MOD 7 - Physical Security Flashcards
What does physical security protect against?
Physical threats
What are examples of physical threats?
Fire/Smoke
Water
Earth Movement (Earthquakes, landslides, volcanoes)
Storms
Explosion/Destruction
What is secure facility plan?
Outlines the security needs of your organization and emphasizes methods and mechanisms to employ to provide security.
How is secure facility plan developed?
Through critical path analysis
What is critical path analysis?
provides complete picture of the interdependencies (links) and interactions necessary to sustain an organization
What is technology convergence?
the tendency for technology, utilities, solutions and systems to evolve and merge over time
What should security staffs assist with in secure facility plan?
site and facility design
What is secure facility plan based on?
A layered defense model
What should you pay attention to when it comes to site selection?
Does it meet the needs of an organization?
Are security requirements a top priority?
Location and Construction materials
Low crime area
Proximity to other buildings
Environmental threats
Visibility
Natural Disasters
Facility Design
What is industrial camouflage?
An attempt to mask or hide actual function, purpose or operations of a facility by providing a facade.
What is Crime Prevention Through Environmental Design (CPTED)?
When you structure the physical environment and surroundings to influence individual decisions that potential offenders make before committing any criminal acts.
What is Natural access control?
Subtle guidance of those entering and leaving a building through placement of entranceways or lights
What is Natural survelliance?
Making criminals feel uneasy through the increasing of opportunities for them to be observed
What is Natural territorial reinforcement?
An attempt to make the area feel like an inclusive caring community.
What are the three types of site and facility security controls?
Administrative physical security controls
Technical physical security controls
Physical controls for physical security
What is Administrative Physical security control?
Awareness training, site management, personnel controls, emergency response and procedures
What is technical physical security control?
CCTV , access controls, intrusion detection, alarms, air conditioning (HVAC) power supplies..
What is Physical security control
Door locks, fencing, lightning, dogs, guards, construction materials
What are the functional order of control?
Deterrence [stop before it happens]
Denial
Detection
Delay
Determine
Decide
What is the difference between non-mission critical and mission critical?
Non-mission critical is if an organization can go without the equipment for more than 48 hours any thing less than that is mission critical.
What is MTTF?
Mean Time to Failure
Expected functional lifetime to perform a repair on a device
What is MTTR?
Mean Time To Repair
Average length of time to perform a repair on a device
What is MTBF?
Mean Time Between Failures
Average time between the first and any other failure
TRUE OR FALSE
MTTF AND MBTF values are the same/fairly similar
True
What is a cable plant?
A collection of interconnected cables and intermediary devices that establish a physical network
What is Entrance Facility?
the entrance point to the building where the cable from the provider connects the internal cable plant
Equipment room
main wiring closet for the building
Backbone Distribution System
Provides wired connections between the equipment rooms and the telecommunications rooms, including cross-floor connections.
Wiring closet
serves connection needs of a floor or a section of a large building by providing space for networking equipment and cabling systems.
Horizontal Distribution System
provides connection between the telecommunication room and work areas
Protected Cable distribution or protective distribution systems
means by which cables are protected from unauthorized access or harm
TRUE OR FALSE?
Server rooms, data centers, communications rooms, wiring closets, server vaults, and IT closets are enclosed, restricted, and protected rooms where your mission-critical servers and network devices are housed
True
What should you keep in mind when designing a server room?
Halotron/PyroGen or other halon-substitute oxygen-displacement fire detection and extinguishing systems
Low temperatures
Little or no lighting
Equipment stacked with little room to maneuver
TRUE OR FALSE
Server rooms are not located at core of building and away from gas/water/sewer lines; not ground or top floor or basement
False
TRUE OR FALSE
Server rooms should have 1 hour minimum fire rating walls
True
Data Center
Could be an external location separate from a server room used to house the bulk of backend computer servers, data storage equipment and network management equipment
What are the data center controls?
smart/dumb cards, proximity readers, biometrics, intrusion detection systems (IDS), and a design based around defense in depth
Smartcards
Badges, identification cards, or security IDs are forms of physical identification and/or electronic access control devices.
