What is the primary purpose of Physical Security?
Measures to protect tangible assets (buildings, equipment, people) from harm or unauthorized access
Physical security encompasses various strategies and tools to safeguard physical assets.
Name two types of Security Controls.
These controls are fundamental tools used to protect physical assets.
What are Bollards?
Short, sturdy vertical posts controlling or preventing vehicle access
Bollards are typically made of steel or concrete.
What is the function of Fences in physical security?
Barriers made of posts and wire or boards to enclose or separate areas
Fences provide a visual deterrent and establish a physical barrier against unauthorized entry.
What is a Brute Force Attack?
Type of attack where access to a system is gained by trying all possibilities until successful
In physical security, this can involve forcible entry or tampering with security devices.
What are the components of a Surveillance System?
Surveillance systems are organized strategies to observe and report activities.
What is an Access Control Vestibule?
Double-door system electronically controlled to allow only one door open at a time
This system helps prevent piggybacking and tailgating.
What types of Door Locks are commonly used?
Each type serves to restrict access and enhance security.
What is Access Badge Cloning?
Copying the data from an RFID or NFC card or badge onto another card or device
This can lead to unauthorized access if not properly secured.
Fill in the blank: ________ is a method of bypassing surveillance systems by blocking the camera’s line of sight.
Visual Obstruction
This can involve spraying paint or placing objects in front of the camera.
True or false: Tampering with security devices involves manipulating them to create vulnerabilities.
TRUE
This can lead to security breaches if not addressed.
What are the four categories of sensors used in security?
Sensors detect and respond to changes in the environment.
What is the difference between Piggybacking and Tailgating?
Piggybacking involves consent from the person with legitimate access; Tailgating does not
Both are security risks in access control situations.
What is a Cipher Lock?
Mechanical locks with numbered push buttons, requiring a correct combination to open
Commonly used in high-security areas like server rooms.
What are the authentication methods used in modern electronic door locks?
These methods enhance security by requiring specific credentials for access.
What is the Crossover Error Rate (CER)?
A balance between False Acceptance Rate (FAR) and False Rejection Rate (FRR) for optimal authentication effectiveness
It is crucial for evaluating biometric systems.
What is the purpose of Lighting in surveillance?
Enhances the quality of video recordings and deters criminals
Well-lit areas reduce shadows and hiding spots.
What is Interfering with Acoustics in the context of surveillance systems?
Jamming or playing loud music to disrupt the microphone’s functionality
This can prevent effective monitoring of conversations.
What is the role of Security Guards in surveillance?
Provide flexible and adaptable forms of surveillance, reassuring staff and customers
They also assist in monitoring and responding to incidents.