2.1 – Security Measures - Physical Security

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

In an access control vestibule with multiple doors, which scenario BEST describes a secure implementation?

  • Opening any door prevents the others from being unlocked, requiring a specific order of entry.
  • Badge access unlocks one door, while all other doors remain unlocked until the first is secured. (correct)
  • All doors remain unlocked to allow for quick entry during emergencies.
  • All doors are initially unlocked, and the first door opened locks all others.

When a badge reader is used to control access to a secure area, what technology is MOST commonly used to communicate between the badge and the reader?

  • Magnetic stripe
  • Near Field Communication (NFC) (correct)
  • Bluetooth
  • Infrared (IR)

A video surveillance system with optical character recognition (OCR) capabilities is PRIMARILY used for what purpose?

  • Reading and recording license plate numbers (correct)
  • Detecting motion and triggering alarms
  • Capturing and recording video footage
  • Identifying individuals based on facial features

In the context of alarm systems, what does a 'duress' alarm typically indicate?

<p>An individual is signaling a need for immediate assistance. (C)</p> Signup and view all the answers

Combining door locks with biometric access controls enhances security by:

<p>Preventing unauthorized access even with a stolen badge or PIN. (D)</p> Signup and view all the answers

In a data center, what is the PRIMARY reason for placing locks on individual server racks?

<p>To prevent unauthorized physical access to the equipment inside (B)</p> Signup and view all the answers

What is the MAIN purpose of a security guard maintaining an access list?

<p>To ensure only authorized individuals are granted access to the facility (C)</p> Signup and view all the answers

What is the MOST significant security benefit of using bollards or barricades outside a building?

<p>They prevent vehicles from crashing into the building or restricted areas. (D)</p> Signup and view all the answers

What is a PRIMARY disadvantage of using a fence as a security control?

<p>Fences can be easily breached by determined individuals. (B)</p> Signup and view all the answers

Which of the following BEST describes the function of an access control vestibule?

<p>A secure room that controls access to a sensitive area, allowing for authentication and authorization. (D)</p> Signup and view all the answers

How can video surveillance systems be enhanced to provide more than just visual recording?

<p>By integrating features like facial recognition or license plate recognition. (A)</p> Signup and view all the answers

In physical security, what does the term 'duress' typically refer to?

<p>A silent alarm triggered by an individual under coercion. (A)</p> Signup and view all the answers

What is the purpose of using biometric access controls in conjunction with other security measures?

<p>To add an additional layer of authentication that is difficult to forge. (A)</p> Signup and view all the answers

Why is it essential to maintain proper ventilation when using locked racks in a data center?

<p>To prevent the equipment inside from overheating. (B)</p> Signup and view all the answers

What is the PRIMARY role of a security guard stationed in a reception area?

<p>To ensure that all visitors have proper authorization and credentials. (B)</p> Signup and view all the answers

Why might an organization require visitors to register in advance before arriving at a secure facility?

<p>To conduct background checks and confirm authorization for access. (D)</p> Signup and view all the answers

What are bollards primarily designed to protect against?

<p>Vehicle intrusion. (C)</p> Signup and view all the answers

What is a key consideration when choosing the type of fence for a secure perimeter?

<p>The height and material to deter climbing or cutting. (D)</p> Signup and view all the answers

How do proximity badge readers work?

<p>By using RFID or NFC technology to communicate wirelessly with the badge. (A)</p> Signup and view all the answers

What is the MOST important reason for organizations to use CCTV systems?

<p>To record events for investigation and deter criminal activity. (B)</p> Signup and view all the answers

How do alarm systems that monitor doors and windows work?

<p>By creating a magnetic or electrical circuit that is broken when the door or window is opened. (B)</p> Signup and view all the answers

When would electronic door locks be MOST suitable?

<p>In a high-traffic environment where numerous people need quick access. (A)</p> Signup and view all the answers

What does it mean when a security guard asks a visitor to wear a guest badge?

<p>The visitor has been granted temporary access and is easily identifiable as a guest. (A)</p> Signup and view all the answers

What is the MOST likely reason a data center might be surrounded by water, creating a moat?

<p>To create an extreme physical barrier against unauthorized access. (A)</p> Signup and view all the answers

What type of information is contained within the RFID chip of a proximity card?

<p>An identifier unique to that specific card. (A)</p> Signup and view all the answers

Besides video capture, what additional functionality might be included in modern video surveillance cameras?