What are weaknesses of smartcards?
physical attacks, logical attacks, Trojan horse attacks, or social-engineering attacks
Proximity Devices
Used to to control physical access, they can be passive device, field powered device or a transponder
Intrusion Detection Systems
Systems – automated or manual - designed to detect an attempted intrusion, breach, or attack; use of an unauthorized entry/point; or occurrence of some specific event at an unauthorized or abnormal time.
What are some physical IDS?
security guards, automated access controls, and motion detectors as well as other specialty monitoring techniques.
Heartbeat Sensor
mechanism by which the communication pathway is either constantly or periodically checked with a test signal. If communication fails, alarm automatically triggers.
Motion Detectors
Device that senses movement or sound in a specific area
What are the different types of motion detectors?
Infrared (PIR – passive infrared) or heat-based looks for meaningful changes in heat levels
Wave pattern – monitors for significant changes in the reflected pattern
Capacitance – senses changes in electrical or magnetic field surrounding a monitored object
Photoelectric – senses changes in visible light levels for area
Passive audio – listens for abnormal sounds
Intrusion Alarms
An alarm is a separate mechanism that triggers a deterrent, a repellent, and/or a notification.
What are the different types of intrusion alarms?
Deterrent Alarm – shut/lock doors; make further intrusion or attack more difficult
Repellant Alarm – audio sound, bell, light; discourage intruders/force off property
Notification Alarm – silent but record incident data; bring authorized personnel to location
Local Alarm System – broadcast audible alarm (up to 120 decibles/400 ft away; protected from tampering; security team positioned nearby
Central Station System – silent alarm/offsite agents
Auxiliary Station – can be added to centralized or local; when breached emergency services notified
What must be in place to monitor access abuse?
A security guard
What are the different types of access abuse?
Masquerading – using someone else’s security ID to gain entry into a facility
Piggybacking – (tailgating) following someone through a secured gate or doorway without being identified or authorized personally
How can we prevent access abuse?
Creating audit trails and access logs to figure out anomalies
Monitor entry/exit points with security cameras
Media storage facilities
Designed to securely store blank media, reusable media, and installation media
What is a utitilities and HVAC considerations?
Equipment damage from power fluctuations can be a common occurrence
UPS (Uninterruptable Power Supply)
a type of self-charging battery that can be used to supply consistent clean power to sensitive equipment
TRUE OR FALSE
A backup battery or a fail over battery is a form of UPS
False
POWER RELATED TERMS
browse through
Fault – momentary loss of power
Blackout – complete loss of power
Sag – momentary low voltage
Brownout – Prolonged low voltage
Spike – momentary high voltage
Surge – prolonged high voltage
Inrush – initial surge of power usually associated with connecting to a power source, whether primary or alternate/secondary
Noise – steady interfering power disturbance or fluctuation
Transient – short duration of line noise disturbance
Clean – nonfluctuating pure power
Ground – Wire in an electrical circuit that is grounded
Noise
Noise generated by electric current can affect any means of data transmission that relies on electromagnetic transport mechanisms, such as telephone, cellular, television, audio, radio, and network mechanisms.
What are the two types of EMI?
Common Mode – generated by a difference in power between the hot and ground wires of a power source or operating electrical equipment
Traverse Mode – generated by a difference in power between the hot and neutral wires of a power source or operating electrical equipment
RFI
Radio-frequency interference – another source of noise and interference that can affect many of the same systems as EMI – RFI generating appliances – fluorescent lights, electrical cables, electric space heaters, computers, elevators, motors, and electric magnet
TRUE OR FALSE
Rooms intended to house computers should be kept between 60 and 75 degrees Fahrenheit
True
TRUE OR FALSE
Humidity should be maintained between 40 and 60 percent
True