Chapter 10- Physical Security Requirements Flashcards
- What are first line of defence?
Physical controls are your first line of defence, and people are your last.
- What is a secure facility plan:
secure facility plan outlines the security needs of an organisation and emphasizes methods or mechanisms to employ to provide security. Such a plan is developed through a process of Critical Path Analysis.
- What is Critical Path Analysis
Critical Path Analysis is a systemic effort to identify relationships between mission critical applications, processes and operations and all the supporting elements.
- List some physical security controls:
administrative, technical and physical
- Functional order in which controls should be used are:
- Deterrence 2 Denial 3 Detection 4 Delay
- What is Service Level Agreement:
Service Level Agreement defines the response time a vendor will provide in the event of an equipment failure emergency.
- Explain MTTF:
Mean Time to Failure (MTTF) is the expected typical functional lifetime of a device given a specific operating environment.
- Explain MTTR:
Mean Time to Repair (MTTR) is the average length of time required to perform a repair on the device
- What is MTBF: t
Mean Time Between Failures is an estimation of time between the first an any subsequent failures. If the MTTF and MTBF values are the same or fairly similar, manufacturers often only list the MTTF to represent both values.
- What are modern wiring closets:
a modern wiring closet is where networking cables for the whole building or just one floor are connected to other essential equipment, such as patch panels, switches, routers, local area network (LAN) extenders, and backbone channels
- Explain wiring closet security:
For wiring closet security, the most important aspect is physical security, there should be no unauthorised access
- What are cable plant:
: cable plant is the collection of interconnected cables and intermediary devices that establish a physical network
- List the elements of a cable plant:
cable plant is the collection of interconnected cables and intermediary devices that establish a physical network
- What is entrance facility:
this is known as the demarcation point, this is the entrance to the building where the cable from the provider connects the internal cable plant
- What is the equipment room:
this is the main wiring for the building, often connected to or adjacent to the entrance facility
- What is backbone distribution system
this provides wired connections between the equipment room and the telecommunications rooms, including the cross floor connections
- What is the telecommunications room:
also known as the wiring closet, serves the connection needs of a floor or a section of a large building by providing space for networking equipment and cabling system
- What is horizontal distribution systems:
this provides the connection between the telecommunication room and work areas, often including cabling, cross-connection blocks, patch panels and supporting hardware infrastructure.
- What are server rooms or data centers
Server rooms, data centers, communications rooms, wiring closets, server vaults, and IT closets are enclosed, restricted, and protected rooms where your mission-critical servers and network devices are housed. Centralized server rooms need not be human compatible. Server rooms should be located at the core of the building. CCTV monitoring on the door and motion detectors inside the space can also help maintain proper attention to who is coming and going.
- Explain Datacenters
a datacenter is an external location used to house the bulk of backend computer servers, data storage equipment and network management equipment.
- What are smart cards
smart cards are credit card sized IDs, badges or security passes with an embedded magnetic strip, bar code or integrated circuit chip. They contain information about the authorized bearer that can be used for identification and/or authentication purposes. Some smartcards can even process information or store reasonable amounts of data in a memory chip.
- A smartcard can be known by several phrases or terms:
identity token, processor IC Card, IC Card with ISO 7816
- List some known smartcard attacks:
physical attacks, logical attacks, trojan horse attacks and social engineering attacks.
- Common multifactor used with smartcards:
pin