Physical and Environmental Security Controls Flashcards
(39 cards)
Physical Controls
- Physical controls are the first line of defence in securing an infrastructure.
- No matter how strong technical controls are, if an adversary gains physical access to a server or premises, the security is compromised.
- Physical security is often overlooked or underestimated, with the misconception that technology can solve all security problems.
- An open door to premises is equivalent to not having a password to secure a computer.
- Attackers will always target the easiest option, so physical access to premises can lead to unauthorized network access.
- Physical controls are essential to prevent unauthorized entry, protect hardware and equipment, and safeguard against theft or tampering.
- Examples of physical controls include access control systems, surveillance cameras, locks, alarms, and secure data centre facilities.
- Organizations must prioritize physical security measures to ensure the overall security of their cloud infrastructure and data.
Which of the following statements best describes the importance of physical controls in cloud computing?
A) Physical controls are not necessary in cloud computing since all security measures are handled through technical controls.
B) Physical controls are the first line of defence in securing an infrastructure and help prevent unauthorized access to premises and equipment.
C) Physical controls are optional and can be overlooked if strong technical controls are in place.
D) Physical controls are only relevant for on-premises infrastructure and not applicable to cloud environments.
B) Physical controls are the first line of defence in securing an infrastructure and help prevent unauthorized access to premises and equipment.
This statement highlights the importance of physical controls in ensuring the security of cloud infrastructure by protecting against physical threats.
Which of the following is an example of a physical control in cloud computing?
A) Firewall configuration and management
B) Intrusion detection system (IDS)
C) Encryption of data at rest
D) Biometric access control system for a data centre entrance
D) Biometric access control system for a data centre entrance
This option represents a physical control as it involves the use of biometric authentication (such as fingerprint or iris scan) to regulate access to the physical location where the cloud infrastructure is housed.
Objectives of Physical Security
- The main objectives of physical security controls are to protect assets from damage, loss, and theft.
- People safety is always paramount, as people should be considered the most valuable asset.
- Damage and loss can both apply to people assets, emphasizing the importance of prioritizing people’s safety.
- Physical security aims to provide protection against various threats, including unauthorized intruders, fire, flood, and loss of essential utilities (e.g., power).
- Physical security controls also aim to prevent damage to or loss of assets through theft.
- In summary, the objectives of physical security are asset protection, people safety, and safeguarding against unauthorized access, fire, flood, utility loss, and asset theft.
Which of the following is NOT one of the main objectives of physical security controls?
A) Protecting assets from damage
B) Ensuring people safety
C) Preventing unauthorized access
D) Enhancing network security
D) Enhancing network security
The objectives of physical security controls primarily focus on protecting assets from damage, ensuring people safety, and preventing unauthorized access. Enhancing network security falls under the realm of information security, which is a separate discipline from physical security. Physical security measures are primarily concerned with protecting physical assets and the safety of individuals within a physical environment, while network security deals with securing digital networks, systems, and data.
Which of the following is considered one of the primary threats that physical security controls aim to protect against?
A) Data breaches
B) Social engineering attacks
C) Fire and flood
D) Malware infections
C) Fire and flood
Physical security controls aim to protect against various threats, including unauthorized intruders, fire, flood, loss of essential utilities, and asset theft. Fire and flood pose significant risks to physical assets, infrastructure, and the safety of individuals within a premises. Physical security measures such as fire detection systems, sprinkler systems, fireproof storage, and flood barriers are implemented to mitigate the potential damage and loss caused by these natural disasters. While data breaches, social engineering attacks, and malware infections are important concerns, they primarily fall within the scope of information security rather than physical security.
Facility Security
- The security measures required for securing premises depend on the type of facility.
- Stand-alone buildings in their own grounds require different security measures compared to offices in multi-storey buildings.
- The starting point for physical security in a stand-alone building is the grounds perimeter, which can be protected by a fence or wall.
- The type of fence or wall used determines whether it functions as a deterrent or a preventative control.
- A higher fence, such as a 2-meter wire mesh fence topped with razor wire and electrified, provides a more serious deterrent and is considered a preventative control.
- However, determined intruders may still find ways to overcome the perimeter barrier.
