Lesson 21 Flashcards

1
Q

Physical Access controls

A

Physical access controls depend on the same access control fundamentals as network
or operating system security:

• Authentication—create access lists and identification mechanisms to allow
approved persons through the barriers.
• Authorization—create barriers around a resource so that access can be controlled
through defined entry and exit points.
• Accounting—keep a record of when entry/exit points are used and detect security
breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authentication (physical Access Control)

A

• Authentication—create access lists and identification mechanisms to allow
approved persons through the barriers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authorization (physical Access Control)

A

• Authorization—create barriers around a resource so that access can be controlled
through defined entry and exit points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Accounting (physical Access Control)

A

• Accounting—keep a record of when entry/exit points are used and detect security
breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Site Layout, Fencing, and Lighting

A

Site layout
•Zone-based design to accommodate traffic flows and surveillance
•Signage
•Industrial camouflage

Barricades and entry/exit points
•Bollards

Fencing

Lighting
•Make staff feel secure
•Assist surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Industrial camouflage

A

Conversely, entry points to secure zones should be discreet. Do not allow an
intruder the opportunity to inspect security mechanisms protecting such zones (or
even to know where they are). Use industrial camouflage to make buildings and
gateways protecting high-value assets unobtrusive, or create high-visibility decoy
areas to draw out potential threat actors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

fencing

A

The exterior of a building may be protected by fencing. Security fencing needs to be
transparent (so that guards can see any attempt to penetrate it), robust (so that it is
difficult to cut), and secure against climbing (which is generally achieved by making it tall
and possibly by using razor wire). Fencing is generally effective, but the drawback is that
it gives a building an intimidating appearance. Buildings that are used by companies to
welcome customers or the public may use more discreet security methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Lighting

A

Lighting
•Make staff feel secure
•Assist surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Lock types

A
Lock types
•Physical (conventional/deadbolt)
     •Electronic
     •Cipher/combination
     •Magnetic swipe card
     •Smart card/proximity reader
•Biometric
•Access control vestibules/mantraps and turnstiles
•Cable locks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Mantraps and turnstiles

Access control vestibule = mantrap

A

Apart from being vulnerable to lock picking, the main problem with a simple door or
gate as an entry mechanism is that it cannot accurately record who has entered or left
an area. Multiple people may pass through the gateway at the same time; a user may
hold a door open for the next person; an unauthorized user may “tailgate” behind an
authorized user. This risk may be mitigated by installing a turnstile (a type of gateway
that only allows one person through at a time). The other option is to add some sort of
surveillance on the gateway. Where security is critical and cost is no object, an access
control vestibule, or mantrap, could be employed. A mantrap is where one gateway
leads to an enclosed space protected by another barrier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cable Locks

A

Cable locks attach to a secure point on the device chassis. A server chassis might come
with both a metal loop and a Kensington security slot. As well as securing the chassis
to a rack or desk, the position of the secure point prevents the chassis from being
opened, without removing the cable first.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Physical Attacks Against Smart Cards and USB

A

Smart card attacks
•Cloning
•Skimming
•Card types and vulnerability level

Malicious USB/juice-jacking
•USB data blocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

card cloning

A

Card cloning—this refers to making one or more copies of an existing card. A
lost or stolen card with no cryptographic protections can be physically duplicated.
Card loss should be reported immediately so that it can be revoked and a new one
issued. If there were a successful attack, it might be indicated by use of a card in a
suspicious location or time of day.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Skimming

A

Skimming—this refers to using a counterfeit card reader to capture card details,
which are then used to program a duplicate. Some types of proximity card can quite
easily be made to transmit the credential to a portable RFID reader that a threat
actor could conceal on his or her person. Skimmers installed on public readers, such
as ATM machines, can be difficult to spot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

•Card types and vulnerability level

A

These attacks can generally only target “dumb” smart cards that transfer tokens rather
than perform cryptoprocessing. Bank-issued smart cards, referred to as EMV (Electron,
MasterCard, Visa), can also be vulnerable through the magnetic strip, which is retained
for compatibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Malicious USB/juice-jacking

A

•USB data blocker

Malicious USB charging cables and plugs are also a widespread problem. As with card
skimming, a device may be placed over a public charging port at airports and other
transit locations. A USB data blocker can provide mitigation against these juicejacking
attacks by preventing any sort of data transfer when the smartphone or laptop
is connected to a charge point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Alarm and Sensor Systems

A

5 main types of alarms

Circuit
•Open or closed
•Detect intrusion through a barrier

Motion detection
•Radar or infrared
•Detect intrusion in a space

Noise detection

Proximity readers

Duress
•Fixed or mobile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Circuit

A

Circuit
•Open or closed
•Detect intrusion through a barrier

Circuit—a circuit-based alarm sounds when the circuit is opened or closed,
depending on the type of alarm. This could be caused by a door or window opening
or by a fence being cut. A closed-circuit alarm is more secure because an open
circuit alarm can be defeated by cutting the circuit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Motion detection

