Physical Security Flashcards

1
Q

What is Business Continuity Planning (BCP)?

A

A plan to ensure that the critical functions continue during or after an emergency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Disaster Recovery Planning (DRP)?

A

A plan to restore IT systems, data, and operations after a disaster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How is BCP different from DRP?

A

BCP focuses on keeping the business running (preventing downtime).
DRP focuses on recovering systems after a disaster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Donn Parker’s seven categories of physical threats?

A

Extreme Temperatures – Overheating or freezing damages equipment.
Gases – Toxic gases can corrode hardware or harm personnel.
Liquids – Water leaks, floods, or humidity damage equipment.
Living Organisms – Mold, insects, rodents disrupt operations.
Projectiles – Items thrown by wind or explosions damage systems.
Movement – Earthquakes, construction cause instability.
Energy Anomalies – Power surges, outages, and electromagnetic interference disrupt devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the three types of physical security controls?

A

Deterrent Controls – Discourage attacks (e.g., signs, guards, lighting).
Detective Controls – Identify security events (e.g., alarms, cameras).
Preventive Controls – Physically block threats (e.g., locks, fences).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is protecting people the top priority in physical security?

A

People are irreplaceable, while equipment and data can be restored or replaced.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What physical threats can harm people in a workplace?

A

Fire & Smoke – Can cause injuries, deaths, and business destruction.
Extreme Temperatures – Heatstroke, hypothermia.
Gases & Toxins – Carbon monoxide poisoning.
Movement Hazards – Earthquakes, structural collapse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are key components of an evacuation plan?

A

Where – Designate safe locations to evacuate to.
How – Plan routes to exit the building safely.
Who – Account for all personnel and assist those with disabilities.
Practice – Conduct regular drills so employees know what to do.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are administrative security controls?

A

Policies, procedures, and regulations that help enforce security (e.g., evacuation policies, access rules).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the best way to protect data?

A

Encryption, to make data unreadable without the proper key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is encryption alone not enough to protect data?

A

Encryption does not protect against physical threats like:

Magnetic Fields – Can erase magnetic media like hard drives.
Electric Shock – Can damage flash memory (USBs, SSDs).
Scratches & Heat – Destroy optical discs (CDs, DVDs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is residual data, and why is it a security concern?

A

Leftover data on storage devices that can be recovered if not properly wiped or destroyed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is RAID (Redundant Array of Independent Disks)?

A

A system that stores data across multiple drives to protect against hardware failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Does RAID replace backups?

A

No. RAID prevents data loss from hardware failure but does not protect against accidental deletion or cyberattacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What can affect data availability?

A

Power Outages – Cause downtime and system crashes.
Natural Disasters – Destroy data centers.
Ransomware Attacks – Encrypt critical files, making them inaccessible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why is protecting equipment a lower priority than protecting data?

A

Equipment is easier and cheaper to replace than lost data.

17
Q

What are common threats to equipment?

A

Power Surges – Overloads circuits and destroys hardware.
Overheating – Causes system failures and data loss.
Physical Theft – Stolen equipment may contain sensitive data.

18
Q

What are the three major concerns for physical security, in order of importance?

A

People, Data, Equipment.