1/32
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Physical Security
Protection of physical items, objects, or areas from unauthorized access and misuse. Most technology-based controls can be circumvented if an attacker gains physical access.
Information Security
A branch of security that protects data from unauthorized access, use, disclosure, modification, or destruction, often relying on technology-based controls.
Fire Control
Measures and systems to detect and suppress fire hazards within a facility.
Surveillance Systems
Systems such as closed-circuit television (CCTV) used to monitor and record events to ensure the security of physical spaces.
Uninterruptible Power Supply (UPS)
A backup power source for computing systems in the event of a power outage.
Physical Access Controls
Measures taken to control and restrict physical access to facilities and equipment, including walls, fencing, and guards.
Mantrap
A small enclosure with two doors that prevent unauthorized access by verifying individuals before allowing them to enter or exit.
Electronic Monitoring
The use of electronic devices, such as cameras or sensors, to detect and record physical activity or events.
Locks and Keys
Devices used to restrict access to secured areas, with types ranging from mechanical to electronic or biometric.
ID Cards and Badges
Security measures that authenticate an individual's access to specific areas, though they should not be the sole form of control as they can be stolen or duplicated.
Guards
Security personnel responsible for monitoring facilities and responding to potential security threats.
Dogs
Security animals used for their keen senses (smell, hearing) to detect intruders or threats that human guards might not.
Walls, Fencing, and Gates
Physical barriers used to control access to a secure facility and protect it from external threats.
Fire Detection Systems
Systems designed to detect the presence of a fire through various methods, such as thermal, smoke, or flame detection.
Fire Suppression Systems
Devices or systems installed to detect and respond to fires, using methods such as water, carbon dioxide, or gas-based agents to extinguish flames.
Class A, B, C, D, K Fires
Classifications of fires based on the type of fuel they burn (Class A: ordinary combustibles, Class B: flammable liquids, etc.).
Carbon Dioxide Fire Suppression
A fire suppression method that removes oxygen to extinguish fires, often used in data centers.
Halon Fire Suppression
A clean, gaseous fire suppression method, now phased out due to its ozone-depleting properties.
HVAC (Heating, Ventilation, and Air Conditioning)
Systems that control the temperature, humidity, and air quality of a building. HVAC systems can impact physical security by affecting equipment performance and safety.
Power Management and Conditioning
Systems and practices that ensure proper, stable, and noise-free electrical power to critical systems and equipment.
Grounding
Ensuring that the returning flow of current is properly discharged to the ground, helping prevent electrical faults and hazards.
Amperage
The strength of an electrical current measured in amperes, critical to prevent overloads that could lead to overheating or fire.
Emergency Shutoff
A safety mechanism allowing immediate power cutoff in cases where current poses a risk to human or machine safety.
Water Detection Systems
Systems integrated into a facility's alarm system to detect water leaks or flooding that could damage equipment or disrupt services.
Structural Collapse
The failure of a building or facility due to overloading or environmental factors, potentially leading to injuries or property loss.
Uninterruptible Power Supply (UPS) Types
Different configurations of UPS systems including Standby, Line-Interactive, and Double Conversion Online, each providing varying levels of backup power protection.
Electromagnetic Interception
The unauthorized interception of electromagnetic radiation emitted by electronic devices, typically targeted for espionage.
TEMPEST
A U.S. government program designed to reduce the risk of electromagnetic radiation (EMR) monitoring and interception.
CompuTrace
Software that can be installed on laptops to track and report stolen devices to a central monitoring system.
Telecommuting
The practice of working remotely from a location outside the main office, often requiring secure access to corporate systems via the internet or other means.
Social Engineering
The manipulation of individuals to disclose confidential information through psychological tactics or deceit.
Inventory Management
The regular tracking and inspection of computing equipment, data storage media, and classified information to ensure security and prevent unauthorized access.