Chapter 18 Data Center Security Flashcards

(13 cards)

1
Q

How is the loss or
destruction of property
typically defined?

A

By the value of the property and
the cost associated with
replacing that property
TDMM: Page 78-25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name the 7 classes of
potential for damage
or loss.

A
  1. Temperature
  2. Gases
    3.Liquids
    4.0rganisms
  3. Projectiles
  4. Movement
    7.Energy anomalies
    TDMM: Page 18-25
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the most
significant physical threat
to the reliable operation of
the data center?

A

Human beings
TDMM: Page 18-26

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 4 concentric
layers for data center
physical security?

A

1 .Site security
2.Perimeter security
3.Building and access control
4. Computer room security
TDMM: Page 18-27, Figure 18.8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name 5 security factors
that affect the selection of
a potential site for a
data center.

A

1.Crime
2.Emergency services
3. Telecommunications
4. Utilities
5.Natural disasters
TDMM: Page 18-27

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name 4 benefits of using
security perimeter
measures.

A

1 .Delay to allow alarms or other
detection systems to activate
2.Evidence of an intrusion or an
intrusion attempt
3.Physiological discouragement
4.Mitigates damage from the threat.
TDMM: Page 78-28

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name the 3 primary factors
used to identify and
authenticate a
user’s identity.

A

1 .Something a person knows
(e.g., password)
2.Something a person has
(e.g., keys)
3.Something a person is
(e.g., biometrics)
TDMM: Page 18-28

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name one optional
authentication factor that a
data center can use to
control access?

A

Something a person does
TDMM: Page 18-28

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name the 4 categories of
security spaces as defined
by the practice of crime
prevention through
environmental engineering.

A

1 .Public space
2.Semipublic space
3.Semiprivate space
4.Private space
TDMM: Page 18-28

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why should a designer
ensure that a kitchenette is
NOT adjacent to the
computer room?

A

If pipes in the kitchenette leak,
the water could spill into the
computer room.
TDMM: Page 18-29

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If an existing computer
room has a door on its
outside wall, what security
measures should be
considered?

A

*Traditional alarm sensors
*Physical barriers such as bars
and plates
TDMM: Page 18-30

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How much overpressure is
required to shatter
tempered safety glass?

A

5.5 kPa (kilopascals)
[0.8 lbf/in2 (pounds per square
inch)]
TDMM: Page 18-30

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly