COMP4690, HKBU1 Chapter 6 Physical Security. COMP4690, HKBU2 Introduction The goal of physical security is to provide a safe environment for all assets.

Slides:



Advertisements
Similar presentations
Physical Security.
Advertisements

Safety in Hospitals A Computer – Based Learning Program for Students.
CLOSED CIRCUIT TELEVISION (CCTV) SURVEILLANCE SYSTEMS
Jump to first page Business Continuity Planning The evolution of Disaster Recovery Planning.
Physical and Environmental Security
Chapter 7: Physical & Environmental Security
Computer Security Computer Security is defined as:
“Why do we need Security”  Each business has unique security and safety needs, e.g. Inventory Shrinkage and Theft Personal Safety Break Ins Moving Your.
EMI Systems Limited specializes in CCTV surveillance systems that ranges from stand-alone cameras to fully integrated security control centers and to the.
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
Emergency Preparedness Planning Kentucky Education and Workforce Development Cabinet.
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Physical and Environmental Security Chapter 5 Part 1 Pages 427 to 456.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Physical (Environmental) Security.
Copyright © Center for Systems Security and Information Assurance Lesson Seven Physical Security.
Stephen S. Yau CSE 465 & CSE591, Fall Physical Security for Information Systems.
Information Security Principles and Practices
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 16: Physical and Infrastructure Security.
Information Systems Security Physical Security Domain #4.
DUE Security and Fire Alarm Systems LEARNING OUTCOME 7B Describe design overview and location considerations.
Physical Security Chapter 9.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Chapter 3.  Security Framework  Operational Security Lifecycle  Security Perimeter  Access Control  Social Engineering  Environmental Issues.
Security Devices A modern security system, with its array of electronic components, is designed to sense, decide, and act. The security system senses events.
Chapter 8: Disaster Management
Physical and Environmental Security CISSP Guide to Security Essentials Chapter 8.
Physical Security.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Physical Security.
1 12. Physical Security ISA 562 Internet Security Theory & Practice.
Technology in Architecture Lecture 12 Electrical Equipment Electrical Power Management Fire Protection Systems Lecture 12 Electrical Equipment Electrical.
每时每刻 可信安全 1 What category of water sprinkler system is currently the most recommended water system for a computer room? A Dry Pipe sprinkler system B Wet.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Module 02: 1 Introduction to Computer Security and Information Assurance Objectives Recognize that physical security and cyber security are related Recognize.
Overview Of Information Security Management By BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information.
Chapter 6.  Natural environmental threats  Supply system threats  Manmade threats  Politically motivated threats.
Physical Security By: Christian Hudson. Overview Definition and importance Components Layers Physical Security Briefs Zones Implementation.
Physical Security “Least sexy of the 10 domains but the best firewall in the world will not stand up to a well placed brick.”
© 2008 Delmar, Cengage Learning Property Security, Emergency Response, and Fire Protection Systems Chapter 13.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 16 “Physical and Infrastructure.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Physical Security and Contingency Planning CS432 - Security in Computing Copyright © 2008 by Scott Orr and the Trustees of Indiana University.
Lesson 4 Physical Security - Motion Sensor - Passive Ultrasonic Sensor - Photoelectric System - Ultrasonic - Ultrasonic Motion Sensor - Vibration Sensor.
Physical (Environmental) Security
Fire No institution is immune from fire. Flood damage can be dried out and restored, stolen property has a chance of being recovered; damage from fire.
INF 392G - Management of Preservation Programs Fall 2006 Class 9  Disaster Planning and Preparedness.
Physical and Environmental Security Chapter 5 Part 2 Pages 457 to 499.
Introduction  Utilities transmit electricity over power lines into home as an alternating current (AC) wave.  This is how power travels through wiring.
POWER FLUCTUATIONS Computer Systems. Power Fluctuations Voltage is the force that moves electrons through a circuit Unsteady voltages are called power.
Safe Lab Procedures and Tool Use
Department of Computer Science Chapter 4 Physical and Environment Security Semester 1.
Physical Security Concerns for LAN Management By: Derek McQuillen.
Access Control Jeff Wicklund Computer Security Fall 2013.
10. Security and Physical Protection Basic Concepts
Physical Security Ch9 Part I Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
Physical Security Ch9 Part II Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 13 – Physical and.
Presented BY BEISecurity. Fiber-Optic Perimeter Intrusion Detection System.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
Criminal Justice Intro to Security, Instructor Name Date, Semester Chapter 4: PHYSICAL SECURITY: STRUCTURAL, ELECTRONIC, AND HUMAN PROTECTION SYSTEMS.
Chapter 2: Introduction to Lab Procedures and Tool Use
CompTIA Security+ Study Guide (SY0-401)
NETW4005 COMPUTER SECURITY A
CompTIA Security+ Study Guide (SY0-501)
GES SYSTEM THE IMPORTANCE OF GES SYSTEM IN BUILDING
INFORMATION SYSTEMS SECURITY and CONTROL
Objectives Telecommunications and Network Physical and Personnel
RAKSHAK SECURITY Physical Security Presented by, Ranjit Patil Director.
Physical Security.
Presentation transcript:

COMP4690, HKBU1 Chapter 6 Physical Security

COMP4690, HKBU2 Introduction The goal of physical security is to provide a safe environment for all assets and interests of the organization. Physical security provides protection for the building, other building structures, or a vehicle housing the system, and/or other network components. Static systems: installed in structures at fixed location Mobile systems: installed in vehicles or vessels Portable systems: can be operated in buildings, vehicles, or in the open A very basic component of an organization’s total security plan.

COMP4690, HKBU3 Threats to Physical Environment Natural/environmental Earthquakes, floods, storms, tornadoes, hurricanes, volcanic eruptions, natural fires, extreme temperatures, high humidity, building collapse Supply systems Communication outage, power distribution, burst pipes Man-made Explosions, disgruntled employees, unauthorized access, employee errors, sabotage, hazardous spills, chemical contamination, malicious code, vandalism and theft, intruders, unintentional acts Political events Bombings, terrorist attacks, espionage, civil disturbances, strikes

COMP4690, HKBU4 Information Protection Environment A layered defense model Perimeter Building Grounds Building Entrance Building Floors/Office Suites Offices/Data Centers Equipment/Supplies, Media

COMP4690, HKBU5 Crime Prevention through Environmental Design (CPTED) CPTED as a concept began during the 1960s. It states that the physical environment of a building can be changed or managed to produce behavioral effects that will reduce the incidence and fear of crime. It contains elements that make legitimate users of a space feel safe and make illegal users feel unsafe in pursuing undesirable behavior. It is a psychological and sociological method of looking at security.

COMP4690, HKBU6 CPTED strategies Territoriality People protect territory that they feel is their own and people have a certain respect for the territory of others. CPTED encourages the use of physical attributes that express ownership, such as fences, pavement treatments, art, signs, good maintenance, and landscaping. Surveillance Surveillance is a principal tool in the protection of a space. Landscaping and lighting can be planned to promote natural surveillance from inside and from the outside. Closed-circuit television (CCTV) is often used as an additional deterrent. Access control Properly located entrances, exits, fencing, and landscaping can control the flow or limit access to both foot and automobile traffic in ways that discourage crime.

COMP4690, HKBU7 Site Location Physical security should begin with a detailed site selection process. Where and how a building should be built? Does our business have specific physical security concerns regarding the facility location? Is it vulnerable to crime, riots, or terrorism attacks? Is it vulnerable to natural disasters? Where is it located in relationship to adjacent buildings and/or other businesses? How far away is it to other types of threats? What are neighborhood crime rates and types? What type of emergency support response is provided to the area?

COMP4690, HKBU8 Construction Impacts Construction controls involve designing walls, windows, doors, and infrastructure support elements, such as water or gas lines, in a secure fashion. Constructing walls that are fire-rated Penetration resistant Windowless or have non-opening windows Questions to consider Could the structure withstand relevant natural threats? Is it earthquake resistant? Does the business require specific building enhancements?

