Physical Security Flashcards

Objectives 1.2 and 2.4

1
Q

Define / Explain

Physical Security

Physical Security

Obj. 1.2 - Summarize fundamental security concepts
Obj. 2.4 - Analyze indicators of malicious activity

A

Measures to protect tangible assets (buildings, equipment, people) from harm or unauthorized access

Physical Security

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define / Explain

Bollards

Physical Security

Obj. 1.2 - Summarize fundamental security concepts
Obj. 2.4 - Analyze indicators of malicious activity

A

Short, sturdy vertical posts controlling or preventing vehicle access

Physical Security

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define / Explain

Fences

Physical Security

Obj. 1.2 - Summarize fundamental security concepts
Obj. 2.4 - Analyze indicators of malicious activity

A

Barriers made of posts and wire or boards to enclose or separate areas

Physical Security

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Informational

Bruce Force Attacks

Physical Security

Obj. 1.2 - Summarize fundamental security concepts
Obj. 2.4 - Analyze indicators of malicious activity

A
  • Forcible entry
  • Tampering with security devices
  • Confronting security personnel
  • Ramming a barrier with a vehicle

Physical Security

Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define / Explain

Surveillance Systems

Physical Security

Obj. 1.2 - Summarize fundamental security concepts
Obj. 2.4 - Analyze indicators of malicious activity

A

An organized strategy to observe and report activities

Physical Security

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Informational

Surveillance Systems Components

Physical Security

Obj. 1.2 - Summarize fundamental security concepts
Obj. 2.4 - Analyze indicators of malicious activity

A
  • Video surveillance
  • Security guards
  • Lighting
  • Sensors

Physical Security

Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define / Explain

Access Control Vestibules

Physical Security

Obj. 1.2 - Summarize fundamental security concepts
Obj. 2.4 - Analyze indicators of malicious activity

A
  • Double-door system electronically controlled to allow only one door to open at a time
  • Prevents piggybacking and tailgating

Physical Security

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Informational / List

Door Locks

Physical Security

Obj. 1.2 - Summarize fundamental security concepts
Obj. 2.4 - Analyze indicators of malicious activity

A
  • Padlocks
  • Pin and tumbler locks
  • Numeric locks
  • Wireless locks
  • Biometric locks
  • Cipher locks
  • Electronic access control systems

Physical Security

Informational / List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define / Explain

Access Badges

Physical Security

Obj. 1.2 - Summarize fundamental security concepts
Obj. 2.4 - Analyze indicators of malicious activity

A

Use of Radio Frequency Identification (RFID) or Near Field Communication (NFC) for access

Physical Security

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define / Explain

Fence

Fencing and Bollards

Obj. 1.2 - Summarize fundamental security concepts

A
  • Structure that encloses an area using interconnected panels or posts
  • Provides a visual deterrent by defining a boundary that should not be violated by unauthorized personnel
  • Establish a physical barrier against unauthorized entry
  • Effectively delay intruders which helps provide our security personnel a longer window of time to react

Fencing and Bollards

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Informational

Fencing…

Fencing and Bollards

Obj. 1.2 - Summarize fundamental security concepts

A

is considered to be more adaptable and well-suited for safeguarding large perimeters around the entire building

Fencing and Bollards

Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define / Explain

Bollards

Fencing and Bollards

Obj. 1.2 - Summarize fundamental security concepts

A

Robust, short vertical posts, typically made of steel or concrete, that are designed to manage or redirect vehicular traffic

Fencing and Bollards

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Informational

Bollards…

Fencing and Bollards

Obj. 1.2 - Summarize fundamental security concepts

A

are designed to counter vehicular threats in a specific area

Fencing and Bollards

Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define / Explain

Brute Force

Attacking with Brute Force

Obj. 2.4 - Analyze indicators of malicious activity

A

Type of attack where access to a system is gained by simply trying all of the possibilities until you break through

