9. Resilience & Physical security Flashcards

(118 cards)

1
Q

What are the key components of physical security?

A
  • Bollards
  • Access control vestibule
  • Fencing
  • Video surveillance
  • Security guard
  • Access badge
  • Lighting
  • Sensors

These components work together to enhance the overall security posture of an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What types of physical attacks are mentioned?

A
  • Brute force
  • Radio frequency identification (RFID) cloning
  • Environmental

Understanding these types of attacks is crucial for implementing effective security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the considerations for security architecture?

A
  • Availability
  • Resilience
  • Cost
  • Responsiveness
  • Scalability
  • Ease of deployment
  • Risk transference
  • Ease of recovery
  • Patch availability
  • Inability to patch
  • Power
  • Compute

These factors influence the effectiveness and efficiency of security systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between load balancing and clustering?

A

Load balancing distributes workloads across multiple resources while clustering involves connecting multiple computers to work together as a single system.

Both techniques are important for achieving high availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the types of site considerations for resilience?

A
  • Hot
  • Cold
  • Warm
  • Geographic dispersion

These site types help organizations plan for disaster recovery and continuity of operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is included in capacity planning?

A
  • People
  • Technology
  • Infrastructure

Effective capacity planning ensures that an organization can handle expected workloads and emergencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the different types of testing methods for resilience?

A
  • Tabletop exercises
  • Failover
  • Simulation
  • Parallel processing

These methods help organizations prepare for and respond to incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are key aspects of backups?

A
  • Onsite/offsite
  • Frequency
  • Encryption
  • Snapshots
  • Recovery
  • Replication
  • Journaling

Backups are essential for data preservation and recovery during failures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the role of power management in resilience?

A
  • Generators
  • Uninterruptible power supply (UPS)

Reliable power sources are critical for maintaining operations during outages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False: Resilience is a part of the availability leg of the CIA triad.

A

True

The CIA triad stands for Confidentiality, Integrity, and Availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fill in the blank: Physical access to systems, networks, and devices is one of the easiest ways to ______ security controls.

A

[bypass]

This highlights the importance of physical security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are response and recovery controls designed to ensure?

A

They help to ensure that an organization can remain online and recover from issues.

These controls are vital for maintaining business continuity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the importance of establishing restoration order for systems and devices?

A

It ensures that critical systems are prioritized during recovery processes.

This helps minimize downtime and impact on operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the three components of the CIA triad?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is availability critical for an organization’s security?

A

Systems that are offline or unavailable do not meet business needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is continuity of operations?

A

Ensuring that operations continue despite issues like system failures or natural disasters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a common method to build resilience in systems?

A

Redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define single point of failure.

A

A point where the failure of a single device or connection can disrupt the entire system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is geographic dispersion in the context of redundancy?

A

Placing datacenters at least 90 miles apart to prevent disasters from disabling multiple facilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the purpose of load balancing?

A

To distribute loads among multiple systems or services, providing redundancy and increasing performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does clustering refer to in system design?

A

Groups of computers connected to perform the same task, providing redundancy through scale.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the role of uninterruptible power supply (UPS) systems?

A

To provide backup power options for short outages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is platform diversity?

A

Using different technologies and vendors to make systems less vulnerable to attacks or failures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the architectural considerations for security design?

