Section 4 Physical Security Flashcards

(17 cards)

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Physical Security?

A

Measures taken to protect tangible assets such as buildings, equipment, and personnel from harm or unauthorized access

Physical security encompasses various strategies and tools to safeguard physical assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Fence?

A

A structure that encloses an area using interconnected panels or posts

Fences serve as a physical barrier to deter unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Bollards?

A

Robust, short vertical posts designed to manage or redirect vehicle traffic

Bollards are often used to protect pedestrian areas from vehicle incursions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Brute Force in security context.

A

Trying all possible options to gain access to a system until a breakthrough is achieved

This method can be time-consuming and is often used in hacking scenarios.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Forcible Entry?

A

The act of gaining unauthorized access to a space by physically breaking or bypassing its barriers (windows, doors, fences)

Forcible entry is a common tactic used by intruders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Surveillance System?

A

An organized strategy or setup designed to observe and report activities in a given area

Surveillance systems can include cameras, alarms, and monitoring software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Visual Obstruction?

A

Blocking the camera’s line of sight

Visual obstructions can hinder the effectiveness of surveillance systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Blinding Sensors and Cameras?

A

Overwhelms sensor or camera with sudden burst of light to make it ineffective for a limited period of time

This technique can be used to temporarily disable surveillance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define Acoustic Interference.

A

Jamming or playing loud music to disrupt the microphone’s functionality

This can prevent audio surveillance from capturing clear sound.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Electromagnetic Interference (EMI)?

A

Jams signals or frequencies the surveillance system uses

EMI can disrupt communication between surveillance devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Physical Environment Attack?

A

Exploits environment, ex. changing temperature of room for infrared sensors

This type of attack targets the physical conditions that sensors rely on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an Access Control Vestibule?

A

Double-door system; doors are electronically controlled so that only one door can be opened at a time

This design helps prevent unauthorized access by controlling entry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Piggybacking?

A

Person with legit access intentionally allows another person without authorization to enter a secure area with them - consent

This can pose a security risk if not monitored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Tailgating?

A

Like piggybacking, but unintentional by the authorized person letting the unauthorized person in - nonconsent

Tailgating can occur in busy environments where access control is lax.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are Door Locks?

A

Physical security control that is designed to secure entryways by restricting and regulating access to a particular space or property

Door locks are a fundamental aspect of physical security.

17
Q

What is Access Badge Cloning?

A

Copying the data from a RFID/NFC card to badge onto another card or device

This can lead to unauthorized access if not properly controlled.