• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/19

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

19 Cards in this Set

  • Front
  • Back

What are some administrative physical security controls?

Examples of admin physical security controls are:


facility contruction and selection


site management


personnel controls


awareness training


emergency response procedures

What are technical physical security controls?

Examples: CCTV


alarms


intrusion detection


HVAC


fire detection and suppression

What are physical controls for physical security?

Example:


fencing


lighting


locks


construction materials


mantraps


dogs


guards

What are the functional order of controls


4 D's

Step 1: Deterrence


Step 2: Denial


Step 3: Detection


Step 4: Delay

What are key elements in making a site selection and designing a facility for construction?

Key elements in making a site selection are visibility, composition of the surrounding area, area accessibility, and the effects of natural disaster.




A key element in designing a facility for construction is understanding the level of security needed by your organization and planning for it before construction begins.

How would one design a secure work area?

There should not be equal access to all locations within a facility. Areas that contain assets of higher value or importance should have restricted access. Valuable and confidential assets should be located in the heart or center of protection provided by a facility.




Also, centralized server or computer rooms need not be human compatible.

Explain the security concerns of a wiring closet

A wiring closet is where the networking cables for a while building or just a floor are connected to other essential equipment, such as patch panels, switches, routers, LAN extenders, and backbone channels.




Most of the security for a wiring closet focuses on preventing physical unauthorized access. If an unauthorized intruder gains access to the area, they may be able to steal equipment, pull or cut cables, or even plant a listening device.



How should one handle visitors in a secure facility?

If a facility employs restricted areas to control physical security, then a mechanism to handle visitors is required. Often an escort is assigned to visitors, and their access and activities are monitored closely. Failing to track the actions of outsiders when they are granted access to a protected area can result in malicious activity against the most protected assets.

What are the security needs of media storage?

Media storage facilities should be designed to securely store blank media, reusable media, and installation media. The concerns include theft, corruption, and data remnant recovery. Media storage facility protections include locked cabinets or safes, using a librarian/ custodian, implementing a check-in/ check-out process, and using media sanitation.

What are the concerns of evidence storage?

Evidence storage is used to retain logs, drive images, virtual machine snapshots, and other data sets for recovery, internal investigations, and forensic investigations.




Protections include dedicated/isolated storage facilities, offline storage, activity tracking, hash management, access restrictions, and encryption

What are some threats to physical access controls?

No matter what form of physical access control is used, a security guard or other monitoring system must be deployed to prevent abuse, masquerading, and piggybacking. Abuses of physical access control include propping open secured doors and bypassing locks or access controls. Masquerading is using someone else’s security ID to gain entry to a facility. Piggybacking is following someone through a secured gate or doorway without being identified or authorized personally.

Explain the need for audit trails and access logs

Audit trails and access logs are useful tools even for physical access control. They may need to be created manually by security guards. Or they can be generated automatically if sufficiently automated access control mechanisms are in place (in other words, smartcards and certain proximity readers). You should also consider monitoring entry points with CCTV. Through CCTV, you can compare the audit trails and access logs with a visually recorded history of the events. Such information is critical to reconstructing the events of an intrusion, breach, or attack.

Explain the need for clean power

Power supplied by electric companies is not always consistent and clean. Most electronic equipment demands clean power in order to function properly. Equipment damage because of power fluctuations is a common occurrence. Many organizations opt to manage their own power through several means. A UPS is a type of self-charging battery that can be used to supply consistent clean power to sensitive equipment. UPSs also provide continuous power even after the primary power source fails. A UPS can continue to supply power for minutes or hours depending on its capacity and the draw by equipment.

Explain how to control the environment in a datacenter

In addition to power considerations, maintaining the environment involves control over the HVAC mechanisms. Rooms containing primarily computers should be kept at 60 to 75 degrees Fahrenheit (15 to 23 degrees Celsius). Humidity in a computer room should be maintained between 40 and 60 percent. Too much humidity can cause corrosion. Too little humidity causes static electricity.

Explain the need to manage water leakage and flooding

Water leakage and flooding should be addressed in your environmental safety policy and procedures. Plumbing leaks are not an everyday occurrence, but when they occur, they often cause significant damage. Water and electricity don’t mix. If your computer systems come in contact with water, especially while they are operating, damage is sure to occur. Whenever possible, locate server rooms and critical computer equipment away from any water source or transport pipes.

What are the importance of fire detection and suppression?

Fire detection and suppression must not be overlooked. Protecting personnel from harm should always be the most important goal of any security or protection system. In addition to protecting people, fire detection and suppression is designed to keep damage caused by fire, smoke, heat, and suppression materials to a minimum, especially in regard to the IT infrastructure.

Explain the possible contamination and damage caused by a fire and suppression system

The destructive elements of a fire include smoke and heat but also the suppression medium, such as water or soda acid.




Smoke is damaging to most storage devices.




Heat can damage any electronic or computer component.




Suppression mediums can cause short circuits, initiate corrosion, or otherwise render equipment useless. All of these issues must be addressed when designing a fire response system.

What is the most common form of perimeter security devices or mechanisms?

Lighting is the most common form of perimeter security devices or mechanisms. Your entire site should be clearly lit. This provides for easy identification of personnel and makes it easier to notice intrusions.

What is the best type of water- based fire suppression system for a computer facility?

A preaction system is the best type of water-based fire suppression system for a computer facility.