4.1 Flashcards

1
Q

Whats video surveillance?

A

It’s also called CCTV(Closed circuit television) or IP-based cameras can replace physical guards. camera properties are important(focal point, depth of field, illumination requirements)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Whats motion detection?

A

It’s security monitoring device which can be built-in to the CCTV and can notify us if an activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Whats asset tracking tag?

A

this tag is put on every component owned by the company (routers, cables, fibers, etc) which can help to keep track of them by using a bar-code, a number or even a RFID. This helps with financial records, audits, depreciation by gathering make/model, configuration, location, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Whats tamper detection?

A

Since we cant watch every equipment all the time, we have the systems monitor themselves(hardware: case sensors, routers, firewalls, alarm sent from BIOS) and we can use foil asset tags for tamper notification as well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Whats an Identification badge used for?

A

It’s a prevention method. By using an ID badge we can see the picture, name, and other details which must be worn at all times and sometimes could be a door access or smart card(usually standardized format)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are bio-metrics used for?

A

bio-metric authentication is another prevention method which uses fingerprints, iris, and voiceprint. It usually stores a mathematical representation of your bio-metrics. These are more secured since you can change your password but not your fingerprint.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are smart cards?

A

Smart cards integrate with devices and may require a PIN for prevention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are tokens?

A

there two different kinds of tokens:

  1. USB token(certificate is on the USB device.)
  2. Hardware or software tokens(generates pseudo-random authentication codes)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are key fobs?

A

A form of hardware and software method of prevention(software inside the fob creates an authentication code)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Whats an example of software tokens?

A

The SMS code we receive on our phone for authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Whats the point of having locks?

A

To prevent unknown people from entering an area, we use locks:

  1. conventional(lock and key)
  2. Deadbolt(physical bolt)
  3. Electronic(keyless)
  4. token-based(magnetic swipe card)
  5. Multi-factor(smart card and PIN)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly