Physical Security Flashcards

1
Q

What is a fence?

A

Structure that encloses an area using interconnected panels or posts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is one purpose of a fence in terms of physical security?

A

Provides a visual deterrent by defining a boundary that should not be violated by unauthorized personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does a fence establish security?

A

Establish a physical barrier against unauthorized entry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a benefit of a fence in delaying intruders?

A

Effectively delay intruders which helps provide our security personnel a longer window of time to react

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are bollards?

A

Robust, short vertical posts designed to manage or redirect vehicular traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What materials are bollards typically made of?

A

Steel or concrete.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or False: Bollards are used to increase vehicular traffic.

A

False.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Brute Force attack?

A

Type of attack where access to a system is gained by simply trying all of the possibilities until you break through

Brute Force attacks can be automated using software to speed up the process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define Forcible Entry.

A

Act of gaining unauthorized access to a space by physically breaking or bypassing its barriers, such as windows, doors, or fences

High-strength doors with deadbolt locks, metal frames, or a solid core can help prevent forcible entry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Tampering with security devices?

A

Involves manipulating security devices to create new vulnerabilities that can be exploited

To protect against tampering, have redundancy in physical security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What should security personnel undergo to mitigate risks?

A

Rigorous conflict resolution and self-defense training

This training helps them effectively manage confrontations and potential attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False: Forcible Entry can be prevented by using high-strength doors.

A

True

High-strength doors provide a physical barrier against unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fill in the blank: _______ involves the direct confrontation or attack of your organization’s security personnel.

A

Confronting security personnel

This highlights the importance of training for security staff.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the four main categories of surveillance?

A
  1. Video Surveillance
  2. Security Guards
  3. Lighting
  4. Sensors

Each category plays a unique role in enhancing security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does video surveillance provide?

A

Real-time visual feedback

This allows for immediate monitoring and response to incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the role of security guards in surveillance?

A

Flexible and adaptable forms of surveillance that help reassure staff or customers of their safety

Security guards can respond to situations in real-time, providing a human element to security.

17
Q

Why is proper lighting important in surveillance?

A

Crucial for conducting effective surveillance using both video and security guards

Adequate lighting enhances visibility and reduces blind spots.

18
Q

What do sensors in surveillance detect?

A

External stimuli or changes in the environment

Sensors can include motion detectors, alarms, and other devices that trigger alerts.

19
Q

What does visual obstruction refer to?

A

Blocking the camera’s line of sight

Visual obstruction can be used to prevent surveillance by making it impossible for cameras to capture images.

20
Q

What is blinding sensors and cameras?

A

Involves overwhelming the sensor or camera with a sudden burst of light to render it ineffective for a limited period of time

This technique temporarily disables the functionality of optical devices.

21
Q

What is the purpose of interfering with acoustics in surveillance?

A

Acoustic systems are designed to listen to the environment to detect if someone is in the area or to eavesdrop on their conversations

Disruption can prevent these systems from functioning effectively.

22
Q

What does interfering with electromagnetic signals involve?

A

Jamming the signals that surveillance system relies on to monitor the environment

This can disrupt communication between surveillance devices.

23
Q

What does attacking the physical environment mean in the context of surveillance?

A

Exploit the environment around the surveillance equipment to compromise their functionality

This can include actions like obstructing or damaging the surveillance devices.

24
Q

What is an Access Control Vestibule?

A

A double-door system designed with two doors that are electronically controlled to ensure that only one door can be open at a given time.

25
Q

What is Piggybacking in access control?

A

Involves two people working together where one person with legitimate access allows another person without proper authorization to enter a secure area.

26
Q

What is Tailgating in access control?

A

Occurs when an unauthorized person closely follows someone with legitimate access into a secure space without their knowledge or consent.

27
Q

What roles do security guards play at access control vestibules?

A
  • Visual deterrent
  • Assistance
  • Check identity
  • Response
28
Q

What does False Acceptance Rate (FAR) refer to in biometric systems?

A

Occurs when the system erroneously authenticates an unauthorized user.

29
Q

How can you lower the False Acceptance Rate (FAR)?

A

By increasing scanner sensitivity.

30
Q

What does False Rejection Rate (FRR) indicate?

A

Denies access to an authorized user.

31
Q

What is the effect of increasing scanner sensitivity on False Rejection Rate (FRR)?

A

Increasing sensitivity can increase FRR.

32
Q

What is the Crossover Error Rate (CER)?

A

A balance between FAR and FRR for optimal authentication effectiveness.

33
Q

What are the steps an attacker may take to clone an access badge?

A
  • Scanning
  • Data Extraction
  • Writing to a new card or device
  • Using the cloned access badge
34
Q

Why is access badge cloning considered common?

A
  • Ease of execution
  • Ability to be stealthy
  • Potentially widespread use in compromising physical security
35
Q

What are some methods to stop access badge cloning?

A
  • Implement advanced encryption in card-based authentication systems
  • Implement Multi-Factor Authentication (MFA)
  • Regularly update security protocols
  • Educate users
  • Use shielded wallets or sleeves with RFID access badges
  • Monitor and audit access logs