A4 – Physical Security Measures ( Restricting Access) Flashcards

A - Cyber Security Threats, System Vulnerabilities and Security Protection Methods

1
Q

Site Security Locks

A

👉Locking the buildings and the rooms where our IT systems are contained is a very important procedure that should be implemented in businesses. In particular, your server room should be well secured by lock and key, though all rooms with IT equipment should be locked when not in use.

👉 If someone were to gain access to your server room they would be able to cause huge damage as it will contain all the networks data, and all transmitted data will pass through the servers, routers, switches etc. that are kept there.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Card Entry

A

👉 Instead of using a key for locking & unlocking rooms, a swipe or smart card could be used instead.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Biometric

A

👉 biometrics can be used, such as a fingerprint scanner or facial recognition.

👉 Using a card entry or biometrics system allows you to identify each person that has entered a room. This will allow for you to identify any suspicious behavior (accessing late at night) or to investigate an attack that has occurred (identify who had entered the room at the time the attack happened).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CCTV

A

👉 rooms get left unlocked and keys or cards get lost/stolen. So, it’s important to have surveillance in place to monitor who is accessing the rooms that contain our IT systems.

👉 CCTV is an excellent way of doing this. They are difficult to tamper with and provide clear visual evidence of who has been in a room. This can be connected to a monitor to allow for a member of staff to constantly watch who is in the IT rooms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Protected Cabling

A

👉 When an IT company has a lot of exposed cabling, then they are running the risk of an intruder cutting or attaching a device to the cabling.

👉 One way around this is to use protected cabling. This is when a cable is wrapped in extra layers, rather than just rubber. The additional layers can include a woven wire mesh layer which makes it harder to cut into.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cabinets

A

👉 We can also use locked cabinets for keeping equipment secure. In particular, portable devices, such as laptops and tablets, and external storage devices, need to be secured when not in use. A locked cabinet is a great way of doing this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly