05- Physical Security Flashcards

(29 cards)

1
Q

access controls

A

the use of photo identity cards, swipe cards, biometric identification, or a PIN number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attack

A

occurs when a system is compromised based on a vulnerability by an unknown exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

countermeasure

A

A way to protect against an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Crime prevention through environmental design (CPTED)

A

a discipline which outlines how the properly designed physical environment can prevent crime by directly affecting human behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Fencing

A

the first line of defense in your list of physical security measures; an effective physical barrier; may not stop an intruder from entering but it can delay the intruder in his attempts and it acts as a deterrent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

intrusion detection systems (IDSs)

A

Detect unauthorized entries; can monitor entries, doors, windows, devices, or removable coverings of equipment; expensive and require human intervention to respond to the alarms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Life safety

A

protecting human life as the first priority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Lighting

A

one of the most important aspects of physical security; can act as a deterrent; gives a feeling to the intruder that he could be detected easily

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Locks

A

widely accepted access control mechanisms; slows down intruder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Manmade threats

A

include unauthorized access ? both internal and external ? explosions, damage by disgruntled employees, employee errors and accidents, vandalism, fraud, and theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

natural access control

A

The guide of people entering and leaving the environment through doors, fences, lighting, and even landscaping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Natural environmental threats

A

floods, earthquakes, storms and tornadoes, fires, extreme temperature conditions, and so on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

natural surveillance

A

using and placing physical environmental features, personnel walkways, and activity areas in ways that maximize visibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

perimeter

A

the place where you must start your defense mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Perimeter security

A

the first layer of defense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Physical access control systems

A

use software and auditing features to produce audit trails or access logs pertaining to access attempts

17
Q

physical access controls

A

identifying individuals who want to enter a facility or an area

18
Q

Physical security threats

A

include interruption of services, theft, fraud, sabotage, vandalism, and accidents

19
Q

Politically motivated threats

A

strikes, riots, civil disobedience, terrorist attacks, bombings, etc.

20
Q

resources

A

a combination of people, processes, procedures, technology, and equipment

21
Q

Response procedures

A

use of fire suppression mechanisms, emergency response processes, law enforcement notification, and consultation with outside security professionals

22
Q

Safety

A

the protection of life and assets against fire, natural disasters, and devastating accidents

23
Q

Security

A

should protect against vandalism, theft, and attacks by individuals

24
Q

Supply system threats

A

power distribution outages, communication interruptions, and interruption of other resources such as water, gas, and air filtration

25
territorial reinforcement
creates physical designs to emphasize an organization?s physical atmosphere of influence to make legitimate users feel a sense of ownership of that environment
26
threat
In terms of physical security, a threat is any real or perceived threat to one of these key areas: natural environmental, supply system, manmade, or politically motivate.
27
Threat profiles
vary from one organization to other; the types of attackers, the capabilities of these attackers, and the resources and tactics these individuals would use
28
uninterruptible power supplies (UPSs)
use AC line voltage to charge a bank of batteries; short-term solutions compared to generators
29
Vulnerability
a weak link in the software, settings, etc., through which, if not fixed early, someone can get access to the computer, application, and/or network and can cause damage