Physical Security Flashcards

1
Q

Brute Force

A

Type of attack where access to a system is gained by simply trying all of the
possibilities until you break through

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access Control Vestibules

A

Double-door system that is designed with two doors that are electronically
controlled to ensure that only one door can be open at a given time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Piggybacking

A

Involves two people working together with one person who has
legitimate access intentionally allows another person who doesn’t have
proper authorization to enter a secure area with them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Tailgating

A

Occurs whenever an unauthorized person closely follows someone
through the access control vestibule who has legitimate access into the
secure space without their knowledge or consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

RFID

A

Radio-Frequency Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NFC

A

Near-Field Communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

FAR

A

False Acceptance Rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

FRR

A

False Rejection Rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CER

A

Crossover Error Rate

A balance between FAR and FRR for optimal
authentication effectiveness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Access Badge Cloning

A

Copying the data from an RFID or NFC card or badge onto another card or device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Motivational Triggers (social engineering)

A
  1. Authority
  2. Urgency
  3. Social Proof
  4. Scarcity
  5. Likability
  6. Fear
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Typosquatting

A

Form of cyber attack where an attacker will register a domain name that
is similar to a popular website but contain some kind of common
typographical errors

(also known as URL hijacking or cybersquatting)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Watering Hole Attack

A

Targeted form of cyber attack where attackers compromise a specific
website or service that their target is known to use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Pretexting

A

Pretexting gives some amount of information that seems true so that the victim will give
more information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

BEC

A

Business Email Compromise

Sophisticated type of phishing attack that usually targets businesses by
using one of their internal email accounts to get other employees to
perform some kind of malicious actions on behalf of the attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fraud

A

Wrongful or criminal deception that is intended to result in financial or personal
gain for the attacker

17
Q

Scams

A

Fraudulent or deceptive act or operation

18
Q

Misinformation

A

False or inaccurate information shared without harmful intent

19
Q

Disinformation

A

Involves the deliberate creation and sharing of false information with the intent to deceive or mislead

20
Q

Diversion Theft

A

Involves manipulating a situation or creating a distraction to steal
valuable items or information

21
Q

Hoax

A

Malicious deception that is often spread through social media, email, or
other communication channels

22
Q

Shoulder Surfing

A

Involves looking over someone’s shoulder to gather personal information

23
Q

Dumpster Diving

A

Involves searching through trash to find valuable information

24
Q

Baiting

A

Involves leaving a malware-infected physical device, like a USB drive, in a
place where it will be found by a victim, who will then hopefully use the
device to unknowingly install malware on their organization’s computer
system