Standard Security Practices
Security Through the Ages
Unusual Safety Facts
Inside the Facility
The Great Impostors
100

This policy ensures employees do not enter sensitive areas alone for safety reasons.

What is the two-person rule?

100

This ancient city's massive walls and guard towers are among the earliest known physical security measures.

What is Babylon?

100

In early 20th-century London, this animal was used to detect dangerous gases in minees before electornic sensors existed.

What is a canary?

100

These areas, designed for visitors, have minimal security restrictions and are open to the public.

What are lobbies or reception areas?

100

This man boarded over 250 flights in the 1960s without a pilot's license by posing as a pilot.

Who is Frank Abagnale Jr.?

200

These devices automatically lock a door once it closes, preventing unauthorized entry.

What are automatic door locks (or self-locking mechanism)?

200

In 1950, this infamous heist saw thieves disguised as police steal $2.7 million in cash and securities.

What is the Great Brink's Robbery?

200

Some buildings use these spikes on rooftops to prevent parkour-based break-ins.

What are anti-climb spikes?

200

This type fo room is specifically shielded to prevent electronic eavesdropping or data leakage.

What is a SCIF (Sensitive Compartmented Information Facility)?

200

In 2003, a man impersonated this type of employee to steal sensitive information from a UK bank.

What is an IT technician?

300

This type of security system requires more than one form of authentication to grant access.

What is multi-factor authentication?

300
Built in 1078, this fortress famously houses the British Crown Jewels.

What is the Tower of London?

300

Physical security zones are often categorized using this three-letter acronym representing security levels.

What is ACL (Access Control List)?

300

These "actors" are hired to test a compnay's physical security by attempting to breach defenses.

What are red teamers?

400

Security personnel conduct these checks to ensure all issued badges are valid and accounted for.

What is an access credential audit?

400

In medieval castles, this narrow walkway along the top of walls was used by guards to patrol and defend.

What is a battlement or crenellation?

400

This type of lock uses a fingerprint or other biological trait instead of a key.

What is a biometric lock?

400

This infamous con artist used disguises and fake identifies to gain access to restricted areas.

Who is Victor Lustig?

500

This term describes restricting access strictly to areas necessary for job duties.

What is the principle of least privilege?

500

This U.S. president survived an assassination attempt thanks in part to a bulletproof vehicle introduced in the 1950s.

Who is Dwight D. Eisenhower?

500

This unusual security measure was employed in medieval times to discourage nighttime trespassing by animals and humans alike.

What are spiked belts or caltrops?

500

This security measure involves closely following an authorized person to enter restricted areas without proper credentials.

What is tailgating?


500

Type type of social engineering involves calling employees and pretending to be from tech support to extract credentials.

What is vishing or voice phishing?

M
e
n
u