1/30
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Bollards/barricades
A physical access control that mainly prevents cars from ramming buildings or other things
Access Control Vestibules
A physical control, similar to a mantrap that when a person opens one door another door locks until the initial door is closed and locked too.
Industrial camouflage
hiding buildings, parts of a building, and a wide variety of other items in an industrial setting
Two-person integrity/control
a security control that requires the presence of at least two authorized individuals to perform tasks.
Biometric locks
Door and entry locks that are activated by such biometric features as voice; eye retina; fingerprint or signature
Electronic Locks
Locks that can be integrated into alarm systems and combined with other building management systems—specifically, these locks can be integrated with sensors to create a number of various combinations of locking behavior.
Physical Locks
A type of lock that requires a key for opening.
Cable Locks
Used to secure portable computers, external hard drives, and other portable pieces of hardware to a table or other object.
USB data blocker
Hardware plug to prevent malicious data transfer when a device is plugged into a USB charging point.
Motion Detection Sensors
Many organizations use a combination of automation, light dimmers, and motion sensors to save on electricity costs without sacrificing security
Noise Detection Sensor
can detect any noise or when noise exceeds a certain level. They work like motion detection sensors and alert on any sound to control lights or set off alarms.
Proximity Reader
small credit-card sized cards that activate when they are close to a card reader. Many organizations use these with proximity readers for access points.
Moisture detection sensor
Some organizations are located within flood zones and use moisture detection methods to detect flood events. In some cases, they can turn on water pumps before the water causes damage. In other cases they turn off equipment before the water causes damage
Cards
Some smart cards and badges include sensors that can also be used for access. Users insert the cards or badges into a reader instead of waving them in front of a proximity reader
Temperature Sensor
HVAC systems have temperature and humidity controls to maintain proper temperature and humidity values. Computing systems need to be kept cool, and excessive humidity causes moisture. Some temperature sensors are tied into fire detection systems as a backup to smoke detection.
Visitor Logs
A physical log that keeps track of who enters and leaves a facility.
Faraday Cages
typically a room that prevents radio frequency signals from entering into or emanating beyond a room
Air Gap
a physical security control that ensures that a computer or network is physically isolated from another computer or network
Screened Subnet
also known as DMZ; commonly uses two firewalls; one betweenpublic network and DMZ; other resides between the DMZ and the private network
Protected cable distribution
A system of cable conduits used to protect classified information transmitted between two secure areas.
Secure areas
Areas of a building which should have a restricted list of people who can enter them.
Vault
a room or large compartment used to store valuables
Safe
used in many offices to help prevent the theft of smaller items
Hot Aisle
Aisle in a data center where each side has the back end of appliances which exhaust warm or hot air. This keeps the hot air all in one area
Cold Aisle
Aisle in data center where each side has the fronts of appliances and cold air is piped into the space.
Burning
Many organizations burn materials in an incinerator. Obviously this can be done with printed materials but isn't as effective with all materials.
Shredding
You can physically shred papers by passing them through a shredder. When doing so, it's best to use a cross-cut shredder that cuts the paper into fine particles.
Pulping
An additional step taken after shredding paper. It reduces the shredded paper into a mash or puree.
Pulverizing
the process of physically destroying media to sanitize it, such as with a sledge hammer. optical media is often pulverized because it is immune to degaussing methods and many shredders can't handle the size of optical media.
Degaussing
rendering the data on tape and magnetic disk drives unreadable using a very powerful magnet.
Third-party solutions
Many companies provide data destruction services. As an example you can drop off documents at almost any UPS store and they will shred them for you.