A

Motion detection—a motion-based alarm is linked to a detector triggered by any
movement within an area (defined by the sensitivity and range of the detector), such
as a room. The sensors in these detectors are either microwave radio reflection
(similar to radar) or passive infrared (PIR), which detect moving heat sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Noise detection

A

Noise detection—an alarm triggered by sounds picked up by a microphone. Modern
AI-backed analysis and identification of specific types of sound can render this type
of system much less prone to false positives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Proximity Readers

A

Proximity—radio frequency ID (RFID) tags and readers can be used to track the
movement of tagged objects within an area. This can form the basis of an alarm
system to detect whether someone is trying to remove equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Duress

A

Duress
•Fixed or mobile

Duress—this type of alarm is triggered manually by staff if they come under
threat. There are many ways of implementing this type of alarm, including wireless
pendants, concealed sensors or triggers, and DECT handsets or smartphones. Some
electronic entry locks can also be programmed with a duress code that is different
from the ordinary access code. This will open the gateway but also alert security
personnel that the lock has been operated under duress.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Security Guards and Cameras

A
Security guards
•Police entry points
•Operate surveillance mechanisms
•Respond to alarms
Expensive
Remote surveillance and monitoring
•Video/CCTV
•Motion recognition
•Object detection
•Robot sentries
•]Drones/UAV
24
Q

CCTV (closed circuit television)

A

CCTV (closed circuit television) is a cheaper means of providing surveillance than
maintaining separate guards at each gateway or zone, though still not cheap to set up
if the infrastructure is not already in place on the premises. It is also quite an effective
deterrent. The other big advantage is that movement and access can be recorded. The
main drawback compared to the presence of security guards is that response times are
longer, and security may be compromised if not enough staff are in place to monitor
the camera feeds.

25
Q

Motion recognition

A

Motion recognition—the camera system might be configured with gait identification
technology. This means that the system can generate an alert when anyone moves
within sight of the camera and the pattern of their movement does not match a
known and authorized individual.

26
Q

•Object detection

A

the camera system can detect changes to the environment, such
as a missing server, or unknown device connected to a wall port.

27
Q

Robot sentries—

A
surveillance systems (and in some cases weapon systems) can be
mounted on a wholly or partially autonomous robot (switch.com/switch-sentry).
28
Q

Drones/UAV

A

Drones/UAV—cameras mounted on drones can cover wider areas than groundbased
patrols (zdnet.com/article/best-security-surveillance-drones-for-business).

29
Q

Reception Personnel and ID Badges

A

Challenge policy

Reception personnel and visitor logs
•Sign-in/sign-out
•Visitor information

Two-person integrity/control

ID badges

30
Q

Challenge policy

A

One of the most important parts of surveillance is the challenge policy. This sets out
what type of response is appropriate in given situations and helps to defeat social
engineering attacks. This must be communicated to and understood by the staff.
Challenges represent a whole range of different contact situations. For example:

• Challenging visitors who do not have ID badges or are moving about
unaccompanied.
• Insisting that proper authentication is completed at gateways, even if this means
inconveniencing staff members (no matter their seniority).
• Intruders and/or security guards may be armed. The safety of staff and compliance
with local laws has to be balanced against the imperative to protect the company’s
other resources.
It is much easier for employees to use secure behavior in these situations if they know
that their actions are conforming to a standard of behavior that has been agreed upon
and is expected of them.

31
Q

Reception personnel and visitor logs

A

Reception personnel and visitor logs
•Sign-in/sign-out
•Visitor information

An access list held at the reception area for each secure gateway records who is
allowed to enter. An electronic lock may be able to log access attempts or a reception
staff can manually log movement. At the lowest end, a sign-in and sign-out sheet can
be used to record authorized access. Visitor logging requirements will vary depending
on the organization, but should include at least the name and company being
represented, date, time of entry and departure, reason for visiting, and contact within
the organization.

32
Q

Two-person integrity/control

A

Reception areas for high-security zones might be staffed by at least two people at all
times, providing integrity for entry control and reducing the risk of insider threat.

33
Q

ID Badges

A

A photographic ID badge showing name and (perhaps) access details is one of the
cornerstones of building security. Anyone moving through secure areas of a building
should be wearing an ID badge; anyone without an ID badge should be challenged.
Color-coding could be used to make it obvious to which zones a badge is granted
access.

34
Q

Secure Areas

A
  • Server rooms and data centers
  • Lockable cabinets
  • Colocation cages
  • Air gaps and demilitarized zones
  • Safes
  • Vaults
35
Q

Air Gap/Demilitarized Zone

A

An air gapped host is one that is not physically connected to any network. n.

An air gap within a secure area serves the same function as a demilitarized zone. It is
an empty area surrounding a high-value asset that is closely monitored for intrusions.

36
Q

Protected cable distribution/protected distribution system (PDS)

A

A physically secure cabled network is referred to as protected cable distribution or as a
protected distribution system (PDS). There are two principal risks:•Prevent eavesdropping

•Prevent/delay cable cutting DoS

37
Q

Faraday Cage

A

Faraday Cage. The cage is a charged conductive mesh that blocks
signals from entering or leaving the area. The risk of eavesdropping from leakage
of electromagnetic signals was investigated by the US DoD who defined TEMPEST
(Transient Electromagnetic Pulse Emanation Standard) as a means of shielding the
signals.

