This policy ensures employees do not enter sensitive areas alone for safety reasons.
What is the two-person rule?
This ancient city's massive walls and guard towers are among the earliest known physical security measures.
What is Babylon?
In early 20th-century London, this animal was used to detect dangerous gases in minees before electornic sensors existed.
What is a canary?
These areas, designed for visitors, have minimal security restrictions and are open to the public.
What are lobbies or reception areas?
This man boarded over 250 flights in the 1960s without a pilot's license by posing as a pilot.
Who is Frank Abagnale Jr.?
These devices automatically lock a door once it closes, preventing unauthorized entry.
What are automatic door locks (or self-locking mechanism)?
In 1950, this infamous heist saw thieves disguised as police steal $2.7 million in cash and securities.
What is the Great Brink's Robbery?
Some buildings use these spikes on rooftops to prevent parkour-based break-ins.
What are anti-climb spikes?
This type fo room is specifically shielded to prevent electronic eavesdropping or data leakage.
What is a SCIF (Sensitive Compartmented Information Facility)?
In 2003, a man impersonated this type of employee to steal sensitive information from a UK bank.
What is an IT technician?
This type of security system requires more than one form of authentication to grant access.
What is multi-factor authentication?
What is the Tower of London?
Physical security zones are often categorized using this three-letter acronym representing security levels.
What is ACL (Access Control List)?
These "actors" are hired to test a compnay's physical security by attempting to breach defenses.
What are red teamers?
Security personnel conduct these checks to ensure all issued badges are valid and accounted for.
What is an access credential audit?
In medieval castles, this narrow walkway along the top of walls was used by guards to patrol and defend.
What is a battlement or crenellation?
This type of lock uses a fingerprint or other biological trait instead of a key.
What is a biometric lock?
This infamous con artist used disguises and fake identifies to gain access to restricted areas.
Who is Victor Lustig?
This term describes restricting access strictly to areas necessary for job duties.
What is the principle of least privilege?
This U.S. president survived an assassination attempt thanks in part to a bulletproof vehicle introduced in the 1950s.
Who is Dwight D. Eisenhower?
This unusual security measure was employed in medieval times to discourage nighttime trespassing by animals and humans alike.
What are spiked belts or caltrops?
This security measure involves closely following an authorized person to enter restricted areas without proper credentials.
What is tailgating?
Type type of social engineering involves calling employees and pretending to be from tech support to extract credentials.
What is vishing or voice phishing?