Physical Security for Systems (Week 4)

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

This measures are designed to prevent unauthorized access, theft, damage, and tampering of computer systems and the sensitive data they contain

1 / 42

flashcard set

Earn XP

Description and Tags

review for Physical Security for Systems (Week 4)

43 Terms

1

This measures are designed to prevent unauthorized access, theft, damage, and tampering of computer systems and the sensitive data they contain

Physical security

New cards
2

Data centers house servers, storage devices, and networking equipment that store and process sensitive data.

Protecting Data Centers

New cards
3

Physical security measures are essential for safeguarding office spaces and workstations where employees access and use digital assets. Access control systems, locks, and security badges restrict entry to authorized personnel only, reducing the risk of unauthorized access to computers and data

Securing Workplaces

New cards
4

Physical security helps prevent theft of physical devices that contain sensitive information, such as laptops, smartphones, and removable storage media

Preventing Physical Theft

New cards
5

Physical security measures, including backup power systems, environmental controls, and fire suppression systems, help ensure the continuous operation of data centers and IT infrastructure

Ensuring Business Continuity

New cards
6

Physical security extends to the _____________, such as fiber optic or copper cables

Protecting Communication Lines

New cards
7

Access controls, including key cards, biometrics, and smart locks, ensure that only authorized individuals can enter secure areas or gain physical access to devices

Managing Physical Access

New cards
8

____________ provide real-time visibility into physical spaces, allowing security personnel to detect and respond to security incidents promptly

Surveillance and Monitoring

New cards
9

Proper ____________, such as temperature and humidity regulation, protect servers and storage devices from environmental factors that could lead to hardware failure and data loss

Environmental Controls

New cards
10

____________ systems can detect unauthorized physical access or tampering attempts, triggering alarms or alerts for rapid response.

Physical Intrusion Detection

New cards
11

Managing the entry and movement of visitors within an organization's premises is essential for maintaining security. Visitor logs, badges, and escort policies are part of physical security practices.

Visitor and Crowd Management

New cards
12

Physical security measures can include strategies for disaster recovery, such as off-site backups and secure storage of critical data, to ensure data can be recovered in case of physical disasters like fires or floods

Disaster Recovery

New cards
13

A strategy aimed at discouraging potential threats or malicious actors from attempting unauthorized actions, intrusions, or security breaches

SECURITY LAYERS
Deterence

New cards
14

Focused on slowing down or impeding unauthorized individuals or threats from accessing secured areas, assets, or information.

SECURITY LAYERS
Delay

New cards
15

such as turnstiles, gates, or security checkpoints, create a physical barrier that forces individuals to slow down and undergo identity verification or screening before entering secured areas

DELAY
Controlled access points

New cards
16

These are locks, reinforced doors, and security barriers (like bollards) that are meant to delay unauthorized access attempts. These measures make it more challenging for intruders to breach physical barriers quickly

DELAY
Locks and Barriers

New cards
17

__________ around a facility or property can serve as a delay measure, making it more difficult for intruders to breach perimeter defenses

DELAY
Security Fencing

New cards
18

Secure areas within a building designed to provide temporary protection during emergencies. They are usually equipped with reinforced walls and communication systems to delay threats.

DELAY
Safe rooms

New cards
19

Structures like bollards, gates, and barricades that are designed to prevent vehicles from ramming into secured areas, adding an additional layer of delay and protection.

DELAY
Vehicle Barriers

New cards
20

These areas are designed to delay unauthorized access to valuable assets, documents, or data. They often have multiple layers of security, including reinforced walls and access controls.

DELAY
Vaults and Secure Storage

New cards
21

Well-defined control measures that require authentication, authorization, and verification before granting access thus introduce delay in the entry process.

DELAY
Access Control Procedures

New cards
22

concentrates on locating and warning security systems or employees of potential threats.

SECURITY LAYERS
Detection

New cards
23

_________, including CCTV (Closed-Circuit Television) systems, are widely used for monitoring and recording activities in and around secured areas

DETECTION
Surveillance Cameras

New cards
24

They use sensors, alarms, or sensors placed at entry points, doors, windows, and other vulnerable areas to trigger alerts when unauthorized access is detected

DETECTION
Intrusion Detection Systems

New cards
25

Access control systems generate logs that record entry and exit activities.

