Security Measures to Prevent Physical Breaches in Highly Secure Locations | CISSP-ISSAP Exam

Effective Prevention Methods for Physical Breaches in Highly Secure Locations

Question

You are the Security Consultant advising a company on security methods.

This is a highly secure location that deals with sensitive national defense related data.

They are very concerned about physical security as they had a breach last month.

In that breach an individual had simply grabbed a laptop and ran out of the building.

Which one of the following would have been most effective in preventing this?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

C.

Out of the given options, the most effective method for preventing the laptop theft would be to use a man-trap (Option C).

A man-trap is a security mechanism that consists of two interlocking doors, which control the entry or exit of a secure area. In this mechanism, the first door will open only when the second door is closed, and vice versa. This ensures that only one person can enter or exit at a time, and they can be identified and authenticated before being allowed to proceed. It also helps prevent unauthorized access and tailgating (when someone follows another person into a secure area without proper authorization).

Using a man-trap would prevent unauthorized access to the sensitive data by ensuring that anyone entering or exiting the building is properly identified and authenticated. This would prevent someone from simply grabbing a laptop and running out of the building unnoticed. The man-trap could also be monitored by security personnel or surveillance cameras, which would further enhance security and help identify any suspicious activity.

Option A, "not using laptops," is not a feasible solution as laptops are necessary for the company's operations. Option B, "keeping all doors locked with a guard," may be effective in preventing unauthorized access, but it would not prevent a determined thief from forcibly entering the building. Option D, "a sign-in log," may provide a record of who enters and exits the building, but it would not prevent someone from stealing a laptop and running out of the building unnoticed.