COMP4690, HKBU9 Facility Impacts Entry points Infrastructure support systems Electrical power Heating, ventilation, air conditioning (and refrigeration) Internal sensitive or compartmentalized areas Portable computing

COMP4690, HKBU10 Entry points External entry points Doors, windows, roof access, service or delivery doors, fire-escape entries, other secondary entrances Internal entry points Elevators, stairs, door to internal offices

COMP4690, HKBU11 Infrastructure support systems Include power, water/plumbing, heating, ventilation, and air conditioning The failure or substandard performance of the support systems may interrupt operation of the system and may cause physical damage to system hardware or stored data. Physical security for the infrastructure support systems involves not only the area, but also locations of wiring used to connect elements of the system, such as cabling, plugs, sockets, loose wires, exposed cabling.

COMP4690, HKBU12 Electrical power A disruption in the electrical power supply can have a serious business impact. Complete power loss Blackout: complete loss of commercial power Fault: momentary power outage Power degradation Brownout: an intentional reduction of voltage by a utility company Sag/dip: a short period of low voltage Surge: a sudden rise in voltage in the power supply Transient: line noise or disturbance is superimposed on the supply circuit and can cause fluctuations in electrical power In-rush current: the initial surge of current required by a load before it reaches normal operation Electrostatic discharge: another type of electrical surge can occur when two non-conducting materials rub together, causing electrons to transfer from one material to another

COMP4690, HKBU13 Interference Interference is a random disturbance interfering with device operation. Electromagnetic interference (EMI) The interference in a circuit. Common-mode noise occurs between hot and ground wires; traverse-mode noise occurs between hot and neutral wires. Radio frequency interference (RFI) The reception of radio signals. Small electrical discharges generate RFI, and can be generated by components of electrical systems, transmitting devices, or lightning. Other sources of interference: radio stations, cellular phones, fluorescent lights, defective power plugs

COMP4690, HKBU14 Water/Plumbing Common sources of water problems Broken pipes, fire-suppression systems, improper installation of air conditioners, evaporative coolers Water damage can lead to problems with mold and mildew that may affect the proper functioning of the computer resources

COMP4690, HKBU15 HVAC Heating, ventilation, and air conditioning A system that provides the processes of comfort heating, ventilation, and/or air conditioning within a space HVAC&R: include refrigeration Questions: Where and how the system is installed? Whether the location of these areas could allow for unauthorized access or some type of sabotage? How to remote control, monitor and maintain the system? Risk of chemical and biological agents entering a building through the system

COMP4690, HKBU16 Internal sensitive or compartmentalized area Several areas need additional physical protection Data center Server room Communication center Switching center End-user areas where highly sensitive information is processed and stored

COMP4690, HKBU17 Portable computing Because the organization’s data is being accessed and processed outside the normal physical protections of the office, the risk of loss, theft, data exposure, and data destruction can be significantly greater.

COMP4690, HKBU18 Security technology and Tools Layered defense A fence protects the perimeter The building entry points are protected with a card access control system Inside the building, a card access control system protects the elevators and door locks secure the stairwells. The office doors are also secured with locks. Inside the office, the employee has locked all sensitive information in an office safe. Using multiple types of security controls within each of the layers.

COMP4690, HKBU19 Perimeter and building grounds boundary protection Protective barriers: Landscaping: can be designed to provide a measure of security, e.g., shrubs or trees Fences: to designate a property boundary Gates: portion of a wall or fence system that controls entrance and/or egress Bollards: vehicle barriers Lighting: an essential element in an integrated physical security system, be used with other controls

COMP4690, HKBU20 Perimeter Intrusion Detection Systems Closed-Circuit television (CCTV) A television transmission system that uses video cameras to transmit pictures by a transmission medium (wired or wireless) to connected monitors. CCTV levels Detection: the ability to detect the presence of an object Recognition: the ability to determine the type of object Identification: the ability to determine object details Three main components: Camera, transmission media, and monitor

