The Physical Security in UTM NAWAF OMAR MAN151050 Prof Hafiza Abas.

Slides:



Advertisements
Similar presentations
Life Safety Networks A Parallel Network Approach Matthew K. Arthur, CISSP Director – Enterprise Networks Washington University in St. Louis ACUHO-I, 30.
Advertisements

1 Introducing the Specifications of the Metro Ethernet Forum.
Chapter 7: Physical & Environmental Security
How Electronic Security Solutions can Help the Government in Securing its Assets and Reduce Energy expenditure Presented By- Nimish Vishnoi Manager-Product.
Information Security Policy
FACILITY SAFETY: Creating a Safe and Secure Environment in the Community Health Center Presented by Steve Wilder, BA, CHSP, STS Sorensen, Wilder & Associates.
1 Introduction to Security Chapter 15 Institutional Security.
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
Chapter 5 Enhancing Security Through Physical Controls
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Physical and Environmental Security Chapter 5 Part 1 Pages 427 to 456.
The Islamic University of Gaza
1 Telstra in Confidence Managing Security for our Mobile Technology.
Information Security Policies and Standards
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Lecture 11 Reliability and Security in IT infrastructure.
Chapter 3.  Security Framework  Operational Security Lifecycle  Security Perimeter  Access Control  Social Engineering  Environmental Issues.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Module 02: 1 Introduction to Computer Security and Information Assurance Objectives Recognize that physical security and cyber security are related Recognize.
Computer Crime and Information Technology Security
The Computer for the 21 st Century Mark Weiser – XEROX PARC Presented By: Mihail Ionescu.
Physical Security By: Christian Hudson. Overview Definition and importance Components Layers Physical Security Briefs Zones Implementation.
IAEA International Atomic Energy Agency IAEA Nuclear Security Programme Enhancing cybersecurity in nuclear infrastructure TWG-NPPIC – IAEA May 09 – A.
1 Security Integration and Esgraf sales presentation 01/2015.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
System Analysis of Virtual Team Collaboration Management System based on Cloud Technology Panita Wannapiroon, Ph.D. Assistant Professor Division of Information.
Chapter 18 Institutional Security. Special Security Institutions  Hospitals and other health care facilities.  Educational institutions.  Libraries.
Information Systems Security Operations Security Domain #9.
National Commission for Academic Accreditation & Assessment Developmental Reviews at King Saud University and King Faisal University.
Physical Site Security.  Personnel  Hardware  Programs  Networks  Data  Protection from:  Fire  Natural disasters  Burglary / Theft  Vandalism.
Lesson 4 Physical Security - Motion Sensor - Passive Ultrasonic Sensor - Photoelectric System - Ultrasonic - Ultrasonic Motion Sensor - Vibration Sensor.
Physical (Environmental) Security
Viewing Information Systems Security. The basic objectives of Information Security are the same as the basic objectives of EDP auditing. They are: 1.To.
Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1.
NDSU Personal Safety and Security Assist. Project Introduction Leverages: –People and Partnerships –Philosophies –Centralized and Integrated Systems.
Chap 8: Administering Security.  Security is a combination Technical – covered in chap 1 Administrative Physical controls SE571 Security in Computing.
The Need for Access Control & Perimeter Protection
Computer Security Mike Asoodeh & Ray Dejean Office of Technology Southeastern Louisiana University.
SEC 410 Entire Course (UOP) SEC 410 Week 1 DQ 1 (UOP)  SEC 410 Week 1 Individual Physical Security Paper   SEC 410 Week 1 DQ 1   SEC 410 Week 1 DQ.
Bharat Book Bureau Your One Stop Shop For Business Information Market Research Report The report on Global Video Surveillance and VSaaS Market.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
Vehicle Management System Adopted successfully with I.D., wireless Vehicle Management Systems (VMS) for Parking, Residential Societies.
SEC 410 cart Expect Success/sec410cartdotcom FOR MORE CLASSES VISIT
MANA1543: ACCESS CONTROL AND PERIMETER PROTECTION RESEARCH PROPOSAL : PHYSICAL SECURITY PLAN PHYSICAL SECURITY ENHANCEMENT IN UTM KL SITI RINIY FARIZA.
March 23, 2015 Missouri Public Service Commission | Jefferson City, MO.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
Protecting Houses of Worship Security Plan Development Considerations Glenn Moore Protective Security Advisor – Oklahoma District National Protection and.
RESEARCH PROPOSAL A MULTI-AGENT SENSOR BASED MODEL TO IMPROVE PHYSICAL PERIMETER PROTECTION FOR UTM MENARA RAZAK BUILDING Maryam Var Naseri (MAN151001)
Criminal Justice Intro to Security, Instructor Name Date, Semester Chapter 4: PHYSICAL SECURITY: STRUCTURAL, ELECTRONIC, AND HUMAN PROTECTION SYSTEMS.
Unit 1: Protecting the Facility (Virtual Machines)
Module 5: Designing Physical Security for Network Resources
Commercial CCTV Systems – Recording your Business.
Information Systems Security
Physical Security Governance Model
CompTIA Security+ Study Guide (SY0-401)
Risk management.
Intelligent Video Surveillance – The End of CCTV
NETW4005 COMPUTER SECURITY A
A Holistic Approach to School Security
Business Safety Options to be had for Business Owners.
Security Solutions to Home, Schools and Business.
Chapter 7: RISK ASSESSMENT, SECURITY SURVEYS, AND PLANNING
Objectives Telecommunications and Network Physical and Personnel
Physical Security.
Managing the IT Function
Cyber Security in a Risk Management Framework
IoT in Healthcare: Life or Death
Presentation transcript:

The Physical Security in UTM NAWAF OMAR MAN Prof Hafiza Abas

The Introduction As the physical security is considered as the first layer of defense at any education organizations for protecting of personnel, hardware, programs, networks, and data from physical circumstances and events that could cause serious losses or damage to Universities, schools and education institution. The physical security will involve any protection from fire, natural disasters, burglary, theft, vandalism, and terrorism that would happen to any education organizations.

