Chapter 4: Physical Security
Gates
A choke point through which all traffic must enter or exit; gates range from ornamental to those designed for enhanced protective measures
Turnstile
A one-way gate or access control mechanism used to limit traffic and control the flow of people.
Fencing
A visible, physical and psychological deterrent to unwanted access
Although both guards and dogs are good for physical security, which of the following more commonly applies to dogs? A. Liability B. Discernment C. Dual Role D. Multifunction
A. Liability
During an assessment, you discovered that the target company was using a fax machine. Which of the following is the least important? A. The phone number is publicly available B. The fax machine is an open, unsecured area C. Faxes frequently sit in the printer tray D. The fax machine uses a ribbon
A. The phone number is publicly available
Bluejacking
An attack that sends unsolicited messages to Bluetooth-enabled devices.
rogue access point (rogue AP)
An unauthorized wireless access point (WAP) installed in a computer network.
Zeroisation
Associated with cryptographic processes; data is overwritten with zeros
What type of biometric system is frequently found on laptops? A. Retina B. Fingerprint C. Iris D. Voice Recognition
B. Fingerprint
A(n) __________ is used to prevent cars from ramming a building.
Bollard
For a fence to deter a determined intruder, it should be at least ____________ feet tall. A. 4 B. 5 C. 8 D. 10
C. 8
_____________ is a common physical control that can be used as both a detective and reactive tool. A. A fence B. An alarm C. CCTV D. A lock
C. CCTV
What grade of lock would be appropriate to protect a critical business asset? A. Grade 4 B. Grade 2 C. Grade 1 D. Grade 3
C. Grade 1
What do lock pick sets typically contain, at a minimum? A. Tension wrenches and drivers B. A pick C. A pick and driver D. A pick and tension wrench
D. A pick and tension wrench
A type II error is also known as what? A. False rejection rate B. Failure rate C. Crossover error rate D. False acceptance rate
D. False Acceptance Rate
_____________ defines the camera's effectiveness in viewing objects from a horizontal and vertical view. A. Granularity B. Ability to zoom C. Field of view D. Focal length
D. Focal length
____________ is an IDS used exclusively in conjunction with fences. A. Infrared wave patter B. Motion Detector C. RFID D. PIDAS
D. PIDAS
Defense in depth
Deploying multiple layers of security controls to protect assets
Physical security is less important than logical security (T\F)
False
Drive Wiping
Overwriting all information on the drive
Degaussing
Permanently destroys the contents of a hard drive or magnetic media; a magnet penetrates the media and reverses the polarity of the magnetic particles on the tape or hard disk platters
In the field of IT security, the concept of defense in depth is layering more than one control on another. (T\F)
True
Biometrics
a mechanism that authenticates an individual using physical traits, such as fingerprints, facial recognition, voiceprints, or other distinguishing characteristics
False Acceptance Rate (FAR)
a metric used to describe the probability that a biometric system will incorrectly accept an unauthorized user
False Rejection Rate (FRR)
a metric used to describe the probability that a biometric system will incorrectly reject an authorized user
Perimeter Intrusion Detection and Assessment System (PIDAS)
a special fencing that has sensors to detect intruders
Closed-circuit TV (CCTV)
a surveillance system whereby video cameras transmit a signal to a limited number of monitors
Physical Access Control
any mechanism by which an individual can be granted or denied physical access to some asset.
Physical Intrusion Detection
mechanisms put in place to detect when unauthorized individuals access some protected asset
Sniffing
observes traffic on a network
Bollards
physical barriers that can take the form of heavy steel or concrete posts or subtle structures, such as brick and concrete flowerbeds, designed to prevent ramming attacks from motor vehicles.
Bluetooth
short-range wireless technology used to support communication between devices, such as mobile phones, tablets and laptops; and open standard designed to support PAN environments.
Locks
software designed to capture the keystrokes of the user and then be retrieved by an attacker later
Physical Security
the collection of safeguards that limit physical access to assets
Remote Monitoring
the process of using utilities and devices to collect realtime metrics from computers and devices that are connected to a network