- Additional controls for perimeter defence can include lighting, CCTV surveillance, and even guard dogs.
- The presence of multiple controls may indicate that the property contains valuable assets, potentially making it a more attractive target.
- High-value targets may have multiple fence or wall boundaries to increase the difficulty for intruders, similar to the layered Défense of castles.
- Access portals or entry points within the perimeter need to be protected as well.
- Multiple layers of security are designed to restrict access to information assets, with the server room being the equivalent of the castle’s keep.
In summary, facility security involves securing the perimeter, implementing deterrent and preventative controls, considering multiple layers of Défense, and protecting access portals within the premises.
Which of the following is a key objective of facility security?
A) Enhancing network performance
B) Minimizing operational costs
C) Protecting premises and assets
D) Ensuring regulatory compliance
C) Protecting premises and assets
Facility security primarily focuses on safeguarding the premises and assets within a facility. This includes implementing physical security measures to prevent unauthorized access, damage, loss, and theft. Enhancing network performance (choice A) falls under the scope of network management and optimization, not specifically facility security. Minimizing operational costs (choice B) is an objective that relates to business efficiency and cost management, but it is not directly tied to facility security. Ensuring regulatory compliance (choice D) is an important consideration, but it is a broader objective that encompasses various aspects of business operations, including facility security. Protecting premises and assets is the primary objective of facility security.
Which of the following is a potential negative aspect of implementing multiple security controls within a facility?
A) Increased deterrence for potential intruders
B) Indication of valuable assets within the facility
C) Enhanced safety measures for employees
D) Improved regulatory compliance standards
B) Indication of valuable assets within the facility
Implementing multiple security controls within a facility can inadvertently indicate the presence of valuable assets. While having multiple security controls may enhance security and deter potential intruders (choice A), the downside is that it may also draw attention to the fact that there are valuable assets within the facility. This can make the facility a more attractive target for intruders. Enhanced safety measures for employees (choice C) are generally seen as a positive outcome of implementing security controls. Improved regulatory compliance standards (choice D) can also be a positive result, but it is not directly related to the potential negative aspect of indicating valuable assets.
Manned Perimeter
- Manned perimeter security involves deploying security guards at the perimeter and gateways of a facility.
- Security guards can make judgements, patrol the perimeter, control personnel, monitor CCTV, and act as a deterrent.
- Guard dogs can detect human presence, act as a deterrent, and detect things that humans may miss.
- Additional security controls for external areas can include physical intrusion detection systems.
- Lighting is commonly used as a deterrent control to discourage potential intruders.
- Proper installation and effectiveness of lighting are essential to prevent dark or shadow areas from being exploited.
- External lighting can be utilized in different ways, such as flood lighting to cover all areas, trip lighting activated by sensors, projection lighting to blind intruders at the top of fences or walls, and moveable lighting to track moving objects.
In summary, a manned perimeter with security guards and guard dogs provides various benefits, including judgements, patrols, personnel control, monitoring, and detection capabilities. Lighting serves as a deterrent and can be implemented through flood lighting, trip lighting, projection lighting, and moveable lighting. The effective deployment of these measures helps enhance facility security.
Which of the following is a benefit of having manned security guards at the perimeter of a facility?
A) Efficient utilization of lighting resources
B) Improved network performance monitoring
C) Enhanced control over personnel
D) Increased reliance on physical intrusion detection systems
C) Enhanced control over personnel
Manned security guards at the perimeter provide enhanced control over personnel by monitoring and managing access, ensuring only authorized individuals enter the facility. This improves security and accountability. The other options are not direct benefits of having manned security guards.
Securing the Premises
- Minimize the number of physical entrances to improve control over access
- External doors should be robust, solid, and have concealed or tamper-proof hinges
- Doors with glass should be laminated or wired to prevent easy breakage.
- Avoid placing windows next to doors to prevent intruders from breaking the window to access the door handle.
- Different types of locks include ward locks, tumbler locks, digi-locks, smart locks, and combination locks.
- Protect door keys or fobs to prevent unauthorized access.
- Physical access control systems use locks and technology to control and monitor access to the facility.
- CCTV provides oversight of entry, and smart locks with swipe cards record entry and exit digitally.
- Security guards can provide manual oversight of physical entry and assist in case of access problems.
- Inside the facility, CCTV and motion detectors can monitor movement and alert security or law enforcement in case of intruders.
- Authorized staff should wear ID badges displaying at least a photograph and name, which can also function as an authentication mechanism.
In summary, securing the premises involves minimizing entrances, using robust doors and locks, implementing physical access control systems, monitoring access with technology like CCTV and motion detectors, and ensuring authorized personnel wear ID badges for identification and movement control within the facility.
Which of the following is a recommended practice for securing external doors of a facility?
A) Installing windows next to the doors for increased visibility
B) Using solid doors made of non-robust materials
C) Concealing hinges or using tamper-proof hinges
D) Using only traditional key locks without additional security measures
C) Concealing hinges or using tamper-proof hinges
Concealing hinges or using tamper-proof hinges is a recommended practice for securing external doors of a facility. By doing so, it prevents intruders from attempting to remove the hinge pins and gain unauthorized access. Installing windows next to the doors (choice A) may provide visibility but can also pose a security risk. Using non-robust doors made of non-robust materials (choice B) would not offer sufficient protection. Using only traditional key locks without additional security measures (choice D) may not provide adequate security against potential threats.
What is the purpose of a physical access control system in facility security?
A) Monitoring employee productivity within the premises
B) Restricting access to the facility based on time of day
C) Detecting physical threats such as fire or flood
D) Controlling and recording individuals’ passage through openings
D) Controlling and recording individuals’ passage through openings
The purpose of a physical access control system in facility security is to control and record individuals’ passage through openings. It enables organizations to manage and monitor access to the facility by using various methods such as locks, key cards, biometrics, or smart locks. The system helps enforce security policies, track and log entry and exit, and restrict access based on authorized privileges. Monitoring employee productivity (choice A), restricting access based on time of day (choice B), and detecting physical threats (choice C) are not the primary functions of a physical access control system.
Equipment Protection
- Objectives of physical security include preventing loss or theft of physical assets, including PCs, laptops, and technical equipment.
- Theft can occur from both external threat actors and internal staff, with greater threats to more portable items.
- Maintain an up-to-date comprehensive asset register to record physical assets, their owners, and locations.
- All equipment should have tamper-proof asset tags affixed.
- Secure servers in locked racks within a locked server room.
- Secure laptops with cables and locks, and networking equipment in cabinets or wiring closets accessible only to authorized personnel.
- Establish a physical security policy that governs the movement of equipment on and off-site.
- Control what equipment can be taken off-site, considering staff working from home, and ensure the asset register reflects the location of assets.
In summary, protecting equipment involves maintaining an asset register, securing equipment with tamper-proof tags and physical restraints, controlling access to server rooms and networking equipment, and establishing a physical security policy for equipment movement.
Which of the following is a recommended measure for protecting laptops and portable devices from theft?
A) Keeping laptops unlocked and unattended in common areas
B) Using tamper-proof asset tags on laptops
C) Storing laptops in easily accessible and visible locations
D) Allowing unauthorized personnel to access networking equipment
B) Using tamper-proof asset tags on laptops
Using tamper-proof asset tags on laptops is a recommended measure for protecting them from theft. Asset tags help identify and track laptops, making it difficult for thieves to sell or use stolen devices without being detected. Keeping laptops unlocked and unattended in common areas (choice A) increases the risk of theft. Storing laptops in easily accessible and visible locations (choice C) also makes them more vulnerable to theft. Allowing unauthorized personnel to access networking equipment (choice D) poses security risks and can lead to unauthorized access or tampering.
Why is maintaining an up-to-date asset register important for equipment protection?
A) To track employee productivity
B) To comply with regulatory requirements
C) To identify potential vulnerabilities in the facility
D) To record the location and ownership of physical assets
D) To record the location and ownership of physical assets
Maintaining an up-to-date asset register is important for equipment protection to record the location and ownership of physical assets. The asset register helps track the whereabouts of equipment, which is crucial for asset management and security. It allows organizations to have a clear inventory of their assets, identify any missing or misplaced items, and ensure accountability. Tracking employee productivity (choice A), complying with regulatory requirements (choice B), and identifying potential vulnerabilities in the facility (choice C) may be important but are not the primary reasons for maintaining an up-to-date asset register in the context of equipment protection
Environment Security - Electricity Supply
- Power supply needs to be maintained at the correct voltage and stable for proper functioning of equipment.