<p>Object and facial recognition. (A)</p> Signup and view all the answers

Why is pre-registration of visitors important for organizations with strict security protocols?

<p>It enables background checks and verification of access rights before arrival. (A)</p> Signup and view all the answers

Why might razor wire be added to the top of a security fence?

<p>To deter individuals from attempting to climb over the fence. (D)</p> Signup and view all the answers

What is the benefit of having a security guard present in a reception area?

<p>To ensure that all visitors have proper authorization and prevent unauthorized access (D)</p> Signup and view all the answers

Flashcards

Access Control Vestibule

A small room controlling access to a secure area, often with multiple doors.

Interlocking Doors

Unlock one door, and the rest stay locked until it's secured.

Badge Readers

Devices that read magnetic stripes, RFID, or NFC tags for access.

Video Surveillance (CCTV)

A system using cameras to monitor and record activities in an area.

Signup and view all the flashcards

Alarm Systems

Systems that detect unauthorized entry or environmental changes.

Signup and view all the flashcards

Conventional Door Locks

Traditional locks with keys or sliding metal bolts.

Signup and view all the flashcards

Electronic Locks

PINs or Keycards used to unlock doors.

Signup and view all the flashcards

Biometric Locks

Using fingerprints, handprints, or retina scans for access.

Signup and view all the flashcards

Rack Locks

Locking individual racks to secure the equipment inside.

Signup and view all the flashcards

Security Guards

Personnel who verify identification and grant access.

Signup and view all the flashcards

Access Lists

Lists documenting authorized personnel for building access.

Signup and view all the flashcards

Barricades/Bollards

Physical barriers preventing vehicle access to an area.

Signup and view all the flashcards

Fences

Structures surrounding a property for security and access control.

Signup and view all the flashcards

Study Notes

  • Access control vestibules are commonly used to control physical access to sensitive areas like data centers.
  • Vestibules are small rooms with two or more doors for controlled entry.

Access Control Vestibule Door Control Methods

  • All doors remain unlocked until a door is opened, which locks all other doors.

  • Badging in unlocks one door, and all other doors remain locked until the first door is locked again.

  • Opening a door prevents other doors from being unlocked.

  • These methods allow only one person to move through the vestibule at a time.

  • Some vestibules involve interaction with a security guard for credential checks before access is granted.

Badge Readers

  • Badge readers are a common way to gain access to buildings using magnetic strip or proximity (RFID/NFC) cards.
  • Besides building access, badge readers record time or verify security guard patrols.
  • Proximity cards use an antenna to receive and transmit signals to the reader, with an RFID chip storing identification data.

Video Surveillance

  • Video surveillance systems (CCTV) capture video feeds that can be viewed on a single screen.
  • Some cameras now have capabilities which include:
    • License plate recognition using optical character recognition (OCR).
    • Person identification by facial recognition.
  • Video feeds are often sent to a central monitoring facility for constant recording or motion-triggered recording.

Alarm Systems

  • Alarm systems monitor environmental changes, such as doors or windows being opened.
  • Breaking a circuit by opening a door or window triggers an alarm.
  • Motion detection can be integrated to trigger alarms when movement is detected in specific areas.
  • Duress alarms enable individuals to manually signal emergencies by pressing a button.

Door Locks

  • Conventional door locks use a key to lock and unlock the door.
  • Deadbolts slide a metal piece between the door and frame for added security.
  • Electronic locks use PIN codes or keyless entry (badges).
  • Electronic locks can be combined with biometrics (fingerprint, handprint, retina scan).
  • Multiple access control methods are often used together for increased security.

Rack Security

  • Data centers use locks on racks to protect the equipment inside.
  • Racks can be self-contained or connected side-by-side, sometimes with barriers to prevent access between racks.
  • Ventilation and cooling are important considerations for enclosed racks.
  • Data center racks often have individual locks on each door.

Security Guards

  • Security guards can monitor access at reception areas, verifying identification and access permissions.
  • They may also check employee badges.
  • Visitors typically provide identification and are given guest badges.
  • Security guards maintain access lists.

Physical Barriers

  • Barricades or bollards control or prevent vehicle access.
  • Large planters may be reinforced with concrete to act as barriers.
  • Water moats provide a secure perimeter around data centers, with access limited to a guarded entrance.

Fences

  • Fences are a visible physical security control.
  • Fences can be built in different heights and materials.
  • Opaque fences conceal what's inside, while others are see-through.
  • High-security fences may include razor wire to prevent climbing.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Use Quizgecko on...
Browser
Browser