Chapter 9 Flashcards

1
Q

Where to focus for Physical Security (4 factors)?

A
  • Physical security controls
  • Protecting people
  • Protecting data
  • Protecting equipment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Physical security: What to protect?

A
  1. People
  2. Data
  3. Equipment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Physical threats

A
oExtreme temperature
oGases
oLiquids
oLiving organisms
oProjectiles
oMovement
oEnergy anomalies
oPeople
oToxins
oSmoke and fire
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Physical security controls are…

A

The devices, systems, people, and other methods we put in place to ensure our security in a physical sense.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The 3 types of Physical security controls are…

A
  1. Deterrent
  2. Detective
  3. Preventive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Deterrent Physical security controls:

A

Designed to discourage those who might seek to violate security controls from doing so

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Examples of Deterrent Physical security controls

A

Signs in public places that indicate that video monitoring is in place
oSigns with alarm company logos that we might find in residential areas
oPolicies and regulations
oSecurity measures: guards, dogs, or fences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Detective physical security controls:

A

Serve to detect and report undesirable events that are taking place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What Detective physical security controls monitor:

A

oUnauthorized activity: doors or windows opening, glass being broken
oUndesirable environmental conditions: flooding, smoke and fire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Examples of Detective Physical security controls

A

Burglar alarms
oPhysical intrusion detection system
oHuman or animal guards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Preventive physical security controls:

A

Used to physically prevent unauthorized entities from breaching our physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Examples of Preventive Physical security controls

A

oLocks
oHigh fences
oBollards (prevent vehicles from driving into building)
oGuards and dogs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How we use physical access controls in the real world:

A

Residences: locks

oCommercial facilities: locks, alarm systems, and signs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An important consideration of physical access controls is :

A

What to protect?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The primary concern of physical security is…

A

protecting people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why is protecting people most important?

A

oRecovering data: backup system
oRecovering equipment: buy new equipment
oRecovering experienced people: ?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The _____ __ _____ is the first and foremost concern on physical security

A

safety of people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

When an emergency is taking place, our priority should be the ________

A

evacuation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Evacuation:

Where:

How:

Who:

A

Where: where we will be evacuating too

How: the route we will follow to reach the evacuation meeting place

Who: everyone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Second only to the safety of our personnel is the safety of our ____.

A

data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Second only to the safety of our personnel is the safety of our ____.

22
Q

One of our primary solutions for protecting data:

A

Encryption

23
Q

Problem with Encryption: Attacks may render it useless by…

A

oBreaking encryption algorithm itself

oObtaining the encryption keys

24
Q

Based on the concept of defense in depth:

oAnother layer: ______ ______

A

physical element

25
Physical concerns for data include...
Depending on the type of physical media on which our data is stored. Such media are often sensitive to temperature, humidity, magnetic fields, electricity
26
Magnetic media:
* hard drives, tapes, or floppy disks * Strong magnetic fields can harm the integrity of data * Jolting such media while it is in motion
27
Flash media:
* memory chips * Electrical shocks * Humidity or liquid
28
Optical media:
* CDs and DVDs * Small scratches on the surface may render it unusable * Very temperature sensitive
29
The availability often depends on both _____ and ______ remaining in functioning condition
equipment and facilities
30
Not only can we have issues in reading the data, but we may also have problems in...
... getting to where the data is stored. Outage: network, power, computer systems, or other components
31
Backup:
ensure the availability of data
32
oRedundant arrays of inexpensive disks (RAID) oReplicate data to another machine Are examples of:
Backing up data
33
Residual data:
Not only have data available, but also render data inaccessible when it is no longer required
34
Media that stored sensitive data:
oComputing-related devices: CD, DVD, flash drives, computers •Media or device might contain some sensitive data oOffice equipment: copiers, printers, fax machines •Copies of the documents that have been processed by drive
35
Last on the list of concerns for physical security is protecting...
equipment It is the easiest and cheapest segment of assets to replace
36
Even in the case of a major disaster, as long as we sill have the _____ needed to operate and restore or access ___, we can be back in working order shortly.
people data
37
Physical security in the real world:
``` Physical controls: oLocks oFences oCameras oSecurity guards ``` •Protecting people: oEvacuation maps oBackground checks •Protecting data: oKeeping backups for data •Protecting equipment: oSite selection oAccess control
38
Protecting people: foremost concern
Best step: remove people from dangerous situation (evacuation)
39
Protecting data: second only to protecting people
oEnsure availability when it is needed | oEnsure that we can completely delete it when we no longer need it
40
Protecting equipment: the lowest
oSite selection oAccess control oEnvironmental conditions
41
Which one is not a major concern for physical security a. Protecting people b. Protecting equipment c. Protecting property d. Protecting data
c.Protecting property
42
________ controls are used to physically prevent unauthorized entities from breaching our physical security. a. Deterrent b. Detective c. Preventive d. None of the above
c.Preventive
43
Which one is not an example of detective control a. Locks b. Guards or dogs c. Burglar alarms d. Physical intrusion detection system
a.Locks
44
Give three examples of a physical control that constitutes a deterrent
Answer: The signs that indicate that video monitoring; The yard sings with alarm company logos; Policies and regulations; guards and dogs; fences
45
Give three examples that constitute a threat to people
Answer: Extreme temperature; Gases; Liquids; Living organisms; Movement; Energy anomalies; People; Toxins; Smoke and fire
46
Which one is not a type of physical media that we introduced in lecture a. Magnetic media b. Paper media c. Flash media d. Optical media
b.Paper media
47
Give three examples that constitute a threat to equipment
Answer:Extreme temperature; Liquids; Living organisms
48
Which category of physical control might include a lock a. Deterrent b. Detective c. Preventive d. None of the above
c.Preventive
49
Describe how you design a securing access to an equipment or facility
Answer: Consider the concept of defense in depth. We must provide security measures on multiple areas: inside and outside. We can see measures for securing access outside facility. For example, tress, large boulders, and fences that prevent vehicle entry. We can also see the measures at facility itself, like locks. Once inside the facility, we might use access control
50
Name the three major concerns for physical security, in order of importance
Answer:Protecting people, Protecting data, Protecting equipment