Settings
Language
Color Theme
What is Physical Security?
Physical security refers to the protection of people, assets, and facilities from physical threats such as burglars, vandals, and even hackers.
What is Physical Security?
Physical security refers to the protection of people, assets, and facilities from physical threats such as burglars, vandals, and even hackers.
View Options Again
Physical security is the protection of online accounts and passwords from being hacked.
Physical security involves the protection of people, assets, and facilities from physical threats.
Physical security is a device that is used to protect computers.
Physical security involves the use of encryption and firewalls to secure data.
Protection Methods
Ensuring you're safe from physical threats requires the implementation of a variety of different types of physical security controls. These may include:
Perimeter security
Access controls
Surveillance
Including fencing around the perimeter of a facility or property to deter unauthorized access. Gates to control access to a facility or property. Finally, doors and a walled interior segment access between the interior and exterior of a building.
Including locks on doors and windows to prevent unauthorized access. Issuing keys to authorized individuals to allow them access to certain areas of a facility or property. Finally, security badges are issued to authorized individuals to allow them access to certain areas of a facility or property.
Including closed-circuit television (CCTV) cameras to monitor and record activity within a facility or property. Finally, hiring security guards to patrol a facility or property and monitor activity.
Which of the following is NOT a physical security control?
Network security is in a different domain from physical security. Permiter security, access control, and surveillance are all examples of physical security controls.
View Options Again
Perimiter security.
Access control.
Network security.
Surveillance.
Privacy Considerations
In many countries, laws protect individuals' privacy and limit the collection and use of personal information. Regarding physical security, this often includes surveillance cameras and should be carefully considered.
Liability Considerations
Organizations can be held liable for any injuries or damages that occur on their property, including those that result from security breaches or failures. To minimize the risk of liability, physical security is a must.
Cyber Security Considerations
While cyber and physical security are two distinct security domains, they do overlap when it comes to the protection of IT equipment.
Access
Observation
Devices
Devices in areas that the public has access to may be at a higher risk of accidental or deliberate physical damage resulting in an interruption of services. Because of this, if you have any sensitive or critical assets, these should be kept in secured locations.
Without sufficient perimeter security, unauthorized people may observe equipment with a telephoto lens. Ensuring systems, in particular workstation displays and keyboards, are not visible through windows, such as via the use of blinds, curtains, privacy films, or workstation positioning, will assist in reducing this security risk.
Radio Frequency (RF) devices, such as mobile devices, wireless keyboards and Bluetooth devices, as well as infrared (IR) devices, can pose a security risk to an organisation, especially when they are capable of recording or transmitting audio or data. If you're operating in a high security environment, the use of RF devices should be restricted.
When implementing physical security controls, what should you consider?
When implementing physical security controls, you should always consider the privacy, liability, and cyber security implications that the controls may have.
View Options Again
Cyber security implications.
Privacy implications.
All options are correct.
Liability implications.
Operationalizing Security
Policies and procedures are a must when it comes to operationalizing physical security. Who can access what, how they access it, what they can bring, what the operating hours are, etc. should be clearly documented for consistency and enforcement.
Is the following statement True or False:
Policies and procedures when it comes to physical security are non-essential.
It's highly recommended to ensure any physical security controls have accompanying policies and procedures. Without these, physical security controls have a tendency to relax over time and, in some cases, become completely inoperable.
View Options Again
True
False
Wrapping up
Physical security is crucial for securing people, assets, and facilities from unauthorized individuals, including burglars, vandals, and hackers.
Back
Next
Translation Correction
×
Select a translation to correct...
Begin the Guided Tour
[0, "Begin the Guided Tour", "Begin the Guided Tour"],
Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.
[1, "Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.", "Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action."],
Compose
[2, "Compose", "Compose"],
Folders
[3, "Folders", "Folders"],
Inbox
[4, "Inbox", "Inbox"],
Starred
[5, "Starred", "Starred"],
Draft
[6, "Draft", "Draft"],
Sent Mail
[7, "Sent Mail", "Sent Mail"],
Spam
[8, "Spam", "Spam"],
Trash
[9, "Trash", "Trash"],
[URGENT] Claim Your Work From Home Set-Up Payment
[10, "[URGENT] Claim Your Work From Home Set-Up Payment", "[URGENT] Claim Your Work From Home Set-Up Payment"],
Human Resources
[11, "Human Resources", "Human Resources"],
to
[12, "to", "to"],
Claim Your Work From Home Set-Up Payment
[13, "Claim Your Work From Home Set-Up Payment", "Claim Your Work From Home Set-Up Payment"],
Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of
[14, "Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of", "Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of"],
to ensure that you have a suitable home working set-up.
[15, "to ensure that you have a suitable home working set-up.", "to ensure that you have a suitable home working set-up."],
To receive the payment via payroll
[16, "To receive the payment via payroll", "To receive the payment via payroll"],
you will need to complete this
[17, "you will need to complete this", "you will need to complete this"],
acknowledgement form
[18, "acknowledgement form", "acknowledgement form"],
For more information on how to set up your home office space safely, please look at the
[19, "For more information on how to set up your home office space safely, please look at the", "For more information on how to set up your home office space safely, please look at the"],
Thank you
[20, "Thank you", "Thank you"],
The Human Resources Team
[21, "The Human Resources Team", "The Human Resources Team"],
This is an automatically generated email, please do not reply
[22, "This is an automatically generated email, please do not reply", "This is an automatically generated email, please do not reply"],
Is the following statement True or False
[23, "Is the following statement True or False", "Is the following statement True or False"],
View Options Again
[24, "View Options Again", "View Options Again"],
Email Subject: Urgent Action
[25, "Email Subject: Urgent Action", "Email Subject: Urgent Action"],
Phishing attacks are designed to put a
[26, "Phishing attacks are designed to put a", "Phishing attacks are designed to put a"],
time pressure on us to act fast
[27, "time pressure on us to act fast", "time pressure on us to act fast"],
This can cause us to skip much of the critical thinking we normally apply when browsing our emails
[28, "This can cause us to skip much of the critical thinking we normally apply when browsing our emails", "This can cause us to skip much of the critical thinking we normally apply when browsing our emails"],
Email Sender: Fradulent Address
[29, "Email Sender: Fradulent Address", "Email Sender: Fradulent Address"],
Email Sender: Fraudulent Address
[30, "Email Sender: Fraudulent Address", "Email Sender: Fraudulent Address"],
Attackers will often use
[31, "Attackers will often use", "Attackers will often use"],
obscure email addresses and use display names
[32, "obscure email addresses and use display names", "obscure email addresses and use display names"],
that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information
[33, "that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information", "that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information"],
Email Content: Engaging Topic
[34, "Email Content: Engaging Topic", "Email Content: Engaging Topic"],
Attackers often use a
[35, "Attackers often use a", "Attackers often use a"],
broad but important topic
[36, "broad but important topic", "broad but important topic"],
to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes.
[37, "to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes.", "to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes."],
Email Link: Phishing Website
[38, "Email Link: Phishing Website", "Email Link: Phishing Website"],
hovering over the link
[39, "hovering over the link", "hovering over the link"],
you'll see the true link location. Often this is enough to see the malicious intent.
[40, "you'll see the true link location. Often this is enough to see the malicious intent.", "you'll see the true link location. Often this is enough to see the malicious intent."],
Wrapping up
[41, "Wrapping up", "Wrapping up"],
If you
[42, "If you", "If you"],
spot anything suspicious
[43, "spot anything suspicious", "spot anything suspicious"],
with the email sender, subject, content, links or attachments
[44, "with the email sender, subject, content, links or attachments", "with the email sender, subject, content, links or attachments"],
Don't take the risk. Report the email to your IT or Security team for review.
[45, "Don't take the risk. Report the email to your IT or Security team for review.", "Don't take the risk. Report the email to your IT or Security team for review."],
Submit
[46, "Submit", "Submit"],
Next
[47, "Next", "Next"],
Back
[48, "Back", "Back"],
Malicious links will often appear with innocent looking text. By
[49, "Malicious links will often appear with innocent looking text. By", "Malicious links will often appear with innocent looking text. By"],
Correct!
