Physical Security Flashcards

1
Q

Physical security

A

Measures to protect, tangible assets (buildings, equipment, people) from harm or unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Physical Security Controls

A
  • fencing and bollards
  • brute force attacks
  • surveillance systems
  • access control vestibules
  • access badges
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fencing and Bollards

A

Fences - barriers made of posts and wire or boards to enclose or separate areas

Bollards - short, sturdy vertical posts controlling or preventing vehicle access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Brute force attacks

A
  • Forcible entry
  • Tampering with security personnel
  • Confronting security personnel
  • Ramming a barrier with a vehicle
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Surveillance Systems

A
  • An organized strategy to observe and report activities

components:
- Video surveillance
- security guards
- lighting
- sensors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Access Control Vestibules

A

Double door system electronically controlled to allow only one door open at a time
- prevents piggybacking and tailgating
- usually integrated with electronic badges and operated by security guard at the entrance to a secure facility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Piggybacking

A

Involves two people working together - one person has legit access intentionally allowing another person who doesn’t have proper authorization to enter a secure area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Tailgaiting

A

Occurs when an unauthorized person closely follows someone through the access control vestibule who has legit access to the secure space without their knowledge or consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Door Locks

A
  • Padlocks
  • Pin and tumbler locks
  • Numeric locks
  • Wireless locks
  • Biometric locks
  • Cipher locks
  • Electronics access control systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Access Badges

A

Use of Radio Frequency Identification (RFID) or Near Field Communication (NFC) or magnetic strips

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security guards

A

after at access control vestibules because they provide
- visual detterent
- assistance
- check identity
- response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Biometric challenges

A

False Acceptance Rates (FAR) - occurs when the system erroneously authenticates an unauthorized user; can be lowered by increasing scanner sensitivity

False Rejection Rate (FRR) - Denies access to an authorized user; adjusting sensitivity can increase FRR

Crossover Error Rate (CER) - A balance between FAR AND FRR for optimal authentication effectiveness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cipher Locks

A

Mechanical locks with numbered push buttons, requiring a correct combination to open
- commonly used in high security area like sever rooms
- secure entry areas in office buildings, often using electronic access systems with badges and PINs for authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Access Badge Cloning

A

Copying the data from an RFID or NFC card badge onto another card or device

Step 1: Scanning - scan or read the targeted individual’s access badge
Step 2: Data Extraction - attacker extract the relevant authentication credentials from the card like unique id or set of encrypted data
Step 3: Writing to a new card or device - transfer the info to a new card or compatible device
Step 4: Attackers gain unauthorized access to buildings, computer systems, or make payments using a cloned NFC- enabled card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How to stop access badge cloning

A
  • Implement advanced encryption in you card-based authentication system
  • MFA
  • Regularly update your security protocols
  • Educate users
  • implement the use of sheilded wallets or sleeves with your RFID access badges
  • Monitor and audit your access logs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly