Section 3: Physical Security Flashcards
What is Physical Security?
Measures taken to protect tangible assets—such as buildings, equipment, and people—from harm or unauthorized access.
What are Security Controls?
Specific measures designed to protect tangible assets from harm or unauthorized access.
What are Bollards?
Short, sturdy vertical posts used to control or prevent vehicle access.
What are Fences?
Barriers made of posts and wire or boards, used to enclose or separate areas, providing a visual deterrent and delaying intruders.
What is Forcible Entry?
Gaining unauthorized access by physically breaking or bypassing barriers like doors or windows.
What does Tampering with Security Devices mean?
Manipulating security devices to create vulnerabilities.
What is Confronting Security Personnel?
Directly confronting or attacking security personnel.
What is Ramming Barriers?
Using vehicles to crash into physical security barriers.
What is Video Surveillance?
Includes motion detection, night vision, and facial recognition capabilities; can be wired or wireless.
What is a Pan-Tilt-Zoom (PTZ) System?
Allows movement of cameras to better identify issues during an intrusion.
What are Security Guards?
A flexible surveillance method that provides reassurance and physical security presence.
How does Lighting enhance security?
Enhances surveillance by deterring criminals, reducing shadows, and improving video quality.
What are Sensors?
Devices that detect changes in the environment, such as:
- Infrared Sensors: Detect heat emissions.
- Pressure Sensors: Activated by weight.
- Microwave Sensors: Detect movement by emitting microwave pulses.
- Ultrasonic Sensors: Measure reflections of ultrasonic waves off moving objects.
What is Visual Obstruction?
Blocking camera views with objects like paint, stickers, or umbrellas.
What does Blinding Sensors and Cameras refer to?
Overwhelming sensors or cameras with light to disable them temporarily.
What is Interfering with Acoustics?
Jamming microphones or generating loud noises to disrupt audio surveillance.
What does Interfering with Electromagnetic Signals mean?
The act of jamming the signals that surveillance systems rely on, making them ineffective.
What is Attacking the Physical Environment?
Tampering with surveillance equipment, such as cutting wires, to disrupt their functionality.
What is a Double-door System?
A security feature where only one door can open at a time to prevent unauthorized access.
What is Piggybacking?
When a legitimate user intentionally allows another person to enter with them, which can breach security protocols.
What is Tailgating?
An unauthorized person following a legitimate user through a door without their knowledge.
What are Access Badges?
Identification methods that use RFID, NFC, or magnetic strips for authentication, often in conjunction with security guards.
What are Traditional Padlocks?
Basic locks that provide minimal protection against unauthorized access.
What are Basic Door Locks?
Standard locks that are vulnerable to simple lock-picking techniques.
What are Modern Electronic Door Locks?
Advanced locks that utilize identification numbers, wireless signals, or biometrics for enhanced security.
What is Biometric Authentication?
A method that uses physical characteristics, such as fingerprints or retinal scans, for verifying identity.
What are the challenges in Biometric Systems?
Issues related to balancing the False Acceptance Rate (FAR) and False Rejection Rate (FRR) in biometric systems to achieve optimal security.
What are Cipher Locks?
Mechanical locks that require a combination of push buttons and are typically used in high-security areas.
What are RFID and NFC Technologies?
Technologies used for contactless authentication through radio frequency identification and near-field communication.
What is the Cloning Process?
The procedure of scanning, extracting data, writing it to a new card, and using the cloned badge to gain unauthorized access.
What are Prevention methods against cloning?
Methods to protect against cloning, such as advanced encryption, Multi-Factor Authentication (MFA), shielded wallets, and regular security protocol updates.