Summarize Security Measures Flashcards
Lesson 16D (24 cards)
Biometric and smart card locks.
Rack cabinet with key-operated lock.
Physical security
measures control who can access a building or a secure area of a building, such as a server room.
Perimeter security
uses barriers, lighting, and surveillance to control access, with high-risk sites employing bollards and reinforced fencing for added protection.
An access control vestibule
enhances security by limiting entry to one person at a time, preventing unauthorized access through tailgating or door-holding.
Magnetometers
are metal detectors used at entrances to enhance security by detecting concealed weapons or other items, commonly deployed at airports and public buildings.
Security guards
enhance physical security by monitoring entry points, verifying IDs, controlling access, logging movements, and using their judgment to prevent breaches. Their presence acts as both a safeguard and a deterrent.
Door locks control access without requiring a guard and vary by type:
- key-operated locks require a physical key,
- electronic locks use PIN entry,
- badge reader locks rely on hardware tokens like magnetic swipe cards o
- more secure contactless smart cards or key fobs.
Biometric door locks
authenticate users via fingerprint, palmprint, or retina scanning, offering security but presenting challenges in accessibility, privacy, and cost.
Equipment locks
secure devices from unauthorized access and theft. Kensington locks tether laptops to desks, chassis locks prevent tampering with server hardware, and lockable rack cabinets protect network appliances with key or electronic access control.
Alarms and surveillance
enhance security by monitoring entry points using circuit-based alarms, motion sensors, proximity detection, and duress alarms for emergency situations.
Video surveillance
enhances perimeter security using CCTV or IP cameras, often with motion detection or facial recognition. Security lighting improves safety perception, deters intrusions, and aids surveillance by ensuring visibility without shadows or glare.
Distributed Denial-of-Service (DDoS)
is a malicious cyberattack that overwhelms a network or server with traffic from multiple sources, making it unavailable to legitimate users.
spoofing
is the act of disguising oneself as another person, entity, or device, often to gain unauthorized access or deceive a user.
brute-force
is a method used to crack passwords, encryption keys, or login credentials by systematically trying all possible combinations
SQL injection
is a common attack vector that uses malicious SQL code for backend database manipulation to access information that was not intended to be displayed.
Cross-Site Scripting (XSS
is a security vulnerability that allows attackers to inject malicious code into web pages.
phishing
is a type of online fraud where criminals impersonate trusted sources (like banks or government agencies) through email, text, or phone calls to trick individuals into revealing sensitive information like passwords or credit card details.
vishing (voice phishing)
is a type of social engineering attack where criminals use phone calls to trick individuals into revealing sensitive information.
whaling
, is a strategic phishing attack, targeted towards high profile executives, that is disguised as a permitted email.
shoulder surfing
is a security threat where an attacker attempts to steal sensitive information by observing someone’s screen or keyboard while they are inputting data.
tailgating
is a physical security breach where an unauthorized individual gains access to a restricted area by following an authorized person in closely, exploiting common courtesies or lax security protocols.
dumpster diving
the act of searching through someone else’s trash to find sensitive information that can be used for malicious purposes.
SSID (Service Set Identifier)
is the name of your Wi-Fi network.