1/21
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Data Centers
contain massive quantities of valuable information and computing resources.
Server rooms
also contains sensitive data information in less secure locations
Media Storage facilities may require additional attention particularly if
in a remote location
Evidence storage locations must
preserve the chain of custody
Wiring closets offer access to
eavesdroppers and network intruders
Distribution cabling must
be protected from unauthorized access
Gates
Allows you to focus security controls
Bollards
block vehicles while allowing pedestrian traffic
Crime Prevention Through Environmental Design (CPTED)
is a program that helps facilities achieve three main goals
Three main goals of CPTED
Natural Surveillance
Natural Access Control
Natural Territory Reinforcement
Natural Surveillance
allows employees and passersby to observe what’s happening outside
Natural Access Control
uses gates and other structures to funnel people to a single point of entry
Natural Territory Reinforcement
makes it obvious an area is closed to the public
Visitor Management procedures protect against intrusions
True
Visitor Procedures
Describe allowable visit purposes
explain visit approval authority
describe requirements for unescorted access
explain role of visitor escorts
All visitors access to secure areas should be
logged
Visitors should be clearly identified with distinctive badges
True
Cameras should
always be disclosed to visitors
Security guards
play a crucial role in physical security
Receptionists
may acts as security guards
Two Person Integrity
two people must enter sensitive areas together
Two Person Control
two people must jointly approve sensitive actions