Research Background The research will be about UTM University (Universiti Teknologi Malaysia) which is located in Kuala Lampur in Selangor state. will endeavor to ensure, as far as is reasonably practical, the personal safety and security of all students, staff, employees, visitors of UTM university and contributors to university campuses.

Research Problems As the physical security to UTM university is important, there is more technical and dramatic issues in the university system that may happen to the UTM university such as hacking, viruses, trojans, spyware, crimes,intruders and so on.

Research Scope The scope of the research will be on two parts of UTM university which is the first part is the main entrance of Menara Razaq tower and the second part is about the level five of Menara Razaq tower which is the faculty of AIS in UTM university. As the research is responsible for physical security and personal safety which will include all people who study, work or reside in, or who visit UTM University for such a purpose

Research Objectives To provide a brief overview of the physical security issues that related to the main entrance of UTM and level five of UTM Razaq tower with reviewing some of the critical issues to find out proper solution such as : To Identify physical security monitoring components (intrusion alarm system) To recognize the essential elements of physical access control within the scope of facilities To describe the components of fire detection and response (Fire alarm ) To Understand the technical details of uninterruptible power supplies and how they are used to increase availability of information assets To find the countermeasures that used against the physical theft of computing devices of UTM which include (CCTV, lighting and access control)

Research Questions What are the elements of physical security that would effect the people such as employees or staff and students in the UTM university? What is the best plan of physical security that would support UTM university to be safe and secured?

Conclusion In the first part of the research proposal we discussed about the physical security in deep with its components such as access control and perimeter protection. In addition. we discussed about the people who will be involved in this study such as employees and students of UTM university and the area that the study will be focused on with reviewing some objectives and questions of this study.

Literature Review This chapter covers some related studies and topics to support the evaluation of the proposed project in order to enhance the physical security in the UTM university. The related studies will be on: Information Security Control Board Video Fire Detection Intelligent Video Systems Building Automation System For Access Control And Perimeter Protection Multispectral System For Perimeter Protection

Information Security Control Board the board of information security control which contain all the foundation of the security of any IT infrastructure of any organization such as education organization. The IT infrastructure provides all of the internal corporate support as well as ensures IT solutions for the for all organization such as education organizations which are properly configured and implemented properly.

Video Fire Detection (Video Fire Detection) might help to reduce the detection time compared to the currently available sensors in both indoors and out- doors because cameras can monitor “volumes” and do not have transport delay that the traditional sensors suffer from of it.

Intelligent Video Systems The Intelligent video systems (IVS) have been recently substantially growing from practical needs in the whole world.in addition, the Intelligent video systems (IVS) have been driven by a wide range of applications in transportation, governments organizations, education institutes and healthcare as well. There is a study saying that in the last years, the video analytics market has been growth about 60% annual.

Building Automation System For Access Control And Perimeter Protection

We can summarize the building automation system of the monitoring of the security systems from the buildings which will allow the initiation of some response and human intervention actions based on the information provided by the: fire detection and alarm systems intrusion alarm systems access control systems video surveillance systems

Multispectral system for perimeter protection

Multispectral System For Perimeter Protection The hypotheses of the traditional system of protection consists of an active line of sensors, which detect and alarm the fact of crossing by the intruder its self. However, by analyzing this case the intruder after crossing the line of sensors would be vanished from the field of the view of cameras sensors and unfortunately is invisible for the system which it can not be detected. However, by using the new system possesses which is multispectral system the ability of detection of the intruder will be very high and assumed distances (radar) with the intruder identification by cameras

Methodology This study focuses on the security control in the University Technology Malaysia (UTM) and the awareness of the staff and students about the physical security systems in the main entrance and level five which is the faculty of AIS in UTM university. The purpose of this study is to assist the physical security of the UTM university in Menara Razaq tower to study the physical security problems and find the proper solutions with some recommendations. The findings of this study can also help to gather enough information when they want to improve their security system in UTM university.

Operational framework We will support the operational framework in this proposed project in order to organize each step of our project path. Usually when we identify the operational framework that would give us a clear idea about the project path by creating some phases which would connect between all the project framework ideas.

Operational framework

The targeted population of UTM are hundreds employees and students where the targeted sample would be between 10 to 20 employees and students’ respondents. The qestionaires were 33 for emplyees and 16 for students

Finding and Results Section A: the result of UTM staff and employees Section B: the result of UTM students

Finding and Results How important of the fence to UTM How is window and door secured in offices How about fire extinguisher and is it eveywhere How good the surveillance in UTM

How important of the fence to UTM

How is window and door secured in offices

How about fire extinguisher and is it eveywhere

How good the surveillance in UTM

Suggestion and Recommendation Some recommendation for level five of UTM university: Apply The new Evolution-12 Camera Suite for UTM classes and offices Apply Wireless Alarm Triggers Uniform Sounding for UTM classes and offices Apply Video management system

Suggestion and Recommendation Some recommendation for the main entrance of UTM university: Apply Smart barrier for students and employees Apply Wireless solar-powered surveillance system of the main entrance Apply Video management system Train the security guards and staff on the foundation of CISSP

Conclusion The security measures taken to protect physical security were effective and operating as intended. The physical security entails a wide array of controls and deals with various types of threats and the vulnerabilities such as natural disasters, intruders, crimes, and human errors as well.by applying some recommendations that we mentionded, we will increase the the level of security of UTM university.