2.0 - 2.10 Flashcards
(249 cards)
Some secure areas include an ____ (formerly known as a mantrap), which is an area with two locking doors. A person might get past the first door by way of tailgating but likely will have difficulty getting past the second door, especially if there is a guard between the two doors. An ____ essentially slows down the entry process, in hopes that any people sneaking in behind others will be thwarted before they gain entry to the secure area. If someone lacks the proper authentication, that person will be stranded in the ____ until authorities arrive.
access control vestibule
ID badges and readers can use a variety of physical security methods, including the following:
_______ If the bearer of the card doesn’t look like the person on the
card, the bearer might be using someone else’s card and should be
detained.
Photos
ID badges and readers can use a variety of physical security methods, including the following:
____: The codes embedded on these cards carry a range of information about the bearers and can limit individuals’ access to only authorized areas of buildings. These cards can be read quickly by a barcode scanner or swipe device.
Barcodes and magnetic strips
ID badges and readers can use a variety of physical security methods, including the following:
____: As with barcoded badges, cards with radiofrequency identification (RFID) chips can be used to open only doors that are matched to the RFID chip. They can also track movement within a building and provide other access data required by a security officer. To prevent undetected tampering, ID badges should be coated with a tamper-evident outer layer.
RFID technology
____are devices that can interpret the data on a certain type of ID.
Although photo IDs are still best assessed by humans, other types of IDs
add extra security that ____can govern.
Badge Reader
Cameras are ubiquitous, thanks to the explosive growth of the Internet of Things (IoT). They are affordable and can easily store recordings for security and historical reference. ___of secure areas is essential.
Video Surveillance
Alarms are common in many areas of security, from failed drive alarms in computers to hacking attempts in firewalls. Less sophisticated but just as
essential are physical alarms that alert security personnel when doors are open or cables are moved.
Alarm Systems
When used with video and alarm systems, __ can provide good physical security. Motion detectors can activate alarms and time-stamp
events for tracking on video recordings.
Motion Sensors
A determined and skillful thief can foil even the best security plans. The best way to deter a thief is to use a mix of technical barriers and human interaction. ____ can be deployed in different ways. When employees enter the work area in the presence of a guard, best practices most likely will be followed and everyone will scan in and be authenticated. Without a guard, people might hold the door open for others whom they recognize but who say they misplaced their IDs. Knowing that someone is watching carefully keeps honest people honest and deters dishonest people. Another way to deploy ____ is to have them watch several areas via security cameras that record access into and out of the buildings. Although this method is not as effective as posting a guard at each door, it allows fewer security ____ to scan different areas for traffic behaviors that warrant further attention.
Guards
Of course, the easiest way to secure an area is to lock doors. This seems like an obvious statement, but it is surprisingly common for people to simply wander into unauthorized areas. Some organizations have written policies explaining how, when, and where to lock doors. Beyond the main entrances, you should also always lock server rooms, wiring closets, labs, and other technical rooms when they are not in use. Physical ____ might seem like a simple solution, but they can’t be taken over by hackers.
Door Locks
Most desktops, laptops, and other mobile devices such as projectors and docking stations feature a security slot. On a laptop, the slot is typically located near a rear corner
Equipment Locks
____ are short wood, metal, or concrete posts installed in sidewalks and driveways to allow pedestrian and bike traffic to pass while keeping larger vehicles away. They are often removable with key access, to allow maintenance vehicles and other necessary traffic to get close to buildings. ____ are a passive way of keeping vehicles that could be listening for signals away from sensitive data centers. People coming and going from buildings also are easier to keep track of with video cameras.
Bollards
Of course, the most fundamental security device is a fence. ____ are usually subject to building codes, so effective design is important. They should be as tall as possible, sturdy, and monitored.
Fences
targets the entire website if the website is using a SQL database. Attackers can potentially run SQL commands that allow them to delete website data, copy it and run other malicious commands.
SQL Injection
____ can be used with a variety of security devices. ____ can contain RFID chips, and many are used as part of a two-step authentication process that works as follows:
The user carries a key fob that generates a code every 30 to 60 seconds. Every time the code changes on the fob, it is also matched in the authentication server. In some cases, the user must also log into the fob to see the access code, for an extra layer of security.
The user then logs into the system or restricted area, using the randomly generated access code displayed on the key fob’s LCD display. The authentication server matches the current code and allows access. A key fob used in this way is often referred to as a hardware token.
Key Fobs
A____ is a credit card–sized card that contains stored information and possibly also a simple microprocessor or an RFID chip.____s can be used to store identification information for use in security applications and to store values for use in prepaid telephone or debit card services, hotel guest room access, and other functions.____s are available in contact and contactless form factors.
Smart Card
Contactless cards are also known as ___. Readers for these cards are usually wall mounted so that users can scan their cards within 6 inches of a reader.
proximity cards
A ____–based security system includes ____s, card readers that are designed to work with ____s, and a back-end system that contains a database that stores a list of approved ____s for each secured location. ____–based security systems can also secure individual personal computers.
Smart Card
smart card security systems can be multifactor, requiring the user to input a __ or __and then provide the smart card at secured checkpoints, such as the entrance to a computer room.
PIN / security password
Keeping track of ____ is essential. If ____ are entrusted to a careless person or, worse, a dishonest employee, the entire security plan can fail. Document who has ____ to server rooms and wiring closets, and periodically change the locks and ____. Cipher locks that use punch codes also enhance security. Using a combination of these methods provides greater protection.
keys
security refers to the use of a person’s biological information, gathered from scans.
Biometric
One of main type Biometeric is currently in use ,
_______________As with iris scanning, ____ is
highly accurate, but this type of biometric scan is much more
affordable to implement. The scan gathers data on fingerprints and
compares their features to data stored for matching. More than one
fingerprint can be stored for reference.
fingerprint scanning
One of main type Biometeric is currently in use ,
_______________ This scan is less accurate than fingerprint scanning because the palm scanner does not analyze the structure of the fingerprints; it merely gathers data on the size of the hand.
Palmprint scanning:
One of main type Biometeric is currently in use ,
_______________This highly accurate technology is nearly impossible to foil, but it requires specialized equipment and can be expensive
Retina (iris) scanning: