Virus and Worms
Physical Security
Fault |
Description |
---|---|
Blackout |
Prolonged loss of power |
Brownout |
Power degradation that is low and less than normal |
Sag |
Momentary low voltage |
Fault |
Momentary loss of power |
Spike |
Momentary high voltage |
Surge |
Prolonged high voltage |
Noise |
Interference superimposed onto the power line |
Transient |
Noise disturbances of a short duration |
Inrush |
Initial surge of power at startup |
- A turnstile is a form of gate that prevents more than one person at a time from gaining access to a controlled area. Turnstiles usually only turn in one direction to restrict movement to only that direction.
- Piggybacking is the primary way that someone would try to bypass a mantrap. To prevent and detect this, guards and CCTV can be used.
- Fire prevention should be performed to make sure that employees are trained and know how to prevent fires from occurring and how to respond when they do.
- Fire detection systems are used to signal employees that there might be a problem.
- Fire suppression addresses the means of extinguishing a fire. Not all fires are composed of the same combustible components.
- Passwords and pin numbers These authentication systems are based on something you know: as an example, a name and an alphanumeric password or pin number.
- Tokens, smart cards, and magnetic strip cards These authentication systems are based on something you have. As an example, your employer might have issued you a smart card with your ID embedded in it that is read by readers throughout the organization and will allow you to access controlled areas.
- Biometrics These authentication systems are based on what you are, such as a fingerprint, retina scan, or voice print. As an example, the company you work for might have placed a fingerprint reader outside the server room to keep unauthorized individuals out.
- The discretionary access control model is one most users are familiar with. Access control is left to the owner's discretion.
- Mandatory access control features a static model and is based on a predetermined list of access privileges.
- Defense in depth is about building multiple layers of security that will protect the organization better than one single layer.
Linux Hacking
|