Physical Security Flashcards

(19 cards)

1
Q

What is the primary purpose of Physical Security?

A

Measures to protect tangible assets (buildings, equipment, people) from harm or unauthorized access

Physical security encompasses various strategies and tools to safeguard physical assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name two types of Security Controls.

A
  • Fencing
  • Bollards

These controls are fundamental tools used to protect physical assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are Bollards?

A

Short, sturdy vertical posts controlling or preventing vehicle access

Bollards are typically made of steel or concrete.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the function of Fences in physical security?

A

Barriers made of posts and wire or boards to enclose or separate areas

Fences provide a visual deterrent and establish a physical barrier against unauthorized entry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Brute Force Attack?

A

Type of attack where access to a system is gained by trying all possibilities until successful

In physical security, this can involve forcible entry or tampering with security devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the components of a Surveillance System?

A
  • Video surveillance
  • Security guards
  • Lighting
  • Sensors

Surveillance systems are organized strategies to observe and report activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an Access Control Vestibule?

A

Double-door system electronically controlled to allow only one door open at a time

This system helps prevent piggybacking and tailgating.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What types of Door Locks are commonly used?

A
  • Padlocks
  • Pin and tumbler locks
  • Numeric locks
  • Wireless locks
  • Biometric locks
  • Cipher locks
  • Electronic access control systems

Each type serves to restrict access and enhance security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Access Badge Cloning?

A

Copying the data from an RFID or NFC card or badge onto another card or device

This can lead to unauthorized access if not properly secured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fill in the blank: ________ is a method of bypassing surveillance systems by blocking the camera’s line of sight.

A

Visual Obstruction

This can involve spraying paint or placing objects in front of the camera.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or false: Tampering with security devices involves manipulating them to create vulnerabilities.

A

TRUE

This can lead to security breaches if not addressed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the four categories of sensors used in security?

A
  • Infrared Sensors
  • Pressure Sensors
  • Microwave Sensors
  • Ultrasonic Sensors

Sensors detect and respond to changes in the environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the difference between Piggybacking and Tailgating?

A

Piggybacking involves consent from the person with legitimate access; Tailgating does not

Both are security risks in access control situations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Cipher Lock?

A

Mechanical locks with numbered push buttons, requiring a correct combination to open

Commonly used in high-security areas like server rooms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the authentication methods used in modern electronic door locks?

A
  • Identification Numbers
  • Wireless Signals
  • Biometrics

These methods enhance security by requiring specific credentials for access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the Crossover Error Rate (CER)?

A

A balance between False Acceptance Rate (FAR) and False Rejection Rate (FRR) for optimal authentication effectiveness

It is crucial for evaluating biometric systems.

17
Q

What is the purpose of Lighting in surveillance?

A

Enhances the quality of video recordings and deters criminals

Well-lit areas reduce shadows and hiding spots.

18
Q

What is Interfering with Acoustics in the context of surveillance systems?

A

Jamming or playing loud music to disrupt the microphone’s functionality

This can prevent effective monitoring of conversations.

19
Q

What is the role of Security Guards in surveillance?

A

Provide flexible and adaptable forms of surveillance, reassuring staff and customers

They also assist in monitoring and responding to incidents.