COMP4690, HKBU21 CCTV Camera and lens To capture an optical image and convert the image into a video signal that is then transmitted to a remote monitor display Tube cameras: use a cathode ray tube (CRT) CCD cameras: use charge-coupled discharge (CCD) Infrared cameras: provide night-vision capability Fixed lens vs. zoom lens Depth-of-field: the area between the nearest and farthest points that appear to be in focus Field-of-view: the entire area that can be captured by the lens

COMP4690, HKBU22 CCTV (Cont.) Transmission media Coaxial cable Fiber-optic cables Wireless transmission Display monitors NTSC, PAL HDTV Other equipments Pan and tilt units: designed for remote control positioning of cameras in both the horizontal (pan) and vertical (tilt) planes. Multiplexers or switches: combine several cameras onto a single line or allow selected viewing of multiple cameras Videotape recorders Digital recorders

COMP4690, HKBU23 Building Entry Points Doors Hollow-core versus solid-core Windows Shatter-resistant, installed in fixed frames, can be locked from the inside Locks Key locks, combination locks, smart locks Guard Stations To monitor the security of the facility through TV monitors, alarm systems, intercoms, etc Card Access Control or Biometric Systems card & card reader

COMP4690, HKBU24 Inside the Buildings Supply system controls Electric power controls Surge suppressors Controlling interference Uninterruptible power supply (UPS) HVAC controls Water controls Gas lines

COMP4690, HKBU25 Fire Protection Fire prevention Materials used in construction should be as fireproof as possible Backup tapes and software should be stored in fireproof containers (they will produce poisonous gases when they burn) File-prevention training, includes fire drills Fire detection Smoke detectors Photoelectric detectors Heat detectors Fire suppression Fire-extinguishing systems For computer equipment, type ABC extinguishers are appropriate Automatic sprinkler systems: unpure water may compound the problem instead of help! If possible, equipment should be shut off before discharging the sprinkler system. Once a computer is wet, it should not be turned on until it is thoroughly dry.

COMP4690, HKBU26 Fire Classes ClassTypeSuppression ACommon combustibles (i.e., wood products) Water, soda acid BLiquid (i.e., petroleum products, coolants) Gas, CO 2, soda acid CElectrical (i.e., electrical equipment, wires) Gas, CO 2 DCombustible metalsDry powder

COMP4690, HKBU27 Penetration Detection Systems Basic types of physical intrusion detection systems include: Breaking or making an electrical circuit Interrupting a light beam Detecting sound or changes in sound levels Detecting vibration Detecting changes in heat level through passive infrared detectors Detecting a disturbance in an electrostatic, microwave, ultrasonic, or other type field

COMP4690, HKBU28 Good Security Practices for Data Center Security Access control Electronic access control: badge/smart cards/biometric devices Post an access control list on the outside of the door, indicating who is allowed unescorted access Have access control policies for daytime use, after-hour use, or during an emergency CCTV to view visitors Site location Location within the building should not be easily accessible to visitors or to the general public Away from external windows or walls Away from water pipes or other support system facilities

COMP4690, HKBU29 Good Security Practices for Data Center Security Walls Construct the room as a single unit Walls should not form part of an external wall of the building If using glass as an external wall barrier, use shatter- resistant glass to limit damage from breakage Doors Should be solid core Should not open out Door frame should be permanently fixed to the adjoining wall studs Door hinges should be fixed to the frames with a minimum of three hinges per door

COMP4690, HKBU30 Good Security Practices for Data Center Security HVAC Should be on a separate system from the rest of the building The size of the ducts and vents should ensure that they cannot be breached by an intruder Positive pressures should be maintained Power supply A backup power supply (UPS or generator) should exist for a minimum amount of time as required by the organization’s needs Backup power supply needs to be tested on a regular basis Electrical facilities that support the data center should be separate from the main building Electrical closets, cables, and wiring should be properly secured Fire Deploy portable extinguishers at exits and near equipments Install fire sensors/detection equipment Have documented and tested emergency plans Install water sensors under the raised floor