Physical Security Flashcards
What is Physical Security?
Measures to protect tangible assets (buildings, equipment, people) from harm or unauthorized access.
What are examples of Security Controls?
- Fencing and Bollards
- Surveillance Systems
- Access Control Vestibules
- Door Locks
- Access Badges
What is a Bollard?
Short, sturdy vertical posts controlling or preventing vehicle access.
What is the purpose of Fences in physical security?
- Provides a visual deterrent
- Establishes a physical barrier against unauthorized entry
- Delays intruders for security personnel response.
What are Brute Force Attacks?
Forcible entry, tampering with security devices, confronting security personnel, ramming a barrier with a vehicle.
Define Surveillance Systems.
An organized strategy to observe and report activities.
What are the components of Surveillance Systems?
- Video surveillance
- Security guards
- Lighting
- Sensors
What is an Access Control Vestibule?
Double-door system electronically controlled to allow only one door open at a time.
What types of Door Locks exist?
- Padlocks
- Pin and tumbler locks
- Numeric locks
- Wireless locks
- Biometric locks
- Cipher locks
- Electronic access control systems
What technologies are used in Access Badges?
- Radio Frequency Identification (RFID)
- Near Field Communication (NFC)
What is Piggybacking?
Two people working together where one with legitimate access allows another unauthorized person to enter.
What is Tailgating?
An unauthorized person closely follows someone with legitimate access through a secure area without consent.
What is a significant feature of modern Electronic Door Locks?
Utilize various authentication methods for enhanced security.
What are the Biometric Challenges?
- False Acceptance Rate (FAR)
- False Rejection Rate (FRR)
- Crossover Error Rate (CER)
What is Access Badge Cloning?
Copying the data from an RFID or NFC card onto another card or device.
How do attackers clone an access badge?
- Scanning
- Data Extraction
- Writing to a new card or device
- Using the cloned access badge
What are methods to stop access badge cloning?
- Implement advanced encryption
- Implement Multi-Factor Authentication (MFA)
- Regularly update security protocols
- Educate users
- Use shielded wallets or sleeves
- Monitor and audit access logs
What are the four categories of Sensors?
- Infrared Sensors
- Pressure Sensors
- Microwave Sensors
- Ultrasonic Sensors
What can attackers use to bypass Surveillance Systems?
- Visual Obstruction
- Blinding Sensors and Cameras
- Interfering with Acoustics
- Interfering with Electromagnetic
What is the role of Lighting in Surveillance Systems?
Proper lighting is crucial for effective surveillance, deterring criminals and enhancing video quality.
What is a Cipher Lock?
Mechanical locks with numbered push buttons requiring a correct combination to open.
What is the purpose of Security Guards at Access Control Vestibules?
- Provide a visual deterrent
- Assistance
- Check identity
- Response
True or False: Fencing is more adaptable than bollards for safeguarding large perimeters.
True