Physical Security Brought to you By Brandon R. Crane.

Slides:



Advertisements
Similar presentations
PowerPoint ® Presentation Chapter 14 Homeland Security Homeland Security Building Layout Specific CBR Attack Prevention Recommendations Securing Outdoor-
Advertisements

Computer Security Computer Security is defined as:
Facilitating a Dialog between the NSDI and Utility Companies J. Peter Gomez Manager, Information Requirements, Xcel Energy.
PHYSICAL SECURITY (NSTISSI 4011)
UNIT PHYSICAL SECURITY PLAN
SAND No C Sandia is a multi-program laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of.
“Why do we need Security”  Each business has unique security and safety needs, e.g. Inventory Shrinkage and Theft Personal Safety Break Ins Moving Your.
Fiber-Optic Perimeter Intrusion Detection System.
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
Physical Security John Schwertfeger Security Manager Duane Arnold Energy Center.
Chapter 33 Foundation Systems.
Physical and Environmental Security Chapter 5 Part 1 Pages 427 to 456.
1 Introduction to Security Chapter 6 Enhancing Security through Physical Controls.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Physical (Environmental) Security.

Chapter 18 Lesson Goal After completing this lesson, the student shall be able to identify indicators of an incendiary fire and protect and preserve evidence.
Information Security Principles and Practices
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 16: Physical and Infrastructure Security.
Microsoft Technology Associate
Information Systems Security Physical Security Domain #4.
1 SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of.
1 INTRUSION ALARM TECHNOLOGY DETECTION DEVICES. 2 INTRUSION ALARM TECHNOLOGY Detection devices can be either passive or active. Passive devices typically.
SECURITY VULNERABILITY ASSESSMENT (SVA). Intellectual Property of Win Noor FAQ  What is Security Vulnerability Assessment (SVA)?  A process of identifying,
Chapter 3.  Security Framework  Operational Security Lifecycle  Security Perimeter  Access Control  Social Engineering  Environmental Issues.
Security Devices A modern security system, with its array of electronic components, is designed to sense, decide, and act. The security system senses events.
Chapter 8: Disaster Management
Chapter 27 Insulating Structures. Objectives After reading the chapter and reviewing the materials presented the students will be able to: List the ways.
 Helps to prevent the transfer of heat either into or out of a building  Winter – keep heat in  Summer – keep heat out  Heat is transferred through.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Physical Security.
1 12. Physical Security ISA 562 Internet Security Theory & Practice.
Technology and Hotel Security Hotel Mgmt. Hospitality Services R. McCann.
Physical Security SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States.
1 Virtual Police Security System & Management Control May 2003.
Application Opportunity for Internet 0 in Risk Management Barry Wessler October 1, 2004.
Module 02: 1 Introduction to Computer Security and Information Assurance Objectives Recognize that physical security and cyber security are related Recognize.
Understanding Security Layers
Chapter 6.  Natural environmental threats  Supply system threats  Manmade threats  Politically motivated threats.
Physical Security By: Christian Hudson. Overview Definition and importance Components Layers Physical Security Briefs Zones Implementation.
SMUCSE 8394 BTS – Devices II Sensors Detection, Surveillance, Protection.
Frames and Walls Lateral Stability
Lesson Goal After completing this lesson, the student shall be able to identify indicators of an incendiary fire and protect and preserve evidence after.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 16 “Physical and Infrastructure.
ALARM MONITORING SERVICE
Lesson 4 Physical Security - Motion Sensor - Passive Ultrasonic Sensor - Photoelectric System - Ultrasonic - Ultrasonic Motion Sensor - Vibration Sensor.
Physical (Environmental) Security
Wal-Mart Superstore in San Angelo Texas. Wal-Mart Threat Assessment Vandelism Theft of merchandise Theft of store supplies Illegal entry into facility.
Limmer et al., Emergency Care Update, 10th Edition © 2007 by Pearson Education, Inc. Upper Saddle River, NJ CHAPTER 34 Gaining Access and Rescue Operations.
Viewing Information Systems Security. The basic objectives of Information Security are the same as the basic objectives of EDP auditing. They are: 1.To.
Personnel & Equipment Implement Measures To Reduce Your Unit’s Vulnerabilities to Terrorist Acts/Attacks Figure 1.
Limmer et al., Emergency Care, 11th Edition © 2009 by Pearson Education, Inc., Upper Saddle River, NJ DOT Directory Chapter 35 Gaining Access and Rescue.
The Need for Access Control & Perimeter Protection
Physical security By Ola Abd el-latif Abbass Hassan.
Types of Buildings for Explosives Storage MA02 Slide 1.
The Safety of Exhibits. The Safety of Objects The Safety of People.
10. Security and Physical Protection Basic Concepts
INMM Nuclear Security and Physical Protection Technical Division.
Physical Security Ch9 Part I Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
Presented BY BEISecurity. Fiber-Optic Perimeter Intrusion Detection System.
Introduction and Benefits of Using Fencing Wires Fencing is used to enclose a space or area, which for specific reasons are off limit to the general public,
Criminal Justice Intro to Security, Instructor Name Date, Semester Chapter 4: PHYSICAL SECURITY: STRUCTURAL, ELECTRONIC, AND HUMAN PROTECTION SYSTEMS.
Unit 1: Protecting the Facility (Virtual Machines)
Physical and Technological Security
Objective 6.02 part 2: Recognize components of construction
The University of Adelaide, School of Computer Science
Athletic Training Facilities
Understanding Security Layers
Objectives Telecommunications and Network Physical and Personnel
A SEMINAR REPORT ON BIOMETRICS
Physical Security.
Security.
Presentation transcript:

