Chapter 9: Implementing Controls to Protect Assets Flashcards
(86 cards)
What is a Physical Security Control?
A safeguard to protect physical locations and assets from unauthorized access.
What are some examples of Physical Security Controls?
Perimeter, Buildings, Secure Work Areas, Server Rooms, and Hardware.
What are Access Badges?
A physical card used to authenticate and allow entry into secured locations.
What are Security Guards?
They monitor, enforce access, and respond to physical security threats.
What is Video Surveillance?
Monitoring and recording physical spaces to detect and deter unauthorized access.
What are sensors?
Devices that detect changes and trigger alerts for potential intrusions or anomalies.
What is a Motion Sensor?
Detects movements within its coverage zone and can trigger an alert.
What is Noise Detection?
Device that detects unexpected or abnormal sounds that may indicate a breach.
What is an Infrared Sensor?
A device that can detect heat signatures from bodies or objects.
What is a Pressure Sensor?
A device that can detect changes in weight or force in an area.
What is a Microwave Sensor?
A device that can sense motion by detecting changes in reflected microwaves.
What is an Ultrasonic Sensor?
A device that uses sound waves to detect movement.
What are Access Control Vestibules?
A secure area with two doors to control entry, allowing one person through at a time.
What is Asset Management?
Keeping records of devices and systems to ensure accountability and security.
What is Acquisition/Procurement?
Buying and onboarding assets following security policies.
What is Assignment/Accounting?
Assigning responsibility for assets to users or teams.
What is Monitoring and Asset Tracking?
Monitoring the location and state of assets to prevent loss or misuse.
What is Hardware Asset Management?
Tracking and maintaining physical devices to ensure proper use and security.
What can an effective asset management system help reduce?
Architecture and design weaknesses and system sprawl and undocumented assets.
What is Software Asset Management (SAM)?
The process of tracking and managing software licenses, installations, and compliance to avoid legal and financial risks.
What is Defense in Path? AKA layered security.
A cybersecurity strategy that uses multiple layers of security controls to protect against threats, so if one layer fails, others still protect the system.
What is Data Asset Management?
Managing data as an asset by identifying, categorizing, and protecting it throughout its lifecycle.
What are some example implementations of layered security?
Vendor diversity, Technology diversity, and Control Diversity.
What is Skimming?
A method where attackers secretly install a device to capture credit/debit card data during legitimate transactions.