DETECTION
Access Control Logs

New cards
26

__________, such as fingerprint scanners or facial recognition technology, can detect and verify the identity of individuals attempting to access secured areas

DETECTION
Biometric systems

New cards
27

Can detect movement within specific areas, triggering alarms or alerts when unauthorized movement is detected

DETECTION
Motion Sensors

New cards
28

These sensors monitor ______ conditions, such as temperature, humidity, and gas levels.

DETECTION
Environmental Sensors

New cards
29

This measures, such as fences, gates, and barriers, can include sensors that detect breaches or attempts to scale or tamper with physical barriers.

DETECTION
Perimeter Security

New cards
30

Audio sensors can pick up unusual sounds or patterns, such as glass breaking or loud noises, and trigger alerts

DETECTION
Sound Detection

New cards
31

________systems can track the movement of tagged assets or individuals within a secured area, helping identify unauthorized access or movement.

DETECTION

Radio Frequency Identification

New cards
32

Human observation and patrols by security personnel can play a crucial role in detection

DETECTION

Security Personnel

New cards
33

_________ or panic buttons can be used by individuals to discreetly signal for assistance when facing a threat

DETECTION

Duress alarms

New cards
34

Proactive and continuing procedure used as part of physical security enforcement with the goal of identifying and analyzing potential security risks and weaknesses

SECURITY LAYERS
Assessment

New cards
35

The steps are done to address a security breach, incident, or threat in order to ameliorate the situation and safeguard resources, people, and information

SECURITY LAYERS
Response

New cards
36

This can lead to the ruin of critical hardware components, such as servers, networking equipment, and storage devices

PHYSICAL SECURITY THREATS
Physical damage

New cards
37

Happens when there is physical damage to computers, special gadgets or telecommunications cables or power lines.

PHYSICAL SECURITY THREATS

New cards
38

This is a common phenomenon in physical security breaches, such as unauthorized access to data centers or server rooms, can lead to data theft.

PHYSICAL SECURITY THREATS
Physical Theft

New cards
39

It is due to physical security lapses may be the result of unauthorized individuals gaining access to computer systems or data centers. Once inside, they may tamper with hardware components, insert malicious hardware devices thus compromising the integrity of the system

PHYSICAL SECURITY THREATS
Loss of system integrity

New cards
40

These threats are typically beyond an organization's control and include various environmental events and phenomena like natural disasters (flooding, earthquakes, tsunamis, hurricanes, cyclones, wildfires, etc.), extreme weather threats, pandemics, etc.

CATEGORIES
Natural environmental threats

New cards
41

The risks that can derail computer operations like in power outages, communication interruptions and ventilation disruptions

CATEGORIES
Supply system threats

New cards
42

The threats are perpetuated by people with varying reasons for doing so such as thieves, disgruntled employees, fraudsters, thrill seekers, revengers, terrorists, sabotages, crackers, etc

CATEGORIES
Manmade threats

New cards
43

Risks posed by people whose motives are mainly due to strife, politics, strikes, riots, civil disobedience, vendetta, hate, racism, exclusivism, ideology, state religion, persecution, wars, rebellion, etc.

CATEGORIES
Politically motivated threats

New cards

Explore top notes

note Note
studied byStudied by 80 people
... ago
5.0(3)
note Note
studied byStudied by 19 people
... ago
5.0(1)
note Note
studied byStudied by 24 people
... ago
5.0(1)
note Note
studied byStudied by 15 people
... ago
5.0(1)
note Note
studied byStudied by 42 people
... ago
5.0(2)
note Note
studied byStudied by 27 people
... ago
5.0(1)
note Note
studied byStudied by 13 people
... ago
5.0(1)
note Note
studied byStudied by 35266 people
... ago
4.8(98)

Explore top flashcards

flashcards Flashcard (64)
studied byStudied by 9 people
... ago
5.0(1)
flashcards Flashcard (38)
studied byStudied by 7 people
... ago
5.0(1)
flashcards Flashcard (53)
studied byStudied by 7 people
... ago
5.0(1)
flashcards Flashcard (46)
studied byStudied by 6 people
... ago
5.0(1)
flashcards Flashcard (27)
studied byStudied by 16 people
... ago
5.0(1)
flashcards Flashcard (50)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (58)
studied byStudied by 12 people
... ago
5.0(1)
flashcards Flashcard (28)
studied byStudied by 110 people
... ago
5.0(1)
robot