A

Availability targets, resilience, cost, responsiveness, scalability, ease of deployment, risk transference, ease of recovery, patch availability, and power consumption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is RAID used for?
To use multiple disks for data protection, ensuring data is not lost during disk failures.
26
Describe RAID 0.
Data is striped across all drives for better I/O performance but is not fault tolerant.
27
What is the advantage of RAID 1?
High read speeds and data availability if a drive fails.
28
What does RAID 5 provide?
Striping with parity, allowing for recovery from a single drive failure.
29
What is the difference between full, incremental, and differential backups?
Full: copies entire system; Incremental: captures changes since last backup; Differential: captures changes since last full backup.
30
What is replication in data management?
Copying live data to another location or device continuously as changes are made.
31
Define journaling.
Creating a log of changes that can be reapplied if an issue occurs.
32
True or False: Journaling eliminates the need for backups.
False
33
What are recovery point objectives (RPOs)?
Determinations of how much data loss is acceptable.
34
What are recovery time objectives (RTOs)?
Determinations of how long recovery can take without significant damage.
35
What is a snapshot in data backup?
A complete capture of the state of a system at a specific point in time.
36
What is the primary use of forensic images?
To capture a bitwise copy of an entire storage device with data validation.
37
What is a gold master image?
A non-modified image used for creating nonpersistent systems in virtualization.
38
Fill in the blank: Backup frequency should be determined by the rate of change, the organization's tolerance for _______.
data loss
39
What is a gold master image in virtualization systems?
A gold master image is a base image used to create nonpersistent systems that remain unchanged after shutdown.
40
Why is it important to validate backup copies?
Validation ensures that the backup matches the original file, confirming its integrity.
41
What factors should organizations consider when choosing backup media?
* Capacity * Reliability * Speed * Cost * Expected lifespan * Reusability
42
Which backup media option has historically been one of the lowest-cost-per-capacity?
Tape
43
What are the advantages of using disks for backup over tape?
Disks are typically faster, although more expensive for the same capacity as tape.
44
True or False: Optical media like Blu-ray discs are commonly used for large-scale backups.
False
45
Fill in the blank: Flash media like microSD cards and USB thumb drives are often used for _______.
short-term copies and longer-term backups
46
What is the key difference between online and offline backups?
Online backups are always available, while offline backups need to be retrieved from a storage location.
47
What are nearline backups?
Backup storage that is not immediately available but can be retrieved within a reasonable time, often without human involvement.
48
What type of cloud backup provides lower prices for slower access times?
Long-term archival storage models like Amazon's S3 Glacier.
49
How has the changing model for backups affected what is backed up?
Instead of backing up systems, the code that defines them and key data is backed up.
50
What is off-site storage?
A method of storing backup media at a location separate from the primary site to ensure data safety.
51
What are some risks associated with poorly executed off-site storage?
Lack of distance from the primary site, inadequate security during transit, and lack of encryption.
52
What bandwidth considerations should organizations keep in mind for off-site backups?
Bandwidth for backups and restoration time, especially for low bandwidth locations.
53
What is a key security consideration for backups in remote storage?
Encryption of data both at rest and in transit.
54
What role do encryption keys play in backup recovery?
They are critical for restoring backups; losing access to keys means losing the backups.
55
True or False: Cloud providers often have lower reliability rates than local tape or disk options.
False
56
What types of controls are necessary for using third-party backup services?
Separation of accounts, additional controls, and encryption of data.
57
What are response controls?
Controls used to allow organizations to respond to an issue, whether it is an outage, a compromise, or a disaster.
58
What is the main focus of recovery controls?
Returning to normal operations.
59
Define nonpersistence in the context of response controls.
The ability to have systems or services that are spun up and shut down as needed.
60
How do systems revert to a known state?
Using snapshots in a virtualization environment or other tools that track changes.
61
What is a last-known good configuration?
A state that allows returning to a previous configuration before an issue occurred.
62
What is live boot media?
A bootable operating system that can run from removable media like a thumb drive or DVD.
63
What are high-availability solutions?
Solutions like load balancing, content distribution networks, and clustered systems that respond to high-demand scenarios.
64
What is vertical scalability?
Requires a larger or more powerful system or device.
65
What is horizontal scaling?
Uses smaller systems or devices and adds more of them.
66
List the three major types of disaster recovery sites.
* Hot sites * Warm sites * Cold sites
67
What is a hot site?
A site with all the infrastructure and data needed to operate the organization.
68
What is a warm site?
A site that has some systems needed but lacks live data.
69
What is a cold site?
A site with space, power, and connectivity but not prepared with systems or data.
70
