Chapter 7: Physical & Environmental Security

Slides:



Advertisements
Similar presentations
Chapter ADCS CS262/0898/V1 Chapter 1 An Introduction To Computer Security TOPICS Introduction Threats to Computer Systems –Threats, Vulnerabilities.
Advertisements

1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA.
0 - 0.
Addition Facts
GCSE ICT Networks & Security..
Tasks in Setting Up a Hard Disk
Computer Studies Today Chapter 18 1 »Two main types of secondary storage devices: –Magnetic storage devices –Optical storage devices.
Test on Input, Output, Processing, & Storage Devices
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Fundamentals of Information Systems Security.
Addition 1’s to 20.
Identification and Disposition of Official University Records University of Texas at Arlington Records Management.
Maintaining Security While Using Computers What all of Our Computer Users Need to Know.
Crime and Security in the Networked Economy Part 4.
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Security: Playing in Safe By: Matt Hill Identification and Access Identification and Access | When Disaster Strikes | Disaster Recovery Plan | Software.
IT Retreat 2009 IT Security Controls and Initiatives.
Security+ Guide to Network Security Fundamentals
Ensuring Continuing Operations and Disaster Recovery By: Alyssa Gatrell Mike Harker Amy Shumway.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Session 3 – Information Security Policies
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Program Objective Security Basics
Understanding Security Layers
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Overview Of Information Security Management By BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information.
Physical Security By: Christian Hudson. Overview Definition and importance Components Layers Physical Security Briefs Zones Implementation.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Guide to Linux Installation and Administration, 2e 1 Chapter 9 Preparing for Emergencies.
Operations Security Lisa M. True, CISSP January 12, 2004 Domain 7.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
© CCI Learning Solutions Inc. 1 Lesson 5: Basic Troubleshooting Techniques Computer performance Care of the computer Working with hardware Basic maintenance.
Information Systems Security Operational Control for Information Security.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Working with HIT Systems
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Viewing Information Systems Security. The basic objectives of Information Security are the same as the basic objectives of EDP auditing. They are: 1.To.
Chap1: Is there a Security Problem in Computing?.
Site Security Policy Case 01/19/ : Information Assurance Policy Douglas Hines, Jr.
Security fundamentals Topic 11 Maintaining operational security.
1 COMPUTER LAB REGULATION
CONTROLLING INFORMATION SYSTEMS
Physical security By Ola Abd el-latif Abbass Hassan.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Safe Lab Procedures and Tool Use
Physical Security Concerns for LAN Management By: Derek McQuillen.
Access Control Jeff Wicklund Computer Security Fall 2013.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: Safe Lab Procedures and Tool Use IT Essentials 5.0.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Chapter 14: System Administration Mark Milan. System Administration Acquiring new IS resources Maintaining existing IS resources Designing and implementing.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Module 5: Designing Physical Security for Network Resources
Risk management.
IC3 GS3 Standard COMPUTING FUNDAMENTALS Module
NETW4005 COMPUTER SECURITY A
Chapter 17 Risks, Security and Disaster Recovery
UNIT 19 Data Security 2.
Understanding Security Layers
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: Safe Lab Procedures and Tool Use IT Essentials 5.0.
Chapter 3: IRS and FTC Data Security Rules
Systems Design Chapter 6.
County HIPAA Review All Rights Reserved 2002.
IS4680 Security Auditing for Compliance
INFORMATION SYSTEMS SECURITY and CONTROL
Security of Data  
Presentation transcript:

Chapter 7: Physical & Environmental Security

Objectives Define the concept of physical security and how it relates to information security Evaluate the security requirements of facilities, offices and equipment Understand why it is critical to identify, authenticate and authorize access to secure areas Understand the environmental risks posed to physical structures, areas within those structures and equipment

Objectives Cont. Enumerate the vulnerabilities related to reusing and disposing of equipment Develop policies designed to ensure the physical security of information, information systems and information processing and storage facilities