- Uninterruptible power supplies (UPS) and generators can ensure continuity of mains power.
- UPS serves three purposes: maintaining server operation during power outages, acting as an interim power source while starting the generator, and removing noise from the mains supply.
- Generators should have sufficient capacity for the expected load and require fuel replenishment.
- Technical controls play a significant role in physical security, alongside physical controls like fences and locks.
- Physical access control systems limit physical access to premises.
- Physical intrusion detection systems, or burglar alarms, are used for detecting unauthorized entry.
- Controlling the environment helps mitigate electronic signal emanations.
Which of the following is one of the purposes of using an uninterruptible power supply (UPS) in relation to physical security?
A) To generate additional power for high-demand equipment
B) To provide a backup power source during power outages
C) To regulate the voltage of the mains power supply
D) To detect and prevent unauthorized access to the power supply
B) To provide a backup power source during power outages
One of the purposes of using an uninterruptible power supply (UPS) in relation to physical security is to provide a backup power source during power outages. UPS systems are designed to supply power to critical equipment and systems, such as servers, in the event of a mains power failure. This ensures that essential operations can continue uninterrupted and allows for an orderly shutdown if needed.
Why is it important for a generator to have sufficient capacity for the expected load?
A) To minimize fuel consumption
B) To maintain a stable power supply
C) To reduce the size of the generator
D) To ensure compatibility with the UPS system
B) To maintain a stable power supply
It is important for a generator to have sufficient capacity for the expected load in order to maintain a stable power supply. Generators need to provide enough power to meet the demands of the equipment and systems they are powering. Insufficient capacity can result in voltage fluctuations, power surges, or even complete power failures, which can disrupt operations and potentially damage equipment. Having the right capacity ensures a reliable and stable power supply during normal operation and when transitioning from the UPS to generator power.
Environment Security - Access control systems
- Access control systems are used to ensure that only authorized personnel can enter a facility.
- Smart cards or tokens can be used for access control, either as proximity devices or for swiping through readers.
- The use of smart cards can be recorded by a central system, providing a record of entry and exit.
- Mantraps are a common implementation for controlling physical access, consisting of two doors where the first door must be accessed, passed through, and closed before the second door can open.
- Mantraps may require authentication with cards and/or PINs, and may also have weight sensors to detect unauthorized individuals.
- Mantraps help eliminate risks such as tailgating and piggybacking, where unauthorized individuals attempt to pass through an opening following authorized individuals.
- Tailgating occurs when an unauthorized individual passes through with the knowledge of the authorized person in front.
- Piggybacking occurs when an unauthorized individual passes through with the knowledge of the person in front, often by requesting them to hold the door open.
Which of the following is a common implementation for controlling physical access and helps eliminate risks such as tailgating and piggybacking?
a) Smart cards
b) Mantrap
c) Biometric authentication
d) CCTV surveillance
b) Mantrap
A mantrap is a common implementation for controlling physical access and helps eliminate risks such as tailgating and piggybacking.
What is the purpose of using smart cards or tokens in an access control system?
a) To provide proximity access to a facility
b) To record entry and exit of individuals
c) To authenticate both physical and logical access
d) All of the above
d) All of the above
Smart cards or tokens are used in an access control system to provide proximity access, record entry and exit, and authenticate both physical and logical access
Environment Security - Intrusion Detection Systems
Key Notes on Intrusion Detection Systems:
- Purpose: Intrusion detection systems are designed to detect the presence of unauthorized individuals within a facility.
- Entry Point Controls: Balanced magnetic switches can be installed on doors and windows to provide indications when they are opened, helping detect potential intrusions.
- Detection Mechanisms: Passive infrared sensors (PIRs) can sense body heat and motion detectors can function like radar to detect the presence of humans within the facility.
- Alarm Systems: Alarms can be local or centralized in a control room, or both, providing a clear indication that a response is required.
- Silent Alarms: At the point of intrusion, alarms may be silent to maintain covert detection, increasing the chances of apprehending the intruder.