9. Resilience & Physical security Flashcards
(118 cards)
What are the key components of physical security?
- Bollards
- Access control vestibule
- Fencing
- Video surveillance
- Security guard
- Access badge
- Lighting
- Sensors
These components work together to enhance the overall security posture of an organization.
What types of physical attacks are mentioned?
- Brute force
- Radio frequency identification (RFID) cloning
- Environmental
Understanding these types of attacks is crucial for implementing effective security measures.
What are the considerations for security architecture?
- Availability
- Resilience
- Cost
- Responsiveness
- Scalability
- Ease of deployment
- Risk transference
- Ease of recovery
- Patch availability
- Inability to patch
- Power
- Compute
These factors influence the effectiveness and efficiency of security systems.
What is the difference between load balancing and clustering?
Load balancing distributes workloads across multiple resources while clustering involves connecting multiple computers to work together as a single system.
Both techniques are important for achieving high availability.
What are the types of site considerations for resilience?
- Hot
- Cold
- Warm
- Geographic dispersion
These site types help organizations plan for disaster recovery and continuity of operations.
What is included in capacity planning?
- People
- Technology
- Infrastructure
Effective capacity planning ensures that an organization can handle expected workloads and emergencies.
What are the different types of testing methods for resilience?
- Tabletop exercises
- Failover
- Simulation
- Parallel processing
These methods help organizations prepare for and respond to incidents.
What are key aspects of backups?
- Onsite/offsite
- Frequency
- Encryption
- Snapshots
- Recovery
- Replication
- Journaling
Backups are essential for data preservation and recovery during failures.
What is the role of power management in resilience?
- Generators
- Uninterruptible power supply (UPS)
Reliable power sources are critical for maintaining operations during outages.
True or False: Resilience is a part of the availability leg of the CIA triad.
True
The CIA triad stands for Confidentiality, Integrity, and Availability.
Fill in the blank: Physical access to systems, networks, and devices is one of the easiest ways to ______ security controls.
[bypass]
This highlights the importance of physical security measures.
What are response and recovery controls designed to ensure?
They help to ensure that an organization can remain online and recover from issues.
These controls are vital for maintaining business continuity.
What is the importance of establishing restoration order for systems and devices?
It ensures that critical systems are prioritized during recovery processes.
This helps minimize downtime and impact on operations.
What are the three components of the CIA triad?
Confidentiality, Integrity, Availability
Why is availability critical for an organization’s security?
Systems that are offline or unavailable do not meet business needs.
What is continuity of operations?
Ensuring that operations continue despite issues like system failures or natural disasters.
What is a common method to build resilience in systems?
Redundancy
Define single point of failure.
A point where the failure of a single device or connection can disrupt the entire system.
What is geographic dispersion in the context of redundancy?
Placing datacenters at least 90 miles apart to prevent disasters from disabling multiple facilities.
What is the purpose of load balancing?
To distribute loads among multiple systems or services, providing redundancy and increasing performance.
What does clustering refer to in system design?
Groups of computers connected to perform the same task, providing redundancy through scale.
What is the role of uninterruptible power supply (UPS) systems?
To provide backup power options for short outages.
What is platform diversity?
Using different technologies and vendors to make systems less vulnerable to attacks or failures.
What are the architectural considerations for security design?
Availability targets, resilience, cost, responsiveness, scalability, ease of deployment, risk transference, ease of recovery, patch availability, and power consumption.