[50, "Correct!", "Correct!"],
Incorrect
[51, "Incorrect", "Incorrect"],
True
[52, "True", "True"],
False
[53, "False", "False"],
Change language
[54, "Change language", "Change language"],
Current Language
[55, "Current Language", "Current Language"],
Use Browser Settings
[56, "Use Browser Settings", "Use Browser Settings"],
Select a language
[57, "Select a language", "Select a language"],
Change Language
[58, "Change Language", "Change Language"],
Please select a language
[59, "Please select a language", "Please select a language"],
Language
[60, "Language", "Language"],
Color Theme
[61, "Color Theme", "Color Theme"],
Color Theme And Background Selector
[62, "Color Theme And Background Selector", "Color Theme And Background Selector"],
Colorful Theme
[63, "Colorful Theme", "Colorful Theme"],
Select Theme
[64, "Select Theme", "Select Theme"],
Close
[65, "Close", "Close"],
Dark Theme
[66, "Dark Theme", "Dark Theme"],
Green Theme
[67, "Green Theme", "Green Theme"],
Purple Theme
[68, "Purple Theme", "Purple Theme"],
Light Theme
[69, "Light Theme", "Light Theme"],
Blue Theme
[70, "Blue Theme", "Blue Theme"],
Settings
[71, "Settings", "Settings"],
Theme Selected
[72, "Theme Selected", "Theme Selected"],
This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!
[73, "This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!", "This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!"],
Translation Correction
[74, "Translation Correction", "Translation Correction"],
Select a translation to correct...
[75, "Select a translation to correct...", "Select a translation to correct..."],
Original Text
[76, "Original Text", "Original Text"],
Correct Translation
[77, "Correct Translation", "Correct Translation"],
Translation to correct...
[78, "Translation to correct...", "Translation to correct..."],
Submissions are reviewed and applied within 48 hours.
[79, "Submissions are reviewed and applied within 48 hours.", "Submissions are reviewed and applied within 48 hours."],
Submit Correction
[80, "Submit Correction", "Submit Correction"],
Submission Successfully Sent
[81, "Submission Successfully Sent", "Submission Successfully Sent"],
Submission Error - Please Try Again
[82, "Submission Error - Please Try Again", "Submission Error - Please Try Again"],
Submission Sending...
[83, "Submission Sending...", "Submission Sending..."],
Mandatory Viewing
[84, "Mandatory Viewing", "Mandatory Viewing"],
Please watch the video from beginning to end before proceeding.
[85, "Please watch the video from beginning to end before proceeding.", "Please watch the video from beginning to end before proceeding."],
Ok
[86, "Ok", "Ok"],
Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.
[87, "Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.", "Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant."],
Physical-Security
[88, "Physical-Security", "Physical-Security"],
What is Physical Security?
[89, "What is Physical Security?", "What is Physical Security?"],
Physical security refers to the protection of people, assets, and facilities from physical threats such as burglars, vandals, and even hackers.
[90, "Physical security refers to the protection of people, assets, and facilities from physical threats such as burglars, vandals, and even hackers.", "Physical security refers to the protection of people, assets, and facilities from physical threats such as burglars, vandals, and even hackers."],
What is Physical Security?
[91, "What is Physical Security?", "What is Physical Security?"],
Physical security involves the use of encryption and firewalls to secure data.
[92, "Physical security involves the use of encryption and firewalls to secure data.", "Physical security involves the use of encryption and firewalls to secure data."],
Physical security is the protection of online accounts and passwords from being hacked.
[93, "Physical security is the protection of online accounts and passwords from being hacked.", "Physical security is the protection of online accounts and passwords from being hacked."],
Physical security is a device that is used to protect computers.
[94, "Physical security is a device that is used to protect computers.", "Physical security is a device that is used to protect computers."],
Physical security involves the protection of people, assets, and facilities from physical threats.
[95, "Physical security involves the protection of people, assets, and facilities from physical threats.", "Physical security involves the protection of people, assets, and facilities from physical threats."],
Physical security refers to the protection of people, assets, and facilities from physical threats such as burglars, vandals, and even hackers.
[96, "Physical security refers to the protection of people, assets, and facilities from physical threats such as burglars, vandals, and even hackers.", "Physical security refers to the protection of people, assets, and facilities from physical threats such as burglars, vandals, and even hackers."],
Protection Methods
[97, "Protection Methods", "Protection Methods"],
Ensuring you're safe from physical threats requires the implementation of a variety of different types of physical security controls. These may include:
[98, "Ensuring you're safe from physical threats requires the implementation of a variety of different types of physical security controls. These may include:", "Ensuring you're safe from physical threats requires the implementation of a variety of different types of physical security controls. These may include:"],
Perimeter security
[99, "Perimeter security", "Perimeter security"],
Including fencing around the perimeter of a facility or property to deter unauthorized access. Gates to control access to a facility or property. Finally, doors and a walled interior segment access between the interior and exterior of a building.
[100, "Including fencing around the perimeter of a facility or property to deter unauthorized access. Gates to control access to a facility or property. Finally, doors and a walled interior segment access between the interior and exterior of a building.", "Including fencing around the perimeter of a facility or property to deter unauthorized access. Gates to control access to a facility or property. Finally, doors and a walled interior segment access between the interior and exterior of a building."],
Access controls
[101, "Access controls", "Access controls"],
Including locks on doors and windows to prevent unauthorized access. Issuing keys to authorized individuals to allow them access to certain areas of a facility or property. Finally, security badges are issued to authorized individuals to allow them access to certain areas of a facility or property.
[102, "Including locks on doors and windows to prevent unauthorized access. Issuing keys to authorized individuals to allow them access to certain areas of a facility or property. Finally, security badges are issued to authorized individuals to allow them access to certain areas of a facility or property.", "Including locks on doors and windows to prevent unauthorized access. Issuing keys to authorized individuals to allow them access to certain areas of a facility or property. Finally, security badges are issued to authorized individuals to allow them access to certain areas of a facility or property."],
Surveillance
[103, "Surveillance", "Surveillance"],
Including closed-circuit television (CCTV) cameras to monitor and record activity within a facility or property. Finally, hiring security guards to patrol a facility or property and monitor activity.
[104, "Including closed-circuit television (CCTV) cameras to monitor and record activity within a facility or property. Finally, hiring security guards to patrol a facility or property and monitor activity.", "Including closed-circuit television (CCTV) cameras to monitor and record activity within a facility or property. Finally, hiring security guards to patrol a facility or property and monitor activity."],
Which of the following is NOT a physical security control?
[105, "Which of the following is NOT a physical security control?", "Which of the following is NOT a physical security control?"],
Perimiter security.
[106, "Perimiter security.", "Perimiter security."],
Access control.
[107, "Access control.", "Access control."],
Surveillance.
[108, "Surveillance.", "Surveillance."],
Network security.
[109, "Network security.", "Network security."],
Network security is in a different domain from physical security. Permiter security, access control, and surveillance are all examples of physical security controls.
[110, "Network security is in a different domain from physical security. Permiter security, access control, and surveillance are all examples of physical security controls.", "Network security is in a different domain from physical security. Permiter security, access control, and surveillance are all examples of physical security controls."],
Privacy Considerations
[111, "Privacy Considerations", "Privacy Considerations"],
In many countries, laws protect individuals' privacy and limit the collection and use of personal information. Regarding physical security, this often includes surveillance cameras and should be carefully considered.
[112, "In many countries, laws protect individuals' privacy and limit the collection and use of personal information. Regarding physical security, this often includes surveillance cameras and should be carefully considered.", "In many countries, laws protect individuals' privacy and limit the collection and use of personal information. Regarding physical security, this often includes surveillance cameras and should be carefully considered."],
Liability Considerations
[113, "Liability Considerations", "Liability Considerations"],
Organizations can be held liable for any injuries or damages that occur on their property, including those that result from security breaches or failures. To minimize the risk of liability, physical security is a must.
[114, "Organizations can be held liable for any injuries or damages that occur on their property, including those that result from security breaches or failures. To minimize the risk of liability, physical security is a must.", "Organizations can be held liable for any injuries or damages that occur on their property, including those that result from security breaches or failures. To minimize the risk of liability, physical security is a must."],
Cyber Security Considerations
[115, "Cyber Security Considerations", "Cyber Security Considerations"],
While cyber and physical security are two distinct security domains, they do overlap when it comes to the protection of IT equipment.
[116, "While cyber and physical security are two distinct security domains, they do overlap when it comes to the protection of IT equipment.", "While cyber and physical security are two distinct security domains, they do overlap when it comes to the protection of IT equipment."],
Access
[117, "Access", "Access"],
Devices in areas that the public has access to may be at a higher risk of accidental or deliberate physical damage resulting in an interruption of services. Because of this, if you have any sensitive or critical assets, these should be kept in secured locations.
[118, "Devices in areas that the public has access to may be at a higher risk of accidental or deliberate physical damage resulting in an interruption of services. Because of this, if you have any sensitive or critical assets, these should be kept in secured locations.", "Devices in areas that the public has access to may be at a higher risk of accidental or deliberate physical damage resulting in an interruption of services. Because of this, if you have any sensitive or critical assets, these should be kept in secured locations."],
Observation
[119, "Observation", "Observation"],
Without sufficient perimeter security, unauthorized people may observe equipment with a telephoto lens. Ensuring systems, in particular workstation displays and keyboards, are not visible through windows, such as via the use of blinds, curtains, privacy films, or workstation positioning, will assist in reducing this security risk.
