Explanation may include physical vulnerabilities and predisposing conditions, such as
- tamper protection alerts
- lighting
- signs
- fencing/gates/cages (e.g., Faraday cage)
- security guards
- alarms
- safes
- secure cabinets/enclosures
- protected distribution/protected cabling
- airgaps
- mantraps
- locks
- biometrics
- barricades/bollards
- tokens/cards
- environmental controls
- heating, ventilation, and air conditioning (HVAC) systems
- hot and cold aisles
- fire suppression systems
- cable locks
- screen filters
- cameras
- motion detectors
- logs
- infrared detection equipment
- key management.
Process/Skill Questions:
- What logs can be evaluated for security issues?
- Where would one locate evidence of an access violation?
- Which security controls should be used to gain access to the environment?
- What is the purpose of a Faraday cage?
- What are the security implications of automated environmental controls?