Physical Security Flashcards
this type of physical security is helpful against: Trespassing, Theft, Vandalism, and Unauthorized facility access
Fences
this type of physical security is Robust, short vertical posts, made of steel or concrete, that are designed to manage or redirect vehicular traffic.
bollards
this type of attack is where access to a system is gained by trying all of the possibilities until breaking through.
Brute force
Examples of Brute Force include:
Forcible entry
Tampering with security devices
Confronting Security Personnel
Ramming a barrier with a Vehicle
This is a Organized strategy or setup designed to observe and report activities in a given area. Examples would be a security guard sitting at a desk, a network of sensors, lighting, and cameras,:
Surveillance System
Video surveillance, categorized as CCTV, indoor or outdoor cameras, can include the following:
Motion Detection -
Night Vision
Facial Recognition
Remote access
Great camera feature that can move the camera or its angle to better detect issues during an intrusion is:
Pan-Tilt-Zoom ( PTZ )
Best places to put cameras are:
Data Center
Telecommunication Closets
Entrance or exit areas
More flexible and adaptable forms of surveillance that organizations use are:
Security guards
Proper _________ is crucial for conducting effective surveillance using both video and security guards.
lighting
these devices detect and respond to external changes in the environment and convert the information into readable signals or data.
Sensors
the 4 basic types of sensors are:
Infrared - emitted by warm bodies like humans or animals
Pressure - floor or mats
Microwave - pulses and measuring reflections off objects
Ultrasonic - automated doors, measures ultrasonic wave and reflections
Ways for attackers to bypass surveillance systems include:
Visual Obstruction - tape, paint, umbrella
Blinding Sensors and cameras - overwhelming with lot of light, heating up room
Acoustic interference -
electromagnetic interference
Physical environment attack
3 ways to help prevent / guard against attackers getting through your surveillance systems are:
Tamper alarms on your cameras
Backup power supplies
encrypt frequencies - to help against acoustic or electromagnetic interference
One of the most effective physical control measures that is a double-door system that is designed with 2 doors that are electronically controlled to ensure that only one door can be opened at a given time is known as:
Access Control Vestibule
When you follow someone through a secure door with that person’s consent you are:
Piggybacking
When you follow someone through a secure door without that person knowing you are:
Tailgating
___________________ help prevent from users Piggybacking or tailgating as normally there is just not enough room.
Access Control Vestibules
these are also used with Access Control Vestibules as a last means of getting into the facility:
Access Badges
Badges are often equipped embedded technologies
Radio-Frequency identification (RFID)
Near-Field communication (NFC)
Magnetic Strips
These help with being a “Visual Deterrent”, provided Assistance, can check the visitors identity, also be a way of responding to all issues are known as :
Security Guards
The following three create a multi-layer approach to increasing our physical security:
Access Control Vestibules
Access Badges
Security Guards
What is the best way to keep people out of those offices that have sensitive information, a physical security control that is designed to secure entryways?
Door locks
most common door lock that’s used is or has a:
Identification number style
other types of locks include
biometric - physical characteristics something you are, fingerprint, eye retina
wireless
What is the rate that the system authenticates a user as valid, even though that person should not have been granted access to the system?
False Acceptance Rate ( FAR )
to prevent unauthorized people from entering the building, ideally you want to get that FAR down to __________ by increasing the sensitivity of the scanners.
zero
What is it called when the biometrics system denies a user who should have been allowed access to the system
False Rejection Rate ( FRR )
This uses a measure of the effectiveness of a given biometrics system to achieve a balance, also is called the Crossover Error Rate/the time when the FAR and the FRR meet.
Equal Error Rate ( EER )
the __________ the crossover error rate, the better that lock
lower
many of the modern _______ ________
will combine multiple authentication factors before giving access to something
An old school _________ lock provides excellent protection using a mechanical locking mechanism with push buttons that are numbered
cipher
these are popular technologies used for contactless authentication in various applications
Radio Frequency Identification ( RFID )
Near Field Communication ( NFC )
What is one of the most prevalent vulnerabilities that you should be aware of Regarding RFID and NFC?
access badge cloning
what are ways of cloning an access badge:
Scanning- using a hand held card reader to capture the data
Data Extraction:
Writing to a new card:
Using a cloned access badge
______ _______ _________ is considered to be a stealthy way to conduct a physical security attack
Access Badge Cloning
How to prevent Access Badge Cloning:
- Implement advanced encryption in card-based
authentication Systems - Implement Multi-Factor Authentication / pin, password
- regularly update the security protocols
- educate users to protect their badges at all times
- Users should implement or use shielded wallets or sleeves
- monitor and audit your access logs