Physical Security Flashcards

1
Q

this type of physical security is helpful against: Trespassing, Theft, Vandalism, and Unauthorized facility access

A

Fences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

this type of physical security is Robust, short vertical posts, made of steel or concrete, that are designed to manage or redirect vehicular traffic.

A

bollards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

this type of attack is where access to a system is gained by trying all of the possibilities until breaking through.

A

Brute force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Examples of Brute Force include:

A

Forcible entry
Tampering with security devices
Confronting Security Personnel
Ramming a barrier with a Vehicle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This is a Organized strategy or setup designed to observe and report activities in a given area. Examples would be a security guard sitting at a desk, a network of sensors, lighting, and cameras,:

A

Surveillance System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Video surveillance, categorized as CCTV, indoor or outdoor cameras, can include the following:

A

Motion Detection -
Night Vision
Facial Recognition
Remote access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Great camera feature that can move the camera or its angle to better detect issues during an intrusion is:

A

Pan-Tilt-Zoom ( PTZ )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Best places to put cameras are:

A

Data Center
Telecommunication Closets
Entrance or exit areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

More flexible and adaptable forms of surveillance that organizations use are:

A

Security guards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Proper _________ is crucial for conducting effective surveillance using both video and security guards.

A

lighting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

these devices detect and respond to external changes in the environment and convert the information into readable signals or data.

A

Sensors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the 4 basic types of sensors are:

A

Infrared - emitted by warm bodies like humans or animals
Pressure - floor or mats
Microwave - pulses and measuring reflections off objects
Ultrasonic - automated doors, measures ultrasonic wave and reflections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ways for attackers to bypass surveillance systems include:

A

Visual Obstruction - tape, paint, umbrella
Blinding Sensors and cameras - overwhelming with lot of light, heating up room
Acoustic interference -
electromagnetic interference
Physical environment attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

3 ways to help prevent / guard against attackers getting through your surveillance systems are:

A

Tamper alarms on your cameras
Backup power supplies
encrypt frequencies - to help against acoustic or electromagnetic interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

One of the most effective physical control measures that is a double-door system that is designed with 2 doors that are electronically controlled to ensure that only one door can be opened at a given time is known as:

A

Access Control Vestibule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When you follow someone through a secure door with that person’s consent you are:

A

Piggybacking

17
Q

When you follow someone through a secure door without that person knowing you are:

A

Tailgating

18
Q

___________________ help prevent from users Piggybacking or tailgating as normally there is just not enough room.

A

Access Control Vestibules

19
Q

these are also used with Access Control Vestibules as a last means of getting into the facility:

A

Access Badges

20
Q

Badges are often equipped embedded technologies

A

Radio-Frequency identification (RFID)
Near-Field communication (NFC)
Magnetic Strips

21
Q

These help with being a “Visual Deterrent”, provided Assistance, can check the visitors identity, also be a way of responding to all issues are known as :

A

Security Guards

22
Q

The following three create a multi-layer approach to increasing our physical security:

A

Access Control Vestibules
Access Badges
Security Guards

23
Q

What is the best way to keep people out of those offices that have sensitive information, a physical security control that is designed to secure entryways?

A

Door locks

24
Q

most common door lock that’s used is or has a:

A

Identification number style

25
Q

other types of locks include

A

biometric - physical characteristics something you are, fingerprint, eye retina
wireless

26
Q

What is the rate that the system authenticates a user as valid, even though that person should not have been granted access to the system?

A

False Acceptance Rate ( FAR )

27
Q

to prevent unauthorized people from entering the building, ideally you want to get that FAR down to __________ by increasing the sensitivity of the scanners.

A

zero

28
Q

What is it called when the biometrics system denies a user who should have been allowed access to the system

A

False Rejection Rate ( FRR )

29
Q

This uses a measure of the effectiveness of a given biometrics system to achieve a balance, also is called the Crossover Error Rate/the time when the FAR and the FRR meet.

A

Equal Error Rate ( EER )

30
Q

the __________ the crossover error rate, the better that lock

A

lower

31
Q

many of the modern _______ ________

A

will combine multiple authentication factors before giving access to something

32
Q

An old school _________ lock provides excellent protection using a mechanical locking mechanism with push buttons that are numbered

A

cipher

33
Q

these are popular technologies used for contactless authentication in various applications

A

Radio Frequency Identification ( RFID )
Near Field Communication ( NFC )

34
Q

What is one of the most prevalent vulnerabilities that you should be aware of Regarding RFID and NFC?

A

access badge cloning

35
Q

what are ways of cloning an access badge:

A

Scanning- using a hand held card reader to capture the data
Data Extraction:
Writing to a new card:
Using a cloned access badge

36
Q

______ _______ _________ is considered to be a stealthy way to conduct a physical security attack

A

Access Badge Cloning

37
Q

How to prevent Access Badge Cloning:

A
  • Implement advanced encryption in card-based
    authentication Systems
  • Implement Multi-Factor Authentication / pin, password
  • regularly update the security protocols
  • educate users to protect their badges at all times
  • Users should implement or use shielded wallets or sleeves
  • monitor and audit your access logs