26 Questions
What is the goal of adjusting sensitivity in authentication systems?
To find a balance between FAR and FRR for optimal authentication effectiveness
What type of locks require a correct combination to open?
Cipher locks
What is Access Badge Cloning?
Copying data from an RFID or NFC card onto another card or device
What technology is used in electronic access systems for authentication in secure entry areas?
Electronic badges and PINs
What is a common application of RFID and NFC technologies?
Contactless authentication
What is the primary purpose of door locks in a secure facility?
To restrict and regulate access to specific spaces or properties
What type of door lock is vulnerable to simple techniques like lock picking?
Basic Door Locks
What is the term for when a biometric system erroneously authenticates an unauthorized user?
False Acceptance Rate (FAR)
What technology is used in electronic door locks to provide enhanced security?
Wi-Fi, Bluetooth, or RFID
What is the purpose of security guards at access control vestibules?
To provide visual deterrent and assistance
What is the benefit of using identification numbers in electronic door locks?
A balance of security and convenience
What is the primary purpose of scanning the targeted individual's access badge in the access badge cloning attack?
To extract the relevant authentication credentials
What is the outcome of a successful access badge cloning attack?
The attacker gains unauthorized access to buildings, computer systems, or makes payments
Why is access badge cloning considered a significant threat to physical security?
It is easy to execute and can be done stealthily
What is the final step in the access badge cloning attack?
Using the cloned access badge to gain unauthorized access
What is the primary goal of the data extraction step in the access badge cloning attack?
To extract the relevant authentication credentials from the card
What is the primary purpose of Data Loss Prevention (DLP) systems?
To monitor data in use, in transit, or at rest to detect and prevent data theft
What is the main difference between symmetric and asymmetric encryption?
Symmetric encryption uses a single key for both encryption and decryption, while asymmetric encryption uses a pair of keys
What is the purpose of a digital certificate?
To verify the identity of a website
What is the main advantage of using asymmetric encryption?
It solves the key distribution problem
What is the purpose of a hash function?
To verify the integrity of data
What is the main difference between a block cipher and a stream cipher?
Block ciphers encrypt data in blocks, while stream ciphers encrypt data in a continuous stream
What is the purpose of a digital signature?
To verify the integrity and authenticity of a message
What is the main advantage of using Elliptic Curve Cryptography (ECC)?
It is more efficient and uses smaller key sizes than RSA
What is the purpose of a key pair in asymmetric encryption?
To provide confidentiality, integrity, authentication, and non-repudiation
What is the main purpose of a Public Key Infrastructure (PKI)?
To manage digital certificates and public-key encryption
Learn about the security measures in place at access control vestibules, including RFID and NFC badges, and the role of security guards in regulating access. Understand the importance of door locks as a critical physical security control measure.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free