7.14/7.15 Implement and manage physical security/Addressing personnel safety and security concerns Flashcards

Domain 7 (12 cards)

1
Q

are your outermost layer, focused on discouraging and impeding
unauthorized entry into your premises

A

Perimeter security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

also called a heat-based motion detector, which works by watching for important changes in temperature in the area it’s
monitoring. It detects movement by sensing when the heat levels in the room change
in a noticeable way.

A

passive infrared (PIR) motion detector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

operate through physical mechanisms where a key or other physical tool
interacts with the lock’s internal components to engage or disengage the locking mechanism.

A

Mechanical locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

use electronic means to control access, often integrating with broader
security systems or offering features like remote access or audit trails

A

Electronic locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Discourage potential attackers or those considering violating policies.
Examples:
* Warning signs (“Area under video surveillance”)
* Fences, barricades, or other physical barriers
* Security guards
* Threat of disciplinary action in security policies

A

Deterrent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Guide users towards secure behaviors and establish clear boundaries for the use of
systems and facilities.
Examples:
* Security policies (acceptable use, password policy, etc.)
* “Clean Desk” policies
* Access control lists (ACLs) limiting who can reach various network segments
* Technical restrictions (disabling unnecessary ports, software installations)

A

Directive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Identify security incidents in progress or those that have already occurred.
Examples:
* Intrusion detection systems (IDS)
* Security cameras
* Log monitoring and audit trails
* Honeypots or honeyfiles (deceptive “traps” to lure attackers)

A

Detective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

React to and mitigate the impact of a security incident, aiming to bring things back
to a secure state.
Examples:
* Antivirus / Anti-malware reacting to an infection
* Disabling compromised user accounts
* Automated patching in response to a vulnerability disclosure
* Incident response team taking action to contain a breach

A

Corrective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Restore data, systems, or operations following an incident.
Examples:
* Backups and the processes for restoring data
* Failover systems taking over from failed equipment
* Disaster recovery plans outlining steps to resume operations
* Incident response plans (which often overlap with recovery efforts)

A

Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Provide alternative safeguards when primary security controls cannot be fully
implemented or aren’t feasible.
Examples:
* Increased monitoring where full access control isn’t practical
* Segregation of duties to prevent fraud if a single person can’t perform a
complete critical task
* Encryption protecting sensitive data in case physical controls are weak

A

Compensating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

involves planning and strategies to ensure personnel safety and
security post-disaster. Disasters can be natural (e.g., hurricanes, earthquakes) or humancaused
(e.g., fires, terrorist attacks, cyberattacks). Plans vary by the likely types of disasters
in an area, always prioritizing personnel safety

A

Emergency management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

refers to a situation where an employee is forced to perform an action or
set of actions that they would not do under normal circumstances due to external pressure or
threats.

A

Employee duress

How well did you know this?
1
Not at all
2
3
4
5
Perfectly