Stephen S. Yau CSE 465 & CSE591, Fall 2006 1 Physical Security for Information Systems.

Slides:



Advertisements
Similar presentations
1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA.
Advertisements

Chapter 7: Physical & Environmental Security
HIPAA Security Standards Emmanuelle Mirsakov USC School of Pharmacy.
Computer Security Computer Security is defined as:
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
Chapter 5 Enhancing Security Through Physical Controls
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Physical and Environmental Security Chapter 5 Part 1 Pages 427 to 456.
Security: Playing in Safe By: Matt Hill Identification and Access Identification and Access | When Disaster Strikes | Disaster Recovery Plan | Software.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Physical (Environmental) Security.
Information Security Principles and Practices
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 16: Physical and Infrastructure Security.
Microsoft Technology Associate
Information Systems Security Physical Security Domain #4.
Chapter 7: Assuring Safety and Security in Healthcare Institutions
Physical Security Chapter 9.
Chapter 3.  Security Framework  Operational Security Lifecycle  Security Perimeter  Access Control  Social Engineering  Environmental Issues.
Chapter 8: Disaster Management
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Physical and Environmental Security CISSP Guide to Security Essentials Chapter 8.
Physical Security SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
每时每刻 可信安全 1 What category of water sprinkler system is currently the most recommended water system for a computer room? A Dry Pipe sprinkler system B Wet.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Module 02: 1 Introduction to Computer Security and Information Assurance Objectives Recognize that physical security and cyber security are related Recognize.
Understanding Security Layers
HIPAA PRIVACY AND SECURITY AWARENESS.
Physical Security By: Christian Hudson. Overview Definition and importance Components Layers Physical Security Briefs Zones Implementation.
Physical Security “Least sexy of the 10 domains but the best firewall in the world will not stand up to a well placed brick.”
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
BUSINESS B1 Information Security.
Wastewater Infrastructure Security Workshop April 15, 2002 Denver, Colorado.
INITIAL OSHA & DOT TRAINING MODULE 10 Security. INITIAL OSHA & DOT TRAINING Module 10 – Security Introduction The Transportation Security Administration.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Preparing for Disasters General Liability. Introduction  The one coverage that provides you and your business the most protection is General Liability.
Information Systems Security Operational Control for Information Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 16 “Physical and Infrastructure.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Physical (Environmental) Security
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Viewing Information Systems Security. The basic objectives of Information Security are the same as the basic objectives of EDP auditing. They are: 1.To.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Site Security Policy Case 01/19/ : Information Assurance Policy Douglas Hines, Jr.
The Importance of Proper Controls. 5 Network Controls Developing a secure network means developing mechanisms that reduce or eliminate the threats.
Physical security By Ola Abd el-latif Abbass Hassan.
Department of Computer Science Chapter 4 Physical and Environment Security Semester 1.
Unit 32 – Networked Systems Security
Physical Security Concerns for LAN Management By: Derek McQuillen.
10. Security and Physical Protection Basic Concepts
Physical Security Ch9 Part I Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 13 – Physical and.
The Physical Security in UTM NAWAF OMAR MAN Prof Hafiza Abas.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
Criminal Justice Intro to Security, Instructor Name Date, Semester Chapter 4: PHYSICAL SECURITY: STRUCTURAL, ELECTRONIC, AND HUMAN PROTECTION SYSTEMS.
Onsite CRM Security
Risk management.
Services Delivery in Emergencies
NETW4005 COMPUTER SECURITY A
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Understanding Security Layers
Safety and Security of Radiation Sources
CompTIA Security+ Study Guide (SY0-401)
Chapter 10 Physical Security
Objectives Telecommunications and Network Physical and Personnel
Security of Data  
Physical Security.
Presentation transcript:

Stephen S. Yau CSE 465 & CSE591, Fall Physical Security for Information Systems

Stephen S. Yau CSE 465 & CSE591, Fall Importance of Physical Security Most people focus on protecting logical systems (software that is running) If you cannot protect the physical systems (computer hardware), you cannot protect the program and data running on the hardware –Physical security deals with who has access to buildings, computer rooms, and the devices within them –Protect sites from natural and man-made physical threats

Stephen S. Yau CSE 465 & CSE591, Fall Physical Security Threats Weather –Tornadoes, hurricanes, floods, fire, snow, ice, heat, cold, humidity, etc. Fire/chemical –Explosions, toxic waste/gases, smoke, fire Earth movement –Earthquakes, mudslides Structural failure –Building collapse because of snow/ice or moving objects (cars, trucks, airplanes, etc.)

