Physical Security Flashcards

(45 cards)

1
Q

Measures taken to protect tangible assets, like buildings, equipment, and people, from harm or unauthorized access.

A

Physical Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Short, sturdy vertical posts, made of steel or concrete, designed to manage, control, or prevent access by vehicles to an area or structure by redirecting vehicular traffic.

A

Bollards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Barriers/structures that are made of interconnected panels, posts, wire, or boards that are erected to enclose a space or separate areas.

A

Fences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Organized strategy or setup designed to observe & report activities in a given area. Maintain the security & safety of facilities, including business, home, or commonly used public areas.

A

Surveillance System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Double-door system, designed with two electronically controlled doors that ensures only one door is open at any given moment of time.

A

Access Control Vestibule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Involves two people, with & without access, entering a secure area. A person with legitimate access intentionally allows another person without authorization to enter a secure area with them.

A

Piggybacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Occurs whenever an unauthorized person closely follows someone with legitimate access to the secure space without their knowledge or consent.

A

Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What purposes does a fence serve?

A
  1. Provides a visual deterrent by defining a boundary that should not be violated by unauthorized personnel.
  2. Establish a physical barrier against unauthorized entry.
  3. Delays intruders, which helps provide security personnel a longer window to react.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Attack where access to a system is gained by trying all of the possibilities until breaking through.

A

Brute Force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Act of gaining unauthorized access to a space by physically breaking or bypassing its barriers, such as windows, doors, or fences.

A

Forcible Entry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Involves manipulating security devices to create new vulnerabilities that can be exploited.

A

Tampering with Security Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Involves the direct confrontation or attack of security personnel

A

Confronting Security Personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Brute force attack that uses a car, truck, or other motorized vehicle to ram into the organization’s physical Security barriers.

A

Ramming a Barrier with a Vehicle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What four categories make up surveillance?

A
  1. Video Surveillance
  2. Security Guards
  3. Lighting
  4. Sensors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Can move the camera or its angle to better detect issues during an intrusion.

A

Pan-Tilt-Zoom (PTZ)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Flexible & adaptable forms of surveillance that organizations use.

A

Security Guards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Crucial for conducting effective surveillance using both video and security guards.

A

Lighting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Devices that detect & respond to external changes in the environment & convert the information into readable signals or data.

A

Sensors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the four categories of sensors?

A
  1. Infrared
  2. Pressure
  3. Microwave
  4. Ultrasonic
20
Q

Detect changes in infrared radiation that is emitted by warm bodies like humans or animals.

A

Infrared Sensors

21
Q

Activate when a specified minimum amount of weight is detected on the sensor that is embedded into the floor or a mat.

A

Pressure Sensors

22
Q

Detect movement in an area by emitting microwave pulses & measuring their reflection off moving objects.

A

Microwave Sensors

23
Q

Measure the reflection of ultrasonic waves off moving objects.

A

Ultrasonic Sensors

24
Q

Blocking the camera’s line of sight (paint on camera, etc).

A

Visual Obstruction

25
Overwhelming the sensor or camera with a sudden burst of light to render it ineffective for a limited period of time.
Blind Sensors & Cameras
26
Jamming or playing loud music to disrupt the microphone's functionality.
Acoustic Interference
27
Jamming the signals that surveillance systems rely on to monitor the environment.
Electromagnetic Interference (EMI)
28
Exploiting the environment around the surveillance equipment to compromise its functionality.
Physical Environment Attack
29
Designed to act as an individuals's key to unlock doors, systems, or access control vestibules to gain access to a protected or secured space.
Access Badge
30
Three types of access control badges.
1. Radio-Frequency Identification (RFID) 2. Near-field Communication (NFC) 3. Magnetic Strips
31
Physical Security Control that is designed to secure entryways by restricting & regulating access to a particular space or property
Door Locks
32
Use a pin & tumbler system that is fairly easy to defeat.
Padlocks
33
This lock can be configured so that each person uses their own unique identification number or code.
Electronic Door Lock
34
Utilizes technologies like NFC, Wi-Fi, Bluetooth, or RFID for unlocking.
Wireless Signals
35
Form of Authentication with modern door locks that uses facial recognition scans or fingerprint identification scans.
Biometrics
36
The rate that the system authenticates a user as valid, even though that person should not have been granted access to the system.
False Acceptance Rate (FAR)
37
Occurs any time the biometric system denies a user who should have been allowed access to the system.
False Rejection Rate (FRR)
38
Uses a measure of the effectiveness of a given biometric system to achieve a balance between FAR & FRR for optimal authentication effectiveness.
Crossover Error Rate (CER) or Equal Error Rate (EER)
39
Mechanical locking mechanism with push buttons that are numbered & require a person to enter the correct combination in order to open that door.
Cipher Locks
40
Refers to copying the data from an RFID or NFC card or badge onto another card or device.
Access Badge Cloning
41
The four steps to cloning an access Badge.
1. Scanning 2. Data Extraction 3. Writing to a new card 4. Using cloned access badge
42
Reading the targets individual's access badge.
Scanning
43
Extracting the relevant authentication credentials from an access badge.
Data Extraction
44
Transferring the extracted data onto a blank RFID or NFC card or other compatible device.
Writing to a new card
45
Attacker gains unauthorized access to buildings, computer systems, or even make payments using a cloned NFC-enabled credit card.
Using cloned access badge