Summarize Security Measures Flashcards

Lesson 16D (24 cards)

1
Q
A

Biometric and smart card locks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
A

Rack cabinet with key-operated lock.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Physical security

A

measures control who can access a building or a secure area of a building, such as a server room.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Perimeter security

A

uses barriers, lighting, and surveillance to control access, with high-risk sites employing bollards and reinforced fencing for added protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An access control vestibule

A

enhances security by limiting entry to one person at a time, preventing unauthorized access through tailgating or door-holding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Magnetometers

A

are metal detectors used at entrances to enhance security by detecting concealed weapons or other items, commonly deployed at airports and public buildings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security guards

A

enhance physical security by monitoring entry points, verifying IDs, controlling access, logging movements, and using their judgment to prevent breaches. Their presence acts as both a safeguard and a deterrent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Door locks control access without requiring a guard and vary by type:

A
  • key-operated locks require a physical key,
  • electronic locks use PIN entry,
  • badge reader locks rely on hardware tokens like magnetic swipe cards o
  • more secure contactless smart cards or key fobs.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Biometric door locks

A

authenticate users via fingerprint, palmprint, or retina scanning, offering security but presenting challenges in accessibility, privacy, and cost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Equipment locks

A

secure devices from unauthorized access and theft. Kensington locks tether laptops to desks, chassis locks prevent tampering with server hardware, and lockable rack cabinets protect network appliances with key or electronic access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Alarms and surveillance

A

enhance security by monitoring entry points using circuit-based alarms, motion sensors, proximity detection, and duress alarms for emergency situations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Video surveillance

A

enhances perimeter security using CCTV or IP cameras, often with motion detection or facial recognition. Security lighting improves safety perception, deters intrusions, and aids surveillance by ensuring visibility without shadows or glare.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Distributed Denial-of-Service (DDoS)

A

is a malicious cyberattack that overwhelms a network or server with traffic from multiple sources, making it unavailable to legitimate users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

spoofing

A

is the act of disguising oneself as another person, entity, or device, often to gain unauthorized access or deceive a user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

brute-force

A

is a method used to crack passwords, encryption keys, or login credentials by systematically trying all possible combinations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SQL injection

A

is a common attack vector that uses malicious SQL code for backend database manipulation to access information that was not intended to be displayed.

17
Q

Cross-Site Scripting (XSS

A

is a security vulnerability that allows attackers to inject malicious code into web pages.

18
Q

phishing

A

is a type of online fraud where criminals impersonate trusted sources (like banks or government agencies) through email, text, or phone calls to trick individuals into revealing sensitive information like passwords or credit card details.

19
Q

vishing (voice phishing)

A

is a type of social engineering attack where criminals use phone calls to trick individuals into revealing sensitive information.

20
Q

whaling

A

, is a strategic phishing attack, targeted towards high profile executives, that is disguised as a permitted email.

21
Q

shoulder surfing

A

is a security threat where an attacker attempts to steal sensitive information by observing someone’s screen or keyboard while they are inputting data.

22
Q

tailgating

A

is a physical security breach where an unauthorized individual gains access to a restricted area by following an authorized person in closely, exploiting common courtesies or lax security protocols.

23
Q

dumpster diving

A

the act of searching through someone else’s trash to find sensitive information that can be used for malicious purposes.

24
Q

SSID (Service Set Identifier)

A

is the name of your Wi-Fi network.