Physical Security Brought to you By Brandon R. Crane

Overview Discuss  What is Physical Protection ?  What are its functions ?  What is used in Physical Protection ? Briefly describe how physical protection is being integrated into the cyber world. Answer any questions.

What is Physical Security ? Physical Security is a system that integrates people, procedures and equipment for the protection of assets and facilities from theft, sabotage and any other malicious activities. Physical Security is a system that integrates people, procedures and equipment for the protection of assets and facilities from theft, sabotage and any other malicious activities. People consisting of any type of security force. People consisting of any type of security force. Procedures can consist of how to secure your assets and how to react to a threat. Procedures can consist of how to secure your assets and how to react to a threat. Equipment are means to which we can detect, delay and respond to a threat. Equipment are means to which we can detect, delay and respond to a threat.

What are its functions ? 1. Detection 2. Delay 3. Response

Detection Detection is the discovery of an Detection is the discovery of anadversary. Detection can be accomplished by: Detection can be accomplished by: The security force. The security force. The security sensors. (Mostly by sensors ) The security sensors. (Mostly by sensors ) Two TypesTwo Types External External Internal Internal

Security Sensors External Detection Sensors External Detection Sensors Buried Line Sensors Buried Line Sensors Pressure/Seismic Sensors Pressure/Seismic Sensors Fiber Optic Cables Fiber Optic Cables Fence Associated Sensors Fence Associated Sensors Disturbance MotionDisturbance Motion Sensor FencesSensor Fences Electric FencesElectric Fences Infrared Infrared Bistatic Microwave Bistatic Microwave

Security Sensors (cont’d) Internal Detection Sensors Internal Detection Sensors Boundary-Penetration Sensors Boundary-Penetration Sensors ElectromechanicalElectromechanical VibrationVibration Proximity SensorsProximity Sensors CapacitanceCapacitance Interior Motion Sensors Interior Motion Sensors Ultrasonic Ultrasonic Pressure Pressure

Delay The process of slowing down of adversary progress. The process of slowing down of adversary progress. This helps the system to respond to detected adversaries. This helps the system to respond to detected adversaries. This also aids in the process of detecting adversaries. This also aids in the process of detecting adversaries. But how do we delay adversaries? But how do we delay adversaries?

Delay Barriers Types of Barriers: Types of Barriers: Perimeter Perimeter FencesFences Chain link fences toped with razor wire. Chain link fences toped with razor wire. Roll Mound Barbed Tape Concertina Roll Mound Barbed Tape Concertina GatesGates Vehicle Vehicle Vehicle Arrestors->piles of sandVehicle Arrestors->piles of sand Crash Cushions->containers filled with waterCrash Cushions->containers filled with water Inertia Devices->small concrete shapes Inertia Devices->small concrete shapes Rigid Devices->reinforced concreteRigid Devices->reinforced concrete

Delay Barriers (cont’d) Structural Barriers Structural Barriers Walls Walls Reinforced concreteReinforced concrete Expandable concrete and metalExpandable concrete and metal WoodWood MetalMetal ClayClay Concrete BlockConcrete Block Doors Doors Standard Metal and PersonnelStandard Metal and Personnel Bullet and Blast resistantBullet and Blast resistant Windows Windows StandardStandard Bullet ProofBullet Proof

Delay Barriers (cont’d) Roofs and Floors Roofs and Floors ConcreteConcrete MetalMetal ReinforcedReinforced Dispensable Barriers Dispensable Barriers Rigid polyurethane foamRigid polyurethane foam Stabilized Aqueous FoamStabilized Aqueous Foam Fog or SmokeFog or Smoke Sticky Thermoplastic FoamSticky Thermoplastic Foam Entanglement DevicesEntanglement Devices

Biometrics Biometrics are devices that verify or recognize authorized personnel by unique physical characteristics. Biometrics are devices that verify or recognize authorized personnel by unique physical characteristics. Biometrics can be considered for all functions Biometrics can be considered for all functions Examples of Biometric Technology: Examples of Biometric Technology: Hand/Finger Geometry Hand/Finger Geometry Handwriting Handwriting Eye Pattern Eye Pattern RetinaRetina IrisIris Voice Voice Face Face

Biometric Devices

Response Actions taken by the response force to prevent adversary success. Actions taken by the response force to prevent adversary success. Types Types Security Personnel Security Personnel Local Police Force Local Police Force Federal Agencies Federal Agencies Militant forces Militant forces

Are There Any Questions ?

Thank You