Physical Security

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/35

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

36 Terms

1
New cards

Physical Security

Measures taken to protect tangible assets, like buildings, equipment, and people, from harm or unauthorized access.

2
New cards

Bollards

Short, sturdy vertical posts designed to control or prevent access by vehicles to an area or structure

3
New cards

Fences

Barriers that are made of posts, wire, or boards that are erected to enclose a space or separate areas

4
New cards

Surveillance System

Organized strategy or setup designed to observe and report activities in a given area

5
New cards

Access Control Vestibule

Double-door system with two electronically controlled doors that ensure only one door is open at any given moment

6
New cards

Piggybacking

Involves two people, with and without access, entering a secure area

7
New cards

Tailgating

Occurs whenever an authorized person closely follows someone iwth access without their knowledge or consent

8
New cards

What are fences meant to keep out of our facilities?

People

9
New cards

What are bollards mean to keep out of our facilities?

Vehicles

10
New cards

Brute Force

Attack where access to a system is gained by trying all of the possibilities until breaking through

11
New cards

Forcible Entry

Act of gaining unauthorized access to a space by physically breaking or bypassing its barriers, such as windows, doors, or fences

12
New cards

Tampering with Security Devices

Involves manipulating security devices to create new vulnerabilities that can be exploited

13
New cards

Confronting Security Personnel

Involves the direct confronation or attack of security personnel

14
New cards

Pan-Tilt-Zoom (PTZ)

Can move the camera or its angle to better detect issues during an intrusion

15
New cards

Security Guards

Flexible and adaptable forms of serveillance that organizations use

16
New cards

Lighting

Proper lighting is crucial for conducting effective surveillance using both video and security guards

17
New cards

Sensors

Devices that detect and respond to external changes in the environment and conver the information into readable signals or data

18
New cards

Infrared Sensors

Detect changes in infrared radiation that is emitted by warm bodies like humans or animals

19
New cards

Pressure Sensors

Activate when a specified minimum amount of weight is detected on the sensore that is embedded into the floor or a mat

20
New cards

Microwave Sensors

Detect movement in an area by emitting microwave pulses and measuring their reflection off moving objects

21
New cards

Ultrasonic Sensors

Measure the reflection of ultrasonic waves off moving objects

22
New cards

Visual Obstruction

Blocking the camera’s line of sight (paint on camera, etc)

23
New cards

Blind Sensors and Cameras

Overwhelming the sensor or camera with a sudden burst of light to render it ineffective for a limited period of time

24
New cards

Acoustic Interference

Jamming or playing loud music to disrupt the microphone’s functionality

25
New cards

Electromagnetic Interference (EMI)

Jamming the signals that surveillance systems rely on to monitor the environment

26
New cards

Physical Environment Attack

Exploiting the environment around the surveillance equipment to compromise its functionality

27
New cards

Piggybacking

Person with legitimate access intentionally allows another person without authorization to enter a secure area with them

28
New cards

Door Locks

Physical security control that is designed to secure entryways by restricting and regulating access to a particular space or property

29
New cards

False Acceptance Rate (FAR)

The rate that the system authenticates a user as valid, even though that person should not have been granted access to the system

30
New cards

False Rejection Rate (FRR)

Occurs any time the biometrics system denies a user who should have been allowed access to the system

31
New cards

Equal Error Rate (EER)

More commonly called Crossover Error Rate (CER), which uses a measure of the effectiveness of a given biometrics system to achieve a balance

32
New cards

What kind of crossover error rate does a good lock have?

A good lock will have a lower crossover error rate

33
New cards

Cipher lock

Provides excellent protection using a mechanical locking mechanism with push buttons that are numbered and require a person to enter the correct combination inorder to open that door

34
New cards

Access Badge Cloning

Refers to copying the data from an RFID or NFC card or badge onto another card or device

35
New cards

What are the 4 steps to cloning an access badge?

Scanning, Data Extraction, Writing to a new card, and using a cloned access badge

36
New cards

How do you stop card cloning?

  1. Implement advanced encryption in card-based authentication systems

  2. Implement Multi-factor authentication (MFA)

  3. Regularly update the security protocols

  4. Educate the users

  5. Users should implement the use of shielded wallets or sleeves with RFID access badges

  6. Monitor and audit the access logs