Attacking with Brute Force

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Informational / List

Forcible Entry

Attacking with Brute Force

Obj. 2.4 - Analyze indicators of malicious activity

A
  • Act of gaining unauthorized access to a space by physically breaking or bypassing its barriers, such as windows, doors, or fences
  • Use high-strength doors with deadbolt locks, metal frames, or a solid core

Attacking with Brute Force

Informational / List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Informational / List

Tampering with security devices

Attacking with Brute Force

Obj. 2.4 - Analyze indicators of malicious activity

A
  • Involves manipulating security devices to create new vulernabilities that can be exploited
  • To protect against tampering with security devices, have redundancy in physical security measures

Attacking with Brute Force

Informational / List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Informational / List

Confronting security personnel

Attacking with Brute Force

Obj. 2.4 - Analyze indicators of malicious activity

A
  • Involves the direct confrontation or attack of your organization’s security personnel
  • Security personnel should undergo rigorous conflict resolution and self-defense training to mitigate risks

Attacking with Brute Force

Informational / List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Informational / List

Ramming barriers with vehicles

Attacking with Brute Force

Obj. 2.4 - Analyze indicators of malicious activity

A
  • Uses a car, truck, or other motorized vehicle to ram into the organization’s physical security barriers, such as a fence, a gate, or even the side of your building
  • Install bollards or reinforced barriers to prevent vehicles from driving in your facilities

Attacking with Brute Force

Informational / List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Define / Explain

Surveillance System

Surveillance Systems

Obj. 1.2 - Summarize fundamental security concepts

A

Organized strategy or setup designed to observe and report activities in a given area

Surveillance Systems

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Informational

Surveillance is often comprised of four main categories…

Surveillance Systems

Obj. 1.2 - Summarize fundamental security concepts

A
  • Video Surveillance
  • Security Guards
  • Lighting
  • Sensors

Surveillance Systems

Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Informational

Video Surveillance can include the following…

Surveillance Systems

Obj. 1.2 - Summarize fundamental security concepts

A
  • Motion detection
  • Night vision
  • Facial recognition

Surveillance Systems

Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Informational

Video Surveillance provides…

Surveillance Systems

Obj. 1.2 - Summarize fundamental security concepts

A
  • Remote access
  • Real-time visual feedback
  • A wired solution security camera with a physical cable from the device back to the central monitoring station
  • A wireless solution which relies on Wi-Fi to send its signal back to the central monitoring station

Surveillance Systems

Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Define / Explain

Pan-Tilt-Zoom (PTZ) System

Surveillance Systems

Obj. 1.2 - Summarize fundamental security concepts

A

Can move the camera or its angle to better detect issues during an intrustion

Surveillance Systems

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Informational

Best places to have cameras…

Surveillance Systems

Obj. 1.2 - Summarize fundamental security concepts

A
  • Data center
  • Telecommunications closets
  • Entrance or exit areas

Surveillance Systems

Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Informational

Security Guards

Surveillance Systems

Obj. 1.2 - Summarize fundamental security concepts

A
  • Flexible and adaptable forms of surveillance that organizations use
  • Helps to reassure your staff or your customers that they are safe

Surveillance Systems

Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Informational

Lighting

Surveillance Systems

Obj. 1.2 - Summarize fundamental security concepts

A
  • Proper lighting is crucial for conducting effective surveillance using both video and security guards
  • If you create well-lit areas, this can deter criminals, reduce shadows and hiding spots, and enhance the quality of your video recordings

Surveillance Systems

Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Define / Explain

Sensors

Surveillance Systems

Obj. 1.2 - Summarize fundamental security concepts

A

Devices that detect and respond to external stimuli or changes in the environment

Surveillance Systems

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Informational

There are four categories of sensors…

Surveillance Systems

Obj. 1.2 - Summarize fundamental security concepts

A
  • Infared Sensors
  • Pressure Sensors
  • Microwave Sensors
  • Ultrasonic Sensors

Surveillance Systems

Informational

29
Q

Define / Explain

Infared Sensors

Surveillance Systems

Obj. 1.2 - Summarize fundamental security concepts

A

Detect changes in infared radiation that is often emitted by warm bodies like humans or animals

Surveillance Systems

Define / Explain

30
Q

Define / Explain

Pressure Sensors

Surveillance Systems

Obj. 1.2 - Summarize fundamental security concepts

A

Activated whenever a specified minimum amount of weight is detected on the sensor that is embedded into the floor or a mat

Surveillance Systems

Define / Explain

31
Q

Define / Explain

Microwave Sensors

Surveillance Systems

Obj. 1.2 - Summarize fundamental security concepts

A

Detect movement in an area by emitting microwave pulses and measuring their reflection off moving objects

Surveillance Systems

Define / Explain

32
Q

Define / Explain

Ultrasonic Sensors

Surveillance Systems

Obj. 1.2 - Summarize fundamental security concepts

A

Measures the reflection of ultrasonic waves off moving objects

Surveillance Systems

Define / Explain

33
Q

Informational

Different methods used by attackers to bypass surveillance systems…

Bypassing Surveillance Systems

Obj. 2.4 - Analyze indicators of malicious activity

A
  • Visual Obstruction
  • Blinding Sensors and Cameras
  • Interfering with Acoustics
  • Interfering with Electromagnetic (EMI)
  • Attacking the Physical Environment

Bypassing Surveillance Systems

Informational

34
Q

Define / Explain

Visual Obstruction

Bypassing Surveillance Systems

Obj. 2.4 - Analyze indicators of malicious activity

A

Blocking the camera’s line of sight

Bypassing Surveillance Systems

Define / Explain

35
Q

Informational

Visual Obstruction can involve the following…

Bypassing Surveillance Systems

Obj. 2.4 - Analyze indicators of malicious activity

A
  • Spraying paint or foam onto the camera lens
  • Placing a sticker or tape over the lens
  • Positioning objects like balloons or umbrellas in front of the camera to block its view

Bypassing Surveillance Systems

Informational

36
Q

Define / Explain

Blinding Sensors and Cameras

Bypassing Surveillance Systems

Obj. 2.4 - Analyze indicators of malicious activity

A

Involves overwhelming the sensor or camera with a sudden burst of light to render it ineffective for a limited period of time

Bypassing Surveillance Systems

Define / Explain

37
Q

Define / Explain

Interfering with Acoustics

Bypassing Surveillance Systems

Obj. 2.4 - Analyze indicators of malicious activity

A
  • Acoustic systems are designed to listen to the environment to detect if someone is in the area or to eavesdrop on their conversations
  • Jamming or playing loud music to disrupt the microphone’s functionality

Bypassing Surveillance Systems

Define / Explain

38
Q

Define / Explain

Electromagnetic Interference
(EMI)

Bypassing Surveillance Systems

Obj. 2.4 - Analyze indicators of malicious activity

A

Involves jamming the signals that surveillance system relies on to monitor the environment

Bypassing Surveillance Systems

Define / Explain

39
Q

Define / Explain

Attacking the Physical Environment

Bypassing Surveillance Systems

Obj. 2.4 - Analyze indicators of malicious activity

A

Exploit the environment around the surveillance equipment to compromise their functionality

Bypassing Surveillance Systems

Define / Explain

40
Q

Define / Explain

Access Control Vestibules

Access Control Vestibules

Obj. 1.2 - Summarize fundamental security concepts

A

Double-door system that is designed with two doors that are electronically controlled to ensure that only one door can be open at a given time

Access Control Vestibules

Define / Explain

41
Q

Define / Explain

Piggybacking

Access Control Vestibules

Obj. 1.2 - Summarize fundamental security concepts

A

Involves two people working together with one person who has legitimate access intentionally allows another person who doesn’t have proper authorization to enter a secure area with them

Access Control Vestibules

Define / Explain

42
Q

Define / Explain

Tailgating

Access Control Vestibules

Obj. 1.2 - Summarize fundamental security concepts

A

Occurs whenever an unauthorized person closely follows someone through the access control vestibule who has legitimate access into the secure space without their knowledge or consent