Designing Secure Areas All implemented controls to physically protect information are dictated first by a thorough analysis of the company’s risks and vulnerabilities, along with the value of the information that requires protection From what are we protecting information assets? Theft Malicious destruction Accidental damage Damage that results from natural disasters

Designing Secure Areas Cont. The physical perimeter can be protected using: Man traps Manned reception desk Card-reading locks Heavy doors Solid, fire-resistant exterior walls Floor-to-ceiling barriers Reference Table 7.1 Physical Security Perimeter Policy

Designing Secure Areas Cont. Physical entry controls: Access control rules should be designed for: Employees 3rd-party contractors / partners / vendors Visitors Visitors should be required to wear identification that can be evaluated from a distance, such as a badge Identification should start as soon as a person attempts to gain entry Reference Table 7.2 Physical Entry Controls Policy

Designing Secure Areas Cont. Physical entry controls: Authorized users should be authorized prior to gaining access to protected area Visitors should be identified, labeled and authorized prior to gaining access to protected area An audit trail should be created

Securing Offices, Rooms and Facilities The outer physical perimeter is not the only focus of the physical security policy Some internal rooms & offices must be protected differently Parts of individual rooms may also require different levels of protection, such as cabinets and closets Reference Table 7.3 Working in Secure Areas Policy

Working in Secure Areas Goal: define behavioral & physical controls for the most sensitive workspaces within information processing facilities Policy controls are in addition to – and not in place of – existing physical controls, unless they supersede them Policy should include devices not allowed on premises, such as cameras, PDAs, MP3 players

Securing Equipment Company-owned hardware assets must be protected from: Theft Power spikes Power loss Hardware assets include: Servers Network devices (routers, switches) Cabling Reference Table 7.5 Equipment Siting and Protection Policy

Securing Equipment Cont. This policy also includes maintenance of hardware assets Properly maintained hardware helps protect data & information system availability

Securing Equipment Cont. Potential power problems include: Brownout: period of low voltage Power surge: increase in voltage Blackout: interruption or loss of power Reference Table 7.6 Power Supply Policy

Securing Equipment Cont. Power equipment is used to: Condition power feeds for consistency Allow graceful shutdown of servers & network devices Provide power to critical devices during blackouts

Securing Equipment Cont. Power equipment that can be used: Uninterruptible Power Supply Generator Line conditioner Surge suppressor

Secure Disposal and Reuse of Equipment Formatting a hard drive does not mean that the data located on that drive cannot be retrieved All computers to be discarded must be sanitized prior to getting rid of them Policy should be crafted to disallow access to information through improper disposal or re-use of equipment Reference Table 7.7 Secure Disposal and Reuse of Equipment Policy

General Controls Objective: to prevent theft of information Clear desk and clear screen policy All information must be secured at the end of the work day, regardless of the medium the data is located on: Printed paper CD Rom Floppy disks Thumbdrive Reference Table 7.8 Clear Desk and Clean Screen Policy

General Controls Cont. Clear desk & screen policy (cont.) Shoulder surfing is a hacking activity which consists of looking over a computer user’s shoulder to gain access to information A successful policy will reinforce behavioral traits that help secure information, such as: Securing sensitive information in lockable cabinets The use of automatic, password-protect screen savers Copy and Fax machines should be locked Printed material should be picked up as soon as it is printed

Removing Company Property Keeping track of the physical location of all hardware assets is a daunting task A policy should be crafted that requires signature for all company-owned equipment to be removed from the company’s premises Logs should be maintained and reviewed on a regular basis Reference Table 7.9 Removal of Property Policy

Summary The physical perimeter of the company must be secured. Some internal rooms and offices must be identified as needing more security controls than others. These controls must be deployed. Environment threats such as power loss must be taken into account and the proper hardware must be deployed. A clean screen and desk policy is important to protect the confidentiality of company-owned data.