Physical security Flashcards

1.2 2.4

1
Q

Physical security

A

Measures to protect tangible assets (building, equipment, people) from harm or unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define two physical security controls

A

Fencing and Bollards
Bollards - Short, Sturdy vertical posts controlling or preventing vehicle access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an Access Control Vestibules

A

Double- door system electronically controlled to allow only one door open at a time
Prevents piggybacking and tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Access badges

A

Use of Radio Frequency Identification (RFID) OR Near Field Communications NFC for access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Surveillance is often comprised of four main categories

A

Video Surveillance
Remote Access
Provides real time visual feedback
A wired solution security camera is physically cabled from the device back to the central monitoring station

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Pan-Tilt-Zoom system

A

Can move the camera or its angle to better detect issues during an intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Give me the four categories of sensors

A

Infrared sensors - Detect changes in infrared radiation that is often emitted by warm bodies like humans or animals
Pressured Sensors - Activated whenever a specified minimum amount of weight is detected on the sensor that is embedded into the floor or a mat
Microwave Sensors - Detect Movement in an area by emitting microwave pulses and measuring their reflection off moving objects
Ultrasonic Sensors- Measures the reflection of ultrasonic waves off moving objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ways to bypass surveillance systems

A

Visual Obstruction like blocking the cameras, spraying point, placing a sticker, positions objects,
Blinding senors
Interfering with Acoustics-
Electromagnetic Interference EMI - Involves jamming the signals that surveillance system relies on to monitor the environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Access badge cloning

A

Radio Frequency Identification and Near field Communications are popular technologies used for contactless authentication in various applications
Copying the data from an RFID OR NFC card or badge onto another card of device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Gimme some Access control Vestibules

A

Access Control Vestibules
Double door system that is designed with two doors that are eletrconically controlled to ensure that only one door can be open at a give time.
Piggybacking - Go behind someone you trust
Tailgating- follow someone in without them knowin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

GIVE me the steps to that an attacker clone an access badge

A
  1. Scanning - Scanning or reading the targeted individuals access badge
  2. Data Extraction - Attackers extract the relevant authentications credentials from the card, such as a unique identifier or a set of encrypted data
  3. Writing to a new card or device
    Attacker will then transfer the extracted data onto a blank RFID or NFC card or another compatible device
  4. Using the cloned access badge
    Attackers gain unauthorized access to builidng, computer systems, or even make payments using a cloned NFC enabled credit card
How well did you know this?
1
Not at all
2
3
4
5
Perfectly