Access Control Vestibules

Define / Explain

43
Q

Informational

Piggybacking

Access Control Vestibules

Obj. 1.2 - Summarize fundamental security concepts

A

Piggybacking uses social engineering to gain consent of the person with legitimate access

Access Control Vestibules

Informational

44
Q

Informational

Tailgating

Access Control Vestibules

Obj. 1.2 - Summarize fundamental security concepts

A

Tailgating doesn’t use or obtain the consent of the person with legitimate access

Access Control Vestibules

Informational

45
Q

Informational

Access control vestibules…

Access Control Vestibules

Obj. 1.2 - Summarize fundamental security concepts

A

are usually integrated with electronic badges and operated by a security guard at the entrance to a secure facility or office building

Access Control Vestibules

Informational

46
Q

Define / Explain

Badges contain…

Access Control Vestibules

Obj. 1.2 - Summarize fundamental security concepts

A
  • Radio-Frequency Identification (RFID)
  • Near-field Communication (NFC)
  • Magnetic strips

Access Control Vestibules

Define / Explain

47
Q

Informational

Security guards are often at access control vestibules because they provide…

Access Control Vestibules

Obj. 1.2 - Summarize fundamental security concepts

A
  • Visual deterrent
  • Assistance
  • Check identity
  • Response

Access Control Vestibules

Informational

48
Q

Define / Explain

Door Locks

Door Locks

Obj. 1.2 - Summarize fundamental security concepts

A

Critical physical security control measure designed to restrict and regulate access to specific spaces or properties, preventing unauthorized intrusions and safeguarding sensitive data and individuals

Door Locks

Define / Explain

49
Q

List

Types of Door Locks

Door Locks

Obj. 1.2 - Summarize fundamental security concepts

A
  • Traditional Padlocks
  • Basic Door Locks
  • Modern Electronic Door Locks
  • Cipher Locks

Door Locks

List

50
Q

Define / Explain

Traditional Padlocks

Door Locks

Obj. 1.2 - Summarize fundamental security concepts

A

Easily defeated and offer minimal protection

Door Locks

Define / Explain

51
Q

Define / Explain

Basic Door Locks

Door Locks

Obj. 1.2 - Summarize fundamental security concepts

A

Vulnerable to simple techniques like lock picking

Door Locks

Define / Explain

52
Q

List

Modern Electronic Door Locks

Door Locks - Authentication Methods

Obj. 1.2 - Summarize fundamental security concepts

A
  • Identification Numbers
  • Wireless Signals
  • Biometrics

Door Locks - Authentication Methods

List

53
Q

Define / Explain

Identification Numbers

Door Locks - Modern Electronic Door Locks, Authentication Methods

Obj. 1.2 - Summarize fundamental security concepts

A

Require entry of a unique code, providing a balance of security and convenience

Door Locks - Modern Electronic Door Locks, Authentication Methods

Define / Explain

54
Q

Define / Explain

Wireless Signals

Door Locks - Modern Electronic Door Locks, Authentication Methods

Obj. 1.2 - Summarize fundamental security concepts

A

Utilize technologies like NFC, Wi-Fi, Bluetooth, or RFID for unlocking

Door Locks - Modern Electronic Door Locks, Authentication Methods

Define / Explain

55
Q

Define / Explain

Biometrics

Door Locks - Modern Electronic Door Locks, Authentication Methods

Obj. 1.2 - Summarize fundamental security concepts

A

Rely on physical characteristics like fingerprints, retinal scans, or facial recognition for authentication

Door Locks - Modern Electronic Door Locks, Authentication Methods

Define / Explain

56
Q

Define / Explain

False Acceptance Rate
(FAR)

Door Locks - Modern Electronic Door Locks, Biometric Challenges

Obj. 1.2 - Summarize fundamental security concepts

A
  • Occurs when the system erroneously authenticates an unauthorized user
  • Lower FAR by increasing scanner sensitivity

Door Locks - Modern Electronic Door Locks, Biometric Challenges

Define / Explain

57
Q

Define / Explain

False Rejection Rate
(FRR)