[120, "Without sufficient perimeter security, unauthorized people may observe equipment with a telephoto lens. Ensuring systems, in particular workstation displays and keyboards, are not visible through windows, such as via the use of blinds, curtains, privacy films, or workstation positioning, will assist in reducing this security risk.", "Without sufficient perimeter security, unauthorized people may observe equipment with a telephoto lens. Ensuring systems, in particular workstation displays and keyboards, are not visible through windows, such as via the use of blinds, curtains, privacy films, or workstation positioning, will assist in reducing this security risk."],
Devices
[121, "Devices", "Devices"],
Radio Frequency (RF) devices, such as mobile devices, wireless keyboards and Bluetooth devices, as well as infrared (IR) devices, can pose a security risk to an organisation, especially when they are capable of recording or transmitting audio or data. If you're operating in a high security environment, the use of RF devices should be restricted.
[122, "Radio Frequency (RF) devices, such as mobile devices, wireless keyboards and Bluetooth devices, as well as infrared (IR) devices, can pose a security risk to an organisation, especially when they are capable of recording or transmitting audio or data. If you're operating in a high security environment, the use of RF devices should be restricted.", "Radio Frequency (RF) devices, such as mobile devices, wireless keyboards and Bluetooth devices, as well as infrared (IR) devices, can pose a security risk to an organisation, especially when they are capable of recording or transmitting audio or data. If you're operating in a high security environment, the use of RF devices should be restricted."],
When implementing physical security controls, what should you consider?
[123, "When implementing physical security controls, what should you consider?", "When implementing physical security controls, what should you consider?"],
Privacy implications.
[124, "Privacy implications.", "Privacy implications."],
Liability implications.
[125, "Liability implications.", "Liability implications."],
Cyber security implications.
[126, "Cyber security implications.", "Cyber security implications."],
All options are correct.
[127, "All options are correct.", "All options are correct."],
When implementing physical security controls, you should always consider the privacy, liability, and cyber security implications that the controls may have.
[128, "When implementing physical security controls, you should always consider the privacy, liability, and cyber security implications that the controls may have.", "When implementing physical security controls, you should always consider the privacy, liability, and cyber security implications that the controls may have."],
Operationalizing Security
[129, "Operationalizing Security", "Operationalizing Security"],
Policies and procedures are a must when it comes to operationalizing physical security. Who can access what, how they access it, what they can bring, what the operating hours are, etc. should be clearly documented for consistency and enforcement.
[130, "Policies and procedures are a must when it comes to operationalizing physical security. Who can access what, how they access it, what they can bring, what the operating hours are, etc. should be clearly documented for consistency and enforcement.", "Policies and procedures are a must when it comes to operationalizing physical security. Who can access what, how they access it, what they can bring, what the operating hours are, etc. should be clearly documented for consistency and enforcement."],
Policies and procedures when it comes to physical security are non-essential.
[131, "Policies and procedures when it comes to physical security are non-essential.", "Policies and procedures when it comes to physical security are non-essential."],
It's highly recommended to ensure any physical security controls have accompanying policies and procedures. Without these, physical security controls have a tendency to relax over time and, in some cases, become completely inoperable.
[132, "It's highly recommended to ensure any physical security controls have accompanying policies and procedures. Without these, physical security controls have a tendency to relax over time and, in some cases, become completely inoperable.", "It's highly recommended to ensure any physical security controls have accompanying policies and procedures. Without these, physical security controls have a tendency to relax over time and, in some cases, become completely inoperable."],
Wrapping up
[133, "Wrapping up", "Wrapping up"],
Physical security is crucial for securing people, assets, and facilities from unauthorized individuals, including burglars, vandals, and hackers.
[134, "Physical security is crucial for securing people, assets, and facilities from unauthorized individuals, including burglars, vandals, and hackers.", "Physical security is crucial for securing people, assets, and facilities from unauthorized individuals, including burglars, vandals, and hackers."],
[135, "", ""],
Original Text (English)
Correct Translation (English)
Submissions are reviewed and applied within 48 hours.
Color Theme And Background Selector
×
Colorful Theme
Select Theme
Blue Theme
Select Theme
Light Theme
Select Theme
Purple Theme
Select Theme
Green Theme
Select Theme
Dark Theme
Select Theme
Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.