38
Q

TEMPEST

A

(Faraday Cage) The risk of eavesdropping from leakage
of electromagnetic signals was investigated by the US DoD who defined TEMPEST
(Transient Electromagnetic Pulse Emanation Standard) as a means of shielding the
signals.

39
Q

Heating, Ventilation, Air Conditioning

A

I skipped this one. don’t think i need to study it

40
Q

Hot and Cold Aisles

A

Refer to diagram if you need to. this is pretty simple

  • Optimize air flow
  • Place servers back-to-back
  • Hot aisle/cold aisle
  • Do not allow contamination of cooled air by warmed air
41
Q

Fire safety

A

Fire safety
•Fire exits and evacuation procedures
•Fire-resistant building design (doors and walls fire resistant so fire does not spread
•Smoke/flame detectors/alarms

42
Q

Fire Extinguishers

A

Class C for use around electrical hazard

Notably, Class C extinguishers use
gas-based extinguishing and can be used where the risk of electric shock makes other
types unsuitable.

43
Q

Fire suppression

A

Fire suppression systems work on the basis of the fire triangle. The fire triangle
works on the principle that a fire requires heat, oxygen, and fuel to ignite and burn.
Removing any one of those elements provides fire suppression (and prevention).

44
Q

Sprinklers

A
Sprinklers
•Dry pipe
•Pre-action
•Halon
•Clean Agent
45
Q

Dry pipe

A

Dry-pipe—these are used in areas where freezing is possible; water only enters this
part of the system if sprinklers elsewhere are triggered.

46
Q

Pre-action

A

a pre-action system only fills with water when an alarm is triggered;
it will then spray when the heat rises. This gives protection against accidental
discharges and burst pipes and gives some time to contain the fire manually before
the sprinkler operates.

47
Q

Halon

A

Halon—gas-based systems have the advantage of not short circuiting electrical
systems and leaving no residue. Up until a few years ago, most systems used Halon
1301. The use of Halon has been banned in most countries as it is ozone depleting,
though existing installations have not been replaced in many instances and can
continue to operate legally.

48
Q

Clean Agent

A

Clean agent—alternatives to Halon are referred to as “clean agent.” As well as not
being environmentally damaging, these gases are considered nontoxic to humans.
Examples include INERGEN (a mixture of CO2, argon, and nitrogen), FM-200/HFC-
227, and FE-13. The gases both deplete the concentration of oxygen in the area
(though not to levels dangerous to humans) and have a cooling effect. CO2 can be
used too, but it is not safe for use in occupied areas.

49
Q

Secure Data Destruction

A
  • Media sanitization/remnant removal
  • Physical destruction
    • Burning/incineration
    • Shredding/pulping
    • Pulverizing
    • Degaussing
  • Use of third-parties and certificates of destruction
50
Q

•Media sanitization/remnant removal

A

Media sanitization and remnant removal refer to erasing data from hard
drives, flash drives/SSDs, tape media, CD and DVD ROMs before they are disposed of
or put to a different use. Paper documents must also be disposed of securely. Data
remnants can be dealt with either by destroying the media or by purging it (removing
the confidential information but leaving the media intact for reuse).

51
Q

Use of third-parties and certificates of destruction

A

Due to the cost of facilities, physical destruction is likely to be contracted to a third
party. It is important to use a reputable service provider and to obtain a detailed
inventory of how each media item was sanitized and certificates of destruction.

52
Q

Secure disposal of electronic data remnants

A
  • Secure disposal of electronic data remnants
  • Overwriting/disk wiping
    • Zero filling
    • Multiple passes
  • Secure Erase (SE)
    • Hard disk drives (HDD)
    • Solid state drives (SSD)/flash media
  • Instant Secure Erase (ISE)/crypto erase
    • Self-encrypting drives (SED)
    • Delete media encryption key
53
Q
  • Overwriting/disk wiping
    • Zero filling
    • Multiple passes
A

•Zero filling - The standard method of sanitizing an HDD is called overwriting. This can be performed
using the drive’s firmware tools or a utility program. The most basic type of overwriting
is called zero filling, which just sets each bit to zero..

Single pass zero filling can leave
patterns that can be read with specialist tools.

Multiple passes - more secure method is to overwrite
the content with one pass of all zeros, then a pass of all ones, and then a third pass in a
pseudorandom pattern. Some secret service agencies require more than three passes.
Overwriting can take a considerable amount of time to complete, depending on the
number of passes.

54
Q
  • Secure Erase (SE)
    • Hard disk drives (HDD)
    • Solid state drives (SSD)/flash media
A

Reliable forHDD. Not for SDD.

Since 2001, the SATA and Serial Attached SCSI (SAS) specifications have included a
Secure Erase (SE) command. This command can be invoked using a drive/array utility
or the hdparm Linux utility. On HDDs, this performs a single pass of zero filling.

For SDDs not reliable

55
Q
  • Instant Secure Erase (ISE)/crypto erase
    • Self-encrypting drives (SED)
    • Delete media encryption key
A

Better than Secure Erase.