Door Locks - Modern Electronic Door Locks, Biometric Challenges

Obj. 1.2 - Summarize fundamental security concepts

A
  • Denies access to an unauthorized user
  • Increasing sensitivity can increase FRR

Door Locks - Modern Electronic Door Locks, Biometric Challenges

Define / Explain

58
Q

Define / Explain

Crossover Error Rate (CER)
Equal Error Rate (EER)

Door Locks - Modern Electronic Door Locks, Biometric Challenges

Obj. 1.2 - Summarize fundamental security concepts

A

A balance between FAR and FRR for optimal authentication effectiveness

Door Locks - Modern Electronic Door Locks, Biometric Challenges

Define / Explain

59
Q

Define / Explain

Cipher Locks

Door Locks

Obj. 1.2 - Summarize fundamental security concepts

A
  • Mechanical locks with numbered push buttons, requiring a correct combination to open
  • Commonly used in high-security areas like server rooms

Door Locks

Define / Explain

60
Q

Define / Explain / List

What are two popular technologies used in various applications for contactless authentication?

Access Badge Cloning

Obj. 2.4 - Analyze indicators of malicious activity

A

Radio Frequency Identification (RFID)
Near Field Communication (NFC)

Access Badge Cloning

Define / Expain / List

61
Q

Define / Explain

Access Badge Cloning

Access Badge Cloning

Obj. 2.4 - Analyze indicators of malicious activity

A

Copying the data from an RFID or NFC card or badge onto another card or device

Access Badge Cloning

Define / Explain

62
Q

List

How does an attacker clone an access badge?

Access Badge Cloning

Obj. 2.4 - Analyze indicators of malicious activity

A
  • Step 1: Scanning
  • Step 2: Data Extraction
  • Step 3: Writing to a new card or device
  • Step 4: Using the cloned access badge

Access Badge Cloning

List

63
Q

Define / Explain

Step 1: Scanning

Access Badge Cloning - How does an attacker clone an access badge?

Obj. 2.4 - Analyze indicators of malicious activity

A

Scanning or reading the targeted individual’s access badge

Access Badge Cloning - How does an attacker clone an access badge?

Define / Explain

64
Q

Define / Explain

Step 2: Data Extraction

Access Badge Cloning - How does an attacker clone an access badge?

Obj. 2.4 - Analyze indicators of malicious activity

A

Attackers extract the relevant authentication credentials from the card, such as a unique identifier or a set of encrypted data

Access Badge Cloning - How does an attacker clone an access badge?

Define / Explain

65
Q

Define / Explain

Step 3: Writing to a new card or device

Access Badge Cloning - How does an attacker clone an access badge?

Obj. 2.4 - Analyze indicators of malicious activity

A

Attacker transfers the extracted data onto a blank RFID or NFC card or another compatible device

Access Badge Cloning - How does an attacker clone an access badge?

Define / Explain

66
Q

Define / Explain

Step 4: Using the cloned access badge

Access Badge Cloning - How does an attacker clone an access badge?

Obj. 2.4 - Analyze indicators of malicious activity

A

Attackers gain unauthorized access to buildings, computer systems, or even make payments using a cloned NFC-enabled credit card

Access Badge Cloning - How does an attacker clone an access badge?

Define / Explain

67
Q

Informational / List

Access badge cloning is common because of its…

Access Badge Cloning

Obj. 2.4 - Analyze indicators of malicious activity

A
  • Ease of execution
  • Ability to be stealthy when conducting the attack
  • Potentially widespread use in compromising physical security

Access Badge Cloning

Informational / List

68
Q

Informational / List

How can you stop access badge cloning?

Access Badge Cloning

Obj. 2.4 - Analyze indicators of malicious activity

A
  • Implement advanced encryption in your card-based authentication systems
  • Implement Multi-Factor Authentication (MFA)
  • Regularly update your security protocols
  • Educate your users
  • Implement the use of shielded wallets or sleeves with your RFID access badges
  • Monitor and audit your access logs

Access Badge Cloning

Informational / List