Physical security

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/24

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

25 Terms

1
New cards

Access control vestibule

A type of security that aim to provide access to a controlled group of people, some will have locked door others wont, some will have one door opened and another door locked, they all aim to control access and only provide access to the correct people.

2
New cards

Badge reader

Come in many types magnetic, RFID, or NFC, can be used for many applications including time clocks, security guard patrols, door access, etc.

3
New cards

Video surveillance

CCTV, can be use to replace physical guards, cameras can have object detection which can identify a license plate or face. Often many cameras will be networked together, they can provide motion detection and use radio reflection or passive infrared. Commonly found in areas that are not often in use.

4
New cards

Alarm systems

Useful on the perimeter

5
New cards

Motion sensors

Identify motion without a camera.

6
New cards

Door locks

Come in all shapes and sizes, conventional, deadbolt, electronic, PIN, token-based, RFID badge, biometric, etc.

7
New cards

Equipment locks

Data center hardware is usually managed by different groups, racks can be installed together, enclosed cabinets with locks.

8
New cards

Guards

9
New cards

Bollards

A type of device use to funnel people or vehicles, can be used as a safety measure.

10
New cards

Fences

11
New cards

Key fobs

RFID key, replaces a physical key, commonly used for door lock. proximity operation and contactless

12
New cards

Smart cards

Certificate based authentication, something you have, usually requires additional factors, integrated card reader, built into the laptop, external reader, USB connected.

13
New cards

Keys

Rarely used, use a key cabinet, formal check in’/check out

14
New cards

Biometrics

Usually stores a mathematical representation of your biometric, difficult to change, used in very specific situations not foolproof

15
New cards

lighting

16
New cards

Magnetometers

passive scanning, detects metal objects

17
New cards

Principle of least privilege

rights and permissions should be set to the bare minimum, applications should run with minimal privileges. Limits the scope of malicious behavior.

18
New cards

ACL

used to allow or deny traffic, also used for NAT, QoS, etc. commonly on the ingress/egress of a router interface, ACL evaluate on certain criteria, source/destination IP, TCP/UDP port numbers, ICMP, also used in OS, allow/deny access to the filesystem

19
New cards

MFA

20
New cards

Email filtering

Unsolicited email needs to be stopped at the gateway before it reaches the user, can be on sited or cloud based. scan and block malicious software, executables, known vulnerabilities, phishing attempts, other unwanted content

21
New cards

Hard token

physical devices i.e. key fobs, card that generate OTPs or time based OTP

22
New cards

Soft token

software applications installed on device like a smartphone

23
New cards

SMS

text messaging, login factor can be sent via SMS to a predefined phone number, provide username and password, phone receives an SMS, input the SMS code into the login form, security issues exist, phone number can be reassigned to a different phone, SMS messages can be intercepted, SMS spoofing.

24
New cards

Voice call

A phone call provides the token, similar disadvantages to SMS, phone call can be intercepted or forwarded, phone number can be added to another phone.

25
New cards

Active directory

Login script automate a series of tasks during login, can be assigned to a specific user, group, or OU. associate the script with a group policy. Domain the name associated with this related group of users, computers and resources, each domain has a name, domain controllers store this central domain database, active directory is the service that manages this directory, often referenced when troubleshooting, is this computer on the domain, can you rest the domain password Group policy/updates manage the computers or user with group policies, local domain policies group policy management editor, a central console, login scripts, network configuration (QoS), security parameters Organizational units keep the database organized, users, computers, create your own hierarchy, countries, states, buildings, departments, etc. apply policies to an OU, can be very large i.e. domain users, or a specific group i.e. marketing, north America Home folder assign a user home folder to a network folder, avoid storing files on the local computer, when added to the user profile the directories are automatically created and proper permissions are assigned Folder redirection some users and apps use the windows library folders, redirect the folders to a network share, this is often paired with the offline files feature security groups create a group, assign permissions to the group, set the rights and permissions to the group, add users to the group, there are built in groups i.e. users, guest, remote management users, event log readers, save time avoid confusion and mistakes