You are on page 1of 2

Charles McBride

CIST 1601

Chapter 9 Review

1. Physical security refers to the security of the physical assets of organization like the hardware of
the network system. Human errors, information extortion and technical failures are used by
wrong doers by hacking the information from theses system or by damaging the hardware.
2. IT department is responsible primarily for the security of the software. The security department
is responsible for making and implementing security department is responsible for making and
implementing security policies. General management is responsible to facilitate the IT and
security departments.
3. Physical and logical access control are both responsible to protect the important information
form being damaged or hacked. The physical access control protects the physical resources like
hardware and logical control protects in the soft form.
4. Secure facility is in the form of a physical location like a room or a building to protect from
physical threats. Its primary objective is to protect the physical assets. The secondary objective
could be directing user’s information asset utilization in an appropriate manner.
5. Guard are considered the most effective control because they involve the effective use of
human intellect. They are usually the most expensive because it requires staffing of human
resources. Dogs can be used for physical security when human senses cannot overcome the
situation. Dogs have a superior smelling than human in some security situations.
6. Manual locks are used to lock physical doors, programmable locks are electronic locks used in
setting off alarms systems, electronic locks can be integrated with alarm systems to secure
computer rooms and biometric locks use human unique physical attributes like retina scans and
fingerprints for security purposes.
7. Fail safe and fail secure are the possible modes that locks use when they fail. When power is cut
off, fail-safe locks unlocks and secure safe lock automatically. Fail safe locks are used publically,
whereas fail secure locks are used in high security areas.
8. Mantrap is a combination of two doors, which function alternatively. When one door is
unlocked the other is locked and vice versa. They are used for full-proof security.
9. The most common form of alarm is burglar alarm. These kinds of alarm detects an unauthorized
entry to a secured area. It sensed motion weigh and glass or door breaking.
10. Physical firewalls are used to separate different physical areas in an organization. The main
reason could be to make physical spaces for different individuals and other resources.
11. In my opinion, fire has caused more damage than any other form of threat in the history of
humanity.
12. Three elements that must be present for a fire to ignite and continue to burn are source of
ignition, oxygen and fuel. The fire suppression systems prevents the environment from these
three elements to quell fires.
13. Flame detection, smoke detection, and thermal detection are the three basic fire detection
strategies. Most commonly used is smoke detection.
14. A) Ordinary fires caused by wood, paper and textiles types of ingredients. B) Fires fueled by
liquids and gases. C) Fires caused by electric appliances and other electrical equipment. D) Fires
due to some metals that are highly combustible lie magnesium and sodium.
15. Halon was introduced in the 1960’s which an effective fire extinguisher in gas form. Its use id
restricted because it is dangerous to the ozone layer that protects the world’s environment.
16. HVAC or Heating, ventilation and air conditioning are the factors that can influence the quality
and functioning of the physical security. The four characteristics are humidity, static, filtration,
and temperature. The optimal humidity is from 40 to 60 percent.
17. The four UPS are standby that is activated when there is any interruption, Ferrorensonant
standby that utilized the UPS as an electric battery, Line-interactive that generates electricity
through inverters and true online which works in reverse of a standby.
18. Water is important for air conditioning and fire safety procedures. Computer system might
require an air conditioning system to operate efficiently. Fire safety is also important for the
physical safety of organizational information assets.
19. Direct observation: When employees can observe the data and take soft and hard copies of the
data with them. This can be prevented by bodily checks.
Interception of data transmission: this mechanism is utilized by different hackers to intercept
data and steal it. Strong transmission keys and other encryption methods can be utilized to
prevent them.
Electromagnetic Interception: cables that transfer data have electromagnetic signals coming out
of them. Electromagnetic transmission monitoring programs can be used to prevent from such
kinds of security breaches.
20. The risk of death can be reduced by keeping the device near you at all times. Devices can be
fitted with GPS signal transmitters to let you know where it is in case it is stolen.

You might also like