Module 04: Network Security Controls -Administrative Controls Flashcards
Necessitates the shutdown of all outdoor activities. Leads to power and voltage fluctuations that in turn affect the working of the system.
Lightning and Thunder
Leads to issues such as corrosion and short-circuits, and damages magnetic tapes and optical storage units.
Temperature and humidity
Transfer of data between end users
Transport Layer
Transfer data packets
Network Layer
Transfer data between nodes on a network segment across the physical layer.
Data link Layer
These controls prevent security violations and enforce various access control mechanisms. Controls may be physical, administrative, or technical. Examples include door lock, security guard, etc.
Preventative Controls
These Controls may not prevent access directly. They are used to discourage attackers and send warning messages to the attackers to discourage an intrusion attempt. Examples include various types of warning signs.
Deterrent Controls
These Controls are used as an alternative control when the indexed controls fail or cannot be used. They do not prevent any attack attempt but try to restore using other means like restoring from backup.
Compensating Controls
These controls are used in a more serious condition to recover from security violation and restore information and systems to a persistent state. Examples include disaster recovery, business continuity plans, backup systems, etc.
Recovery Controls
Most commonly used for personal computers. An offline battery backup facilitating the maintenance of the primary device from a power fluctuation.
Standby
Most commonly used for server rooms. These are mainly used to supply power below 10k VA. It is connected to the battery during a power failure.
Stand by On-line hybrid
Most commonly used for small business, web, and departmental servers. Mainly deals with maintaining continuous power fluctuations.
Line Interactive
Transformer that is used for filtering the output. It is no longer commonly used because it becomes unstable when operating a modern computer power supply load.
Standby-Ferro
It is made up of glass or plastic and is least susceptible to wiretapping threats
Fiber Optic
Made up of a single copper conductor at its center. A plastic layer provides an insulated center conductor and a braided metal shield. The metal shield prevents interference from fluorescent lights, motors, etc.
Coaxial Cable
Each pair of wires is individually shielded with foil. It is less susceptible to external interference as the shielding absorbs all the EMI and RFI signals.
Shielded Twisted Pair
It reduces the crosstalk and interference between pairs of wires. UTP cables is prone to wiretapping. An attacker can easily tap the information flowing through network cables.
Unshielded Twisted Pair
Most appropriate air conditioning system used mainly in locations where the space required for fixing all the components of a split system is available.
Packaged Heating and Air-Conditioning System
Most commonly used in locations where the traditional split systems cannot be used.
Duct- Free Split Heating and Air Conditioning System
This is an advanced version of a split system having better energy effectiveness. Here, the heat pump provides an electrically fueled HVAC instead of a gas furnace heat.
Hybrid Heat Split System
The most traditional and commonly used HVAC system. You may find the components of the system both inside and outside the building
Heating and Air-Conditioning Split System
It is a systematic arrangement of equipment to maintain air flow and to save energy. Many organizations follow hot and cold aisle alignment, mostly used in server rooms data centers, etc. where heavy electronic equipment comes into use. It saves the hardware from humidity and heat, increases hardware performance and maintains consistent room temperature.
Hot and Cold Aisles
Electromagnetic radiation emitted from different electronic devices interferes with surrounding devices and causes a problem with their functions. High levels of disturbance can cause severe damage such as shaky monitors systems failures, unexplained shutdowns, etc.
Electromagnetic interference shielding