Stephen S. Yau CSE 465 & CSE591, Fall Physical Security Threats (cont.) Energy –Loss of power, radiation, magnetic wave interference, etc. Biological –Virus, bacteria, etc. Human –Strikes, theft, sabotage, terrorism and war

Stephen S. Yau CSE 465 & CSE591, Fall Physical Security Areas Educating personnel –An educated staff is best weapon a company can have against illegitimate and accidental acts by others Administrative controls –Address procedural and codified applications of physical controls Physical security controls –Enforce proper controls for physical contact of system facilities

Stephen S. Yau CSE 465 & CSE591, Fall Physical Security Areas (cont.) Technical controls –Use of computer hardware and software to protect facilities as opposed to some of traditional “pure physical” techniques Environmental/life-safety controls –Ensure infrastructure to maintain proper operating environment for both human and machine

Stephen S. Yau CSE 465 & CSE591, Fall Educating Personnel Security staff should be prepared for potential of unforeseen acts Other employees should be reminded periodically of importance of helping their surroundings secure –Being mindful of physical and environmental considerations required to protect information systems –Adhering to emergency and disaster plans –Monitoring unauthorized use of equipment and services, and reporting those activities to security personnel –Recognizing security objectives of organization –Accepting individual responsibilities associated with their jobs and that of their coworkers

Stephen S. Yau CSE 465 & CSE591, Fall Administrative Controls Restricting Work Areas –First identify access rights to the site in general –Then decide various access rights required by each location (rooms, elevators, buildings) within the site Escort Requirements and Visitor Control –In many government facilities or facilities with strong government ties, foreign nationals are not allowed unescorted access to any site within the facility. Escorted access requires background clearance and onsite identity check –For less secure sites, visitor must have a clear purpose for visit and a confirmed contact within the site. A temporary badge will be given after the visitor sign-in at the security desk

Stephen S. Yau9 Administrative Controls (cont.) Site Selection –Visibility Most data centers are not descriptive. They do not want to advertise what they are and attract undue attention –Locale considerations Neighborhood, local ordinances and variances, crime rate, hazardous sites nearby, such as landfills, waste dumps, or nuclear reactors, etc. –Natural disasters –Transportation Airport, highways, railroads, etc.

Stephen S. Yau CSE 465 & CSE591, Fall Physical Security Controls Perimeter Security Controls –Gates, fences, turnstiles, mantraps Badging –Photo identification that not only authenticates an individual, but also continues to identify the individual while inside the facility

Stephen S. Yau CSE 465 & CSE591, Fall Physical Security Controls (cont.) Keys and Combination Locks –Mechanical locks, password locks, electronic locks, etc. Security Dogs –Well-trained dogs are good at detecting intruders or sniffing out explosives Lighting –Proper lighting could serve as a deterrent

Stephen S. Yau CSE 465 & CSE591, Fall Technical Controls Smart card –It carries a semiconductor chip with logic and nonvolatile memory –It can store software that detects unauthorized tampering and intrusions to the chip itself and if detected, can lock or destroy the contents of the chip to prevent disclosure or unauthorized uses –Three major types: contact, contact-less and combinations of the two.

Stephen S. Yau CSE 465 & CSE591, Fall Technical Controls (cont.) Audit Trails/Access Logs Physical Intrusion Detection –Metallic foil tape, infrared light beams, motion sensors Alarm Systems –Systems like ADT that monitors and responds to intrusion alert from a central location

Stephen S. Yau14 Technical Controls (cont.) Biometrics –Use characteristics of a human, such as face, eyes (iris), voice, fingerprints, DNA, hands, signature, and even body temperature. –Using biometrics in conjunction with standard forms of authentication ( such as password, smart card, etc.), security can further be enhanced –Need to balance convenience with security [t1-ch11.4, t2-ch12.4]

Stephen S. Yau CSE 465 & CSE591, Fall Environmental/Life-safety Controls Power –When there is a power-outage, emergency lights and continuing functioning of those electronic gates are needed –Computers will not function without power –Uninterrupted: Uninterrupted Power Service (UPS) and emergency power-off switch –Constant voltage and current: regulator

Stephen S. Yau CSE 465 & CSE591, Fall Environmental/Life-safety Controls (cont.) Fire\Chemical Detection and Suppression –Targets: Explosions, toxic waste/gases, smoke, fire –Detectors: heat sensor, flame detector, smoke detector –Extinguish systems: water-sprinkler or gas-discharge system Heating, Ventilation and Air Conditioning –Computers require temperature and humidity control to function correctly –Human that operates systems need a reasonable working environment