What is the restoration order?
The sequence in which systems and services are restored after a disaster.
71
What key issue was highlighted by the aftermath of 9/11 regarding disaster recovery?
The need to ensure staff availability during a disaster.
72
What is geographic dispersion?
The practice of building infrastructure across multiple geographic regions to avoid disasters impacting multiple sites.
73
What are the three areas of focus for capacity planning?
* People * Technology * Infrastructure
74
What is the purpose of tabletop exercises?
Discussions to validate the disaster recovery plan with personnel assigned roles.
75
What is a simulation exercise?
Drills where personnel simulate actions they would take in an actual event.
76
What is a parallel processing exercise?
Moving processing to a backup system to validate its performance.
77
What is a failover exercise?
Testing full failover to an alternate site or system.
78
Why is it important to take notes during testing exercises?
To review what worked and did not work, and to apply lessons learned.
79
What are physical security controls?
Measures like fences, lighting, and locks that protect systems, facilities, and networks from unauthorized access.
80
What is the purpose of site security?
To implement a security plan based on threats and risks relevant to specific locations.
81
What is security through obscurity?
The belief that hiding resources and data will prevent or persuade malicious actors from attacking.
82
How do fences contribute to physical security?
They act as a deterrent and provide a physical barrier against unauthorized access.
83
What are bollards?
Posts or obstacles that prevent vehicles from moving through an area.
84
How does lighting enhance security?
Bright lighting discourages intruders and helps staff feel safer.
85
Fill in the blank: Drones can be used to capture images, deliver a payload, or _______.
[take action like cutting a wire or blocking a camera]
86
What are antidrone systems designed to do?
Detect and counteract drones using various technologies like radar and infrared sensors.
87
True or False: Locks are a genuine physical security control.
False
88
What role do access badges play in physical security?
They are used for entry access and to verify identity and authorization.
89
What are access control vestibules also known as?
Mantraps
90
What types of fire suppression systems are commonly used?
* Wet sprinkler systems * Dry sprinklers * Pre-action sprinklers * Deluge sprinklers
91
What are the main types of alarm systems?
* Locally monitored * Remotely monitored
92
What is a common phrase among security professionals regarding locks?
"Locks keep honest people honest."
93
What is a key challenge of using security guards?
Humans can be fallible and susceptible to social engineering.
94
What are the types of cameras used in video surveillance?
* Black and white * Infrared * Color
95
What is the purpose of motion recognition cameras?
To activate when motion occurs, conserving storage space.
96
What are the four specific types of sensors mentioned?
* Infrared sensors * Pressure sensors * Microwave sensors * Ultrasonic sensors
97
What are indicators of malicious activity for physical attacks?
Require in-person observation or detection using a camera system.
98
What is a brute-force attack in the context of physical security?
Breaking down doors, cutting off locks, or applying force for physical entry.
99
What is an environmental attack?
Targeting an organization's heating and cooling systems or maliciously activating a sprinkler system.
100
What is the key part of ensuring the availability of your systems and services?
Building a resilient infrastructure with the ability to recover from issues.
101
What types of systems help provide resilience?
Redundant systems, networks, and other infrastructure and capabilities.
102
Name a technique that helps maintain organizational online status during disasters.
Geographic dispersal.
103
What is the purpose of high-availability designs?
To handle scaling and system/component failures.
104
What are multicloud systems used for?
To avoid a vendor's outage or failure from causing broader issues.
105
What backup systems help control power-related events?
Generators and UPS systems.
106
What are the three types of backups you should know?
* Full backup * Differential backup * Incremental backup
107
What is a snapshot in the context of backups?
A copy of the state of a system at a point in time.
108
What is the function of journaling in backup systems?
Records changes, allowing for them to be replicated if needed.
109
How can the response to an outage impact an organization?
It can make the difference between being back online quickly or being offline for an extended period.
110
What are key parts of being ready for an issue?
* Capacity planning * Testing * Designing for continuity of operations
111
What are the three types of disaster recovery sites?
* Hot sites * Warm sites * Cold sites
112
What is a hot site?
A disaster recovery site built and fully ready to go.
113
What does knowing the restoration order during a restoration event help with?
Bringing systems and services online in an order that makes sense based on dependencies and criticality.
114
What does site security involve?
* Using controls to make facilities less likely to be targeted * Fences * Bollards * Lighting * Access badges * Entry access systems
115
True or False: Detecting physical attacks requires less care than automated detection.
False
116
What is the role of sensors in physical security?
To detect issues and events and to trigger responses.
117
What does CASB stand for?
Cloud Access Security Broker
118
What is the primary function of a cloud access security broker?
Security policy enforcement point positioned between enterprise users and cloud service providers