Info Assurance Lesson 7 - Protecting a Cybersecurity Domain (Physical Security)

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/12

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

13 Terms

1
New cards

Physical barriers

They are the first thing that comes to mind when thinking about physical security. This is the outermost layer of security, and these solutions are the most publicly visible.

2
New cards

perimeter security system

It typically consists of perimeter fence system, security gate system, bollards, vehicle entry barriers and guard shelters

3
New cards

Biometrics

They are the automated methods of recognizing an individual based on a physiological or behavioral characteristic.

4
New cards

Biometric authentication systems

It include measurements of the face, fingerprint, hand geometry, iris, retina, signature, and voice.

5
New cards

Biometrics

These technologies can be the foundation of highly secure identification and personal verification solutions

6
New cards

Badge

It allows an individual to gain access to an area with automated entry points.

7
New cards

entry point

It can be a door, a turnstile, a gate, or other barrier.

8
New cards

Access badge

It use various technologies such as a magnetic stripe, barcode, or biometrics. The system logs the transaction for later retrieval.

9
New cards

Reports

It reveal who entered what entry points at what time.

10
New cards

Guards and Escorts

All physical access controls including deterrent and detection systems ultimately rely on personnel to intervene and stop the actual attack or intrusion.

11
New cards

Video and Electronic Surveillance

This type of surveillance can supplement or in some cases, replace security guards.

12
New cards

Video and Electronic Surveillance

The benefit of this are the ability to monitor areas even when no guards or personnel are present, the ability to record and log surveillance videos and data for long periods, and the ability to incorporate motion detection and notification.

13
New cards

RFID and Wireless Surveillance

These types of surveillance are used to manage and locate important information system assets.