Usable Quiz 5.1: Physical Security

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/32

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

33 Terms

1
New cards

Physical Security

Protection of physical items, objects, or areas from unauthorized access and misuse. Most technology-based controls can be circumvented if an attacker gains physical access.

2
New cards

Information Security

A branch of security that protects data from unauthorized access, use, disclosure, modification, or destruction, often relying on technology-based controls.

3
New cards

Fire Control

Measures and systems to detect and suppress fire hazards within a facility.

4
New cards

Surveillance Systems

Systems such as closed-circuit television (CCTV) used to monitor and record events to ensure the security of physical spaces.

5
New cards

Uninterruptible Power Supply (UPS)

A backup power source for computing systems in the event of a power outage.

6
New cards

Physical Access Controls

Measures taken to control and restrict physical access to facilities and equipment, including walls, fencing, and guards.

7
New cards

Mantrap

A small enclosure with two doors that prevent unauthorized access by verifying individuals before allowing them to enter or exit.

8
New cards

Electronic Monitoring

The use of electronic devices, such as cameras or sensors, to detect and record physical activity or events.

9
New cards

Locks and Keys

Devices used to restrict access to secured areas, with types ranging from mechanical to electronic or biometric.

10
New cards

ID Cards and Badges

Security measures that authenticate an individual's access to specific areas, though they should not be the sole form of control as they can be stolen or duplicated.

11
New cards

Guards

Security personnel responsible for monitoring facilities and responding to potential security threats.

12
New cards

Dogs

Security animals used for their keen senses (smell, hearing) to detect intruders or threats that human guards might not.

13
New cards

Walls, Fencing, and Gates

Physical barriers used to control access to a secure facility and protect it from external threats.

14
New cards

Fire Detection Systems

Systems designed to detect the presence of a fire through various methods, such as thermal, smoke, or flame detection.

15
New cards

Fire Suppression Systems

Devices or systems installed to detect and respond to fires, using methods such as water, carbon dioxide, or gas-based agents to extinguish flames.

16
New cards

Class A, B, C, D, K Fires

Classifications of fires based on the type of fuel they burn (Class A: ordinary combustibles, Class B: flammable liquids, etc.).

17
New cards

Carbon Dioxide Fire Suppression

A fire suppression method that removes oxygen to extinguish fires, often used in data centers.

18
New cards

Halon Fire Suppression

A clean, gaseous fire suppression method, now phased out due to its ozone-depleting properties.

19
New cards

HVAC (Heating, Ventilation, and Air Conditioning)

Systems that control the temperature, humidity, and air quality of a building. HVAC systems can impact physical security by affecting equipment performance and safety.

20
New cards

Power Management and Conditioning

Systems and practices that ensure proper, stable, and noise-free electrical power to critical systems and equipment.

21
New cards

Grounding

Ensuring that the returning flow of current is properly discharged to the ground, helping prevent electrical faults and hazards.

22
New cards

Amperage

The strength of an electrical current measured in amperes, critical to prevent overloads that could lead to overheating or fire.

23
New cards

Emergency Shutoff

A safety mechanism allowing immediate power cutoff in cases where current poses a risk to human or machine safety.

24
New cards

Water Detection Systems

Systems integrated into a facility's alarm system to detect water leaks or flooding that could damage equipment or disrupt services.

25
New cards

Structural Collapse

The failure of a building or facility due to overloading or environmental factors, potentially leading to injuries or property loss.

26
New cards

Uninterruptible Power Supply (UPS) Types

Different configurations of UPS systems including Standby, Line-Interactive, and Double Conversion Online, each providing varying levels of backup power protection.

27
New cards

Electromagnetic Interception

The unauthorized interception of electromagnetic radiation emitted by electronic devices, typically targeted for espionage.

28
New cards

TEMPEST

A U.S. government program designed to reduce the risk of electromagnetic radiation (EMR) monitoring and interception.

29
New cards

CompuTrace

Software that can be installed on laptops to track and report stolen devices to a central monitoring system.

30
New cards

Telecommuting

The practice of working remotely from a location outside the main office, often requiring secure access to corporate systems via the internet or other means.

31
New cards

Social Engineering

The manipulation of individuals to disclose confidential information through psychological tactics or deceit.

32
New cards

Inventory Management

The regular tracking and inspection of computing equipment, data storage media, and classified information to ensure security and prevent unauthorized access.

33
New cards