarms,
How doe Magnetic door and window alarms work?
They include matched pairs of sensors on the device that an electric circuit flows through. If the circuit is broken, the alarm sounds.
In regards to perimeter defense of doors,
Name five design charateristics
1: Door hinges should face inward
2: Egress must be unimpeded during emergencies
3: No gaps in the door
4: Doors with motion sensors should not have mail slots
5: Externally-facing emergency doors should be marked for Emergency Use Only and equipped with panic bars that alarm if anybody opens them.
In regards to perimeter defense of Walls and Ceilings,
Name four design charateristics
1: Internal motion sensors should be bolted securely to a fixed sturdy ceiling or wall to prevent an attacker to cause it to move
2: Should be slab-to-slab.
3: Should be strong enough to resist cutting (Sheetrock – gypsum can be easily cut)
4; Fire Rating: The amount of time required to fail due to a fire not less than one hour
In regards to perimeter defense of glass windows and doors,
what type of control should be in place?
compensating control.
In regards to perimeter defense of glass windows and doors,
Name five types of compensating control materials that you might consider
1: Bullet proof
2: Explosive-resistant
3: Wire mesh
4: Polycarbonate (Lexan)
5: Acrylic (Plexiglass)
In regards to perimeter defense of glass windows and doors,
Name five types of compensating control materials that you might consider
1: Bullet proof
2: Explosive-resistant
3: Wire mesh
4: Polycarbonate (Lexan)
5: Acrylic (Plexiglass)
In regards to perimeter defense of Walls and Ceilings,
what is a fire rating?
The amount of time required to fail due to a fire
In regards to perimeter defense of Walls and Ceilings,
what is The National Fire Protection Agency (NFPA) 75?
Standard for the Protection of Information Technology Equipment
In regards to perimeter defense of Walls and Ceilings,
what is the Standard for the Protection of Information Technology Equipment
The National Fire Protection Agency (NFPA) 75
In regards to perimeter defense,
what are the six Access Control types?
1: Preventive
2: Detective
3: Corrective
4: Recovery
5: Deterrent
6: Compensating
In regards to perimeter defense,
name four things that a guad does
1: Inspection of Access Credentials
2: Monitoring of CCTVs
3: Monitoring of Environmental Controls
4: Incident response
In regards to perimeter defense,
what is the difference between a d professional guard and a non-professional guard?
Professional Guards have attended advanced training
In regards to perimeter defense,
what is Pseudo Guard?
Pseudo Guard means an unarmed guard.
In regards to perimeter defense,
how do you ensure that teh guard is doing what needs to be done?
Guard orders should be complete and clear and trained routinely.
In regards to perimeter defense,
what is a guard dog good for?
Perimeter Defense guarding rigid turf.
In regards to perimeter defense,
what type of control is a guard dog ?
Deterrent and Detective
In regards to perimeter defense,
what is a risk to using guard dogs?
Legal Liability.
In regards to perimeter defense,
name two methods of restricting areas
1: Areas may be restricted by space (authorized personnel Only)
2: Areas may be restricted by time
In regards to perimeter defense,
name three examples of how to restrict by time
1: Electronic badges automatically expire
2: Printing the valid date in bold on the badge
3: Using different colored badges for different days of the week
When building a secure facility, what are the three steps?
1: Site Selection
2: Design
3: Configuration
What is the most important characteristic to remember when building a secure facility?
Physical safety of personnel is the top priority for every decision.
In regards to Site Selectrion Issues,
what does greenfield mean?
(undeveloped land) process of choosing a site to construct a building.
In regards to Site Selectrion Issues,
what does topography mean?
The physical shape of the land.
In regards to physical securityi design Issues,
name two things you can use topography for?
1: Steer ingress and egress to controlled points
2: Alter the topography as a defensive measure