Physical and Environmental Security CISSP Guide to Security Essentials Chapter 8.

Slides:



Advertisements
Similar presentations
Emergency Preparedness and Response
Advertisements

Physical and Environmental Security
Chapter 7: Physical & Environmental Security
Computer Security Computer Security is defined as:
Crime and Security in the Networked Economy Part 4.
“Why do we need Security”  Each business has unique security and safety needs, e.g. Inventory Shrinkage and Theft Personal Safety Break Ins Moving Your.
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
Chapter 5 Enhancing Security Through Physical Controls
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Physical and Environmental Security Chapter 5 Part 1 Pages 427 to 456.
Maintaining and Troubleshooting Computer Systems Computer Technology.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Physical (Environmental) Security.
Copyright © Center for Systems Security and Information Assurance Lesson Seven Physical Security.
Security Controls – What Works
Stephen S. Yau CSE 465 & CSE591, Fall Physical Security for Information Systems.
Information Security Principles and Practices
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 16: Physical and Infrastructure Security.
Information Systems Security Physical Security Domain #4.
DUE Security and Fire Alarm Systems LEARNING OUTCOME 7B Describe design overview and location considerations.
Physical Security Chapter 9.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Chapter 3.  Security Framework  Operational Security Lifecycle  Security Perimeter  Access Control  Social Engineering  Environmental Issues.
Chapter 8: Disaster Management
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Physical Security.
Security Equipment Equipment for preventing unauthorised access to data & information.
Physical Security SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
每时每刻 可信安全 1 What category of water sprinkler system is currently the most recommended water system for a computer room? A Dry Pipe sprinkler system B Wet.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Neuromuscular Engineering 11 Neuromuscular Engineering & Technology BioMetrics SECURE AREA VETTING AND ACCESS CONTROL.
REMOTE SITE MANAGEMENT SOLUTION. AGENDA 2  About KoçSistem  Current Situation in Base Stations  Remote Site Management System: Sitelink  Sitelink.
Module 02: 1 Introduction to Computer Security and Information Assurance Objectives Recognize that physical security and cyber security are related Recognize.
Understanding Security Layers
Chapter 6.  Natural environmental threats  Supply system threats  Manmade threats  Politically motivated threats.
Physical Security By: Christian Hudson. Overview Definition and importance Components Layers Physical Security Briefs Zones Implementation.
Physical Security “Least sexy of the 10 domains but the best firewall in the world will not stand up to a well placed brick.”
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Information Systems Security Operations Security Domain #9.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 16 “Physical and Infrastructure.
Physical Security and Contingency Planning CS432 - Security in Computing Copyright © 2008 by Scott Orr and the Trustees of Indiana University.
Physical (Environmental) Security
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Site Security Policy Case 01/19/ : Information Assurance Policy Douglas Hines, Jr.
Security fundamentals Topic 11 Maintaining operational security.
Physical and Environmental Security Chapter 5 Part 2 Pages 457 to 499.
Physical security By Ola Abd el-latif Abbass Hassan.
Department of Computer Science Chapter 4 Physical and Environment Security Semester 1.
Physical Security Concerns for LAN Management By: Derek McQuillen.
Access Control Jeff Wicklund Computer Security Fall 2013.
10. Security and Physical Protection Basic Concepts
Physical Security Ch9 Part I Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 13 – Physical and.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
Criminal Justice Intro to Security, Instructor Name Date, Semester Chapter 4: PHYSICAL SECURITY: STRUCTURAL, ELECTRONIC, AND HUMAN PROTECTION SYSTEMS.
Onsite CRM Security
CompTIA Security+ Study Guide (SY0-401)
NETW4005 COMPUTER SECURITY A
CompTIA Security+ Study Guide (SY0-401)
Physical and Environmental Security
CompTIA Security+ Study Guide (SY0-501)
Level 2 Diploma Unit 11 IT Security
Chapter 10 Physical Security
Objectives Telecommunications and Network Physical and Personnel
Security of Data  
Physical Security.
Managing the IT Function
Presentation transcript:

Physical and Environmental Security CISSP Guide to Security Essentials Chapter 8

CISSP Guide to Security Essentials2 Objectives Site access controls including key card access systems, biometrics, video surveillance, fences and walls, notices, and exterior lighting Secure siting: identifying and avoiding threats and risks associated with a building site

CISSP Guide to Security Essentials3 Objectives (cont.) Equipment protection from theft and damage Environmental controls including HVAC and backup power

CISSP Guide to Security Essentials4 Site Access Controls Key cards –Centralized access control consists of card readers, central computer, and electronic door latches Photo by IEI Inc.

CISSP Guide to Security Essentials5 Site Access Controls (cont.) Key cards (cont.) –Pros: easy to use, provides an audit record, easy to change access permissions –Cons: can be used by others if lost Photo by IEI Inc.

CISSP Guide to Security Essentials6 Biometric Access Controls Based upon a specific biometric measurement Greater confidence of claimed identity –Fingerprint, iris scan, retina scan, hand scan, voice, facial recognition, others Photo by Ingersoll-Rand Corporation

CISSP Guide to Security Essentials7 Biometric Access Controls (cont.) More costly than key card alone Photo by Ingersoll-Rand Corporation

CISSP Guide to Security Essentials8 Metal Keys Pros: suitable backup when a key card system fails Uses in limited areas such as cabinets –Best to use within keycard access areas

CISSP Guide to Security Essentials9 Metal Keys (cont.) Cons –Easily copied, cannot tell who used a key to enter

CISSP Guide to Security Essentials10 Man Trap Double doors, where only one can be opened at a time Used to control personnel access Manually operated or automatic Only room for one person

CISSP Guide to Security Essentials11 Guards Trained personnel with a variety of duties: –Checking employee identification, handling visitors, checking parcels and incoming/outgoing equipment, manage deliveries, apprehend suspicious persons, call additional security personnel or law enforcement, assist persons as needed –Advantages: flexible, employ judgment, mobile

CISSP Guide to Security Essentials12 Guard Dogs Serve as detective, preventive, and deterrent controls Apprehend suspects Detect substances

CISSP Guide to Security Essentials13 Access Logs Record of events –Personnel entrance and exit –Visitors –Vehicles –Packages –Equipment

CISSP Guide to Security Essentials14 Fences and Walls Effective preventive and deterrent control Keep unwanted persons from accessing specific areas HeightEffectiveness 3-4 ftDeters casual trespassers 6-7 ftToo difficult to climb easily 8 ft plus 3 strands of barbed or razor wire Deters determined trespassers

CISSP Guide to Security Essentials15 Video Surveillance Supplements security guards Provide points of view not easily achieved with guards

CISSP Guide to Security Essentials16 Video Surveillance (cont.) Locations –Entrances –Exits –Loading bays –Stairwells –Refuse collection areas

CISSP Guide to Security Essentials17 Video Surveillance (cont.) Camera types –CCTV, IP wired, IP wireless –Night vision –Fixed, Pan / tilt / zoom –Hidden / disguised

CISSP Guide to Security Essentials18 Video Surveillance (cont.) Recording capabilities –None; motion-activated; periodic still images; continuous

CISSP Guide to Security Essentials19 Intrusion, Motion, and Alarm Systems Automatic detection of intruders Central controller and remote sensors –Door and window sensors –Motion sensors –Glass break sensors

CISSP Guide to Security Essentials20 Intrusion, Motion, and Alarm Systems (cont.) Alarming and alerting –Audible alarms –Alert to central monitoring center or law enforcement

CISSP Guide to Security Essentials21 Visible Notices No Trespassing signs Surveillance notices –Sometimes required by law Surveillance monitors

CISSP Guide to Security Essentials22 Exterior Lighting Discourage intruders during nighttime hours, by lighting intruders’ actions so that others will call authorities NIST standards require 2 foot-candles of power to a height of 8 ft

CISSP Guide to Security Essentials23 Other Physical Controls Bollards Crash gates –Prevent vehicle entry –Retractable

CISSP Guide to Security Essentials24 Secure Siting Locating a business at a site that is reasonably free from hazards that could threaten ongoing operations

CISSP Guide to Security Essentials25 Secure Siting (cont.) Identify threats –Natural: flooding, landslides, earthquakes, volcanoes, waves, high tides, severe weather –Man-made: chemical spills, transportation accidents, utilities, military base, social unrest

CISSP Guide to Security Essentials26 Secure Siting (cont.) Other siting factors –Building construction techniques and materials –Building marking –Loading and unloading areas –Shared-tenant facilities –Nearby neighbors

CISSP Guide to Security Essentials27 Asset Protection Laptop computers –Anti-theft cables –Defensive software (firewalls, anti-virus, location tracking, destruct-if-stolen) –Strong authentication such as fingerprint –Full encryption –Training

CISSP Guide to Security Essentials28 Asset Protection (cont.) Servers and backup media –Keep behind locked doors –Locking cabinets –Video surveillance –Off-site storage for backup media Secure transportation Secure storage

CISSP Guide to Security Essentials29 Asset Protection (cont.) Protection of sensitive documents –Locked rooms –Locking, fire-resistant cabinets

CISSP Guide to Security Essentials30 Asset Protection (cont.) Protection (cont.) –“Clean desk” policy Reduced chance that a passer-by will see and remove a document containing sensitive information –Secure destruction of unneeded documents

CISSP Guide to Security Essentials31 Asset Protection (cont.) Equipment check-in / check-out –Keep records of company owned equipment that leaves business premises –Improves accountability –Recovery of assets upon termination of employment

CISSP Guide to Security Essentials32 Asset Protection (cont.) Damage protection –Earthquake bracing Required in some locales Equipment racks, storage racks, cabinets –Water detection and drainage Alarms

CISSP Guide to Security Essentials33 Asset Protection (cont.) Fire protection –Fire detection: smoke alarms, pull stations –Fire extinguishment Fire sprinklers Inert gas systems Fire extinguishers

CISSP Guide to Security Essentials34 Asset Protection (cont.) Cabling security – on-premises –Place cabling in conduits or away from exposed areas

CISSP Guide to Security Essentials35 Asset Protection (cont.) Cabling security – off-premises (e.g. telco) –Select a different carrier –Utilize diverse / redundant network routing –Utilize encryption

CISSP Guide to Security Essentials36 Environmental Controls Heating, ventilation, and air conditioning (HVAC) –Vital, yet relatively fragile –Backup units (“N+1”) recommended –Ratings BTU/hr Tonns

CISSP Guide to Security Essentials37 Environmental Controls (cont.) Heating, ventilation, and air conditioning (HVAC) (cont.) –Also regulates humidity Should be 30% - 50%

CISSP Guide to Security Essentials38 Environmental Controls (cont.) Electric power Anomalies –Blackout. A total loss of power. –Brownout. A prolonged reduction in voltage below the normal minimum specification.

CISSP Guide to Security Essentials39 Environmental Controls (cont.) Anomalies (cont.) –Dropout. A total loss of power for a very short period of time (milliseconds to a few seconds). –Inrush. The instantaneous draw of current by a device when it is first switched on.

CISSP Guide to Security Essentials40 Environmental Controls (cont.) Anomalies (cont.) –Noise. Random bursts of small changes in voltage. –Sag. A short drop in voltage. –Surge. A prolonged increase in voltage. –Transient. A brief oscillation in voltage.

CISSP Guide to Security Essentials41 Environmental Controls (cont.) Electric power protection –Line conditioner – filters incoming power to make it cleaner and free of most anomalies –Uninterruptible Power Supply (UPS) – temporary supply of electric power via battery storage

CISSP Guide to Security Essentials42 Environmental Controls (cont.) Electric power protection (cont.) –Electric generator – long term supply of electric power via diesel (or other source) powered generator

CISSP Guide to Security Essentials43 Redundant Controls Assured availability of critical environmental controls –Dual electric power feeds –Redundant generators –Redundant UPS –Redundant HVAC –Redundant data communications feeds

CISSP Guide to Security Essentials44 Summary Site access control for personnel is usually achieved with key cards, PIN pads, biometrics, and metal keys A mantrap is an access control that consists of a set of two doors, one after the other, where only one door can be open at a time

CISSP Guide to Security Essentials45 Summary (cont.) Site security is also achieved with guards, guard dogs, access logs, fences and walls, video surveillance, alarm systems, visual notices, exterior lighting, bollards, and crash gates

CISSP Guide to Security Essentials46 Summary (cont.) A business should be located in an area that is reasonably free of hazards and threats Natural threats include floods, landslides, avalanches, earthquakes, volcanoes, tsunamis, and severe weather

CISSP Guide to Security Essentials47 Summary (cont.) Man-made threats include chemical spills, transportation corridors, utilities, social unrest, and nearby military bases Other siting issues include building construction techniques and materials, building marking, loading and unloading areas, and shared-tenancy

CISSP Guide to Security Essentials48 Summary (cont.) Business equipment should be physically secured to prevent theft, tampering, sabotage, and water damage Cabling should be protected from unauthorized access

CISSP Guide to Security Essentials49 Summary (cont.) Heating, Ventilation, and Air Conditioning (HVAC) systems control the temperature and humidity of air in buildings Electric power is protected with line conditioners, Uninterruptible Power Supplies (UPSs), and electric generators

CISSP Guide to Security Essentials50 Summary (cont.) Facilities that cannot tolerate downtime due to the failure of HVAC, UPS, or generators should consider redundant, or “N+1”, environmental controls