1 12. Physical Security ISA 562 Internet Security Theory & Practice.

Slides:



Advertisements
Similar presentations
Physical Security.
Advertisements

Facilities Management and Design Chapter 4 Safety and Security systems.
INTRUSION ALARM TECHNOLOGY
“Why do we need Security”  Each business has unique security and safety needs, e.g. Inventory Shrinkage and Theft Personal Safety Break Ins Moving Your.
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
SECURITY HARDWARE & TECHNOLOGY CCPOA REGION 3 TRAINING CLASS MAY 11, 2011.
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Physical and Environmental Security Chapter 5 Part 1 Pages 427 to 456.
Means of Egress and Fire Protection. 2 Objectives Understand Alarms and Warning Devices Know the location of Exits and Exit Routes Understand the RACE.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Physical (Environmental) Security.
Copyright © Center for Systems Security and Information Assurance Lesson Seven Physical Security.
Principles of Information Security, 3rd Edition 2 Introduction  Physical security addresses the design, implementation, and maintenance of countermeasures.
Stephen S. Yau CSE 465 & CSE591, Fall Physical Security for Information Systems.
Information Security Principles and Practices
COMP4690, HKBU1 Chapter 6 Physical Security. COMP4690, HKBU2 Introduction The goal of physical security is to provide a safe environment for all assets.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 16: Physical and Infrastructure Security.
Microsoft Technology Associate
Information Systems Security Physical Security Domain #4.
DUE Security and Fire Alarm Systems LEARNING OUTCOME 7B Describe design overview and location considerations.
Physical Security Chapter 9.
What you will learn in this session 1.The characteristics of fire, smoke and toxic fumes 2.Fire hazards involved in the working environment 3.Significant.
Chapter 3.  Security Framework  Operational Security Lifecycle  Security Perimeter  Access Control  Social Engineering  Environmental Issues.
Security Devices A modern security system, with its array of electronic components, is designed to sense, decide, and act. The security system senses events.
Physical Security.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Physical Security.
Physical Security SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States.
每时每刻 可信安全 1 What category of water sprinkler system is currently the most recommended water system for a computer room? A Dry Pipe sprinkler system B Wet.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
1 Virtual Police Security System & Management Control May 2003.
Module 02: 1 Introduction to Computer Security and Information Assurance Objectives Recognize that physical security and cyber security are related Recognize.
Understanding Security Layers
Chapter 6.  Natural environmental threats  Supply system threats  Manmade threats  Politically motivated threats.
Physical Security By: Christian Hudson. Overview Definition and importance Components Layers Physical Security Briefs Zones Implementation.
Physical Security “Least sexy of the 10 domains but the best firewall in the world will not stand up to a well placed brick.”
Principles of Information Security, 2nd Edition 2 Learning Objectives Upon completion of this material, you should be able to:  Understand the conceptual.
© 2008 Delmar, Cengage Learning Property Security, Emergency Response, and Fire Protection Systems Chapter 13.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 16 “Physical and Infrastructure.
1 LOW CURRENT  FIRE & SAFETY………………………………. 1) Fire Alarm ( EDWARDS ) Smoke, Heat and GAS detectors connected to audible and visual devices to convey the.
Lesson 4 Physical Security - Motion Sensor - Passive Ultrasonic Sensor - Photoelectric System - Ultrasonic - Ultrasonic Motion Sensor - Vibration Sensor.
Add name of trust / organisation in box 1 and name of trainer in box 2. Delete THIS box.
Physical (Environmental) Security
Fire No institution is immune from fire. Flood damage can be dried out and restored, stolen property has a chance of being recovered; damage from fire.
Chapter 5 ID 234 Building Codes Fire Resistant Materials and Assemblies.
Site Security Policy Case 01/19/ : Information Assurance Policy Douglas Hines, Jr.
Physical and Environmental Security Chapter 5 Part 2 Pages 457 to 499.
Physical Security Katie Parker and Robert Tribbia Katie Parker and Robert Tribbia Computer Security Computer Security Fall 2008 Fall 2008.
The Need for Access Control & Perimeter Protection
What you will learn in this session 1.The characteristics of fire, smoke and toxic fumes 2.Fire hazards involved in the working environment 3.Significant.
Department of Computer Science Chapter 4 Physical and Environment Security Semester 1.
Physical Security Concerns for LAN Management By: Derek McQuillen.
10. Security and Physical Protection Basic Concepts
INMM Nuclear Security and Physical Protection Technical Division.
Physical Security Ch9 Part I Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 13 – Physical and.
The Physical Security in UTM NAWAF OMAR MAN Prof Hafiza Abas.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
Criminal Justice Intro to Security, Instructor Name Date, Semester Chapter 4: PHYSICAL SECURITY: STRUCTURAL, ELECTRONIC, AND HUMAN PROTECTION SYSTEMS.
Unit 1: Protecting the Facility (Virtual Machines)
Module 5: Designing Physical Security for Network Resources
Physical and Technological Security
Security Systems In Buildings
CompTIA Security+ Study Guide (SY0-401)
Arson Risk Reduction Bradford Fire Prevention
NETW4005 COMPUTER SECURITY A
Understanding Security Layers
CompTIA Security+ Study Guide (SY0-401)
CompTIA Security+ Study Guide (SY0-501)
Chapter 10 Physical Security
Objectives Telecommunications and Network Physical and Personnel
Physical Security.
Presentation transcript:

1 12. Physical Security ISA 562 Internet Security Theory & Practice

2 Objectives Goals and purpose of layered security Principles in site location Building entry points Physical security principles for information system ’ s security within a building

3 Information Security TRIAD Physical (environmental) security domain supports all three of CIA Need to consider physical risks that could happen to IS, Environment in which systems operate Take risk mitigating, cost-effective security countermeasures

4 Physical security Physical security includes: Layered defense model Crime prevention through environmental design Facility and infrastructure criteria Primary goal Life safety is the prime goal in physical security. In emergencies. organization must ensure safety of personnel before safety of the facility or equipment.

5 Goals of physical security Deterrence for Crime and disruption Convince threat agent not to attack Fence, Security Guards, etc Delay to reduce damage If attacked, delay long enough to detect and respond Before damage to IS or information occurs Layers of Defense, barriers, etc. Detection of crime or disruption Develop capability to detect attacks that cannot be delayed forever. For example install Smoke Detectors, CCTV, etc Assessment Once detected, assess the method of attack, the target, and remediation Respond procedures Take appropriate actions without overreacting (fire suppression, Emergency response, etc)

6 Threats to physical security Natural/environmental Utility systems Human-made/politics events Malicious threat sources and countermeasure Theft Countermeasure: Strong Access controls, IDS, locked doors, etc. Espionage Countermeasure: good hiring process, background checks, etc. Dumpster Diving Countermeasure: proper disposal policy and procedure, etc Social engineering and shoulder surfing Countermeasure: employee awareness program, etc HVAC Access Countermeasure: section lock downs to control access, smoke sensor, etc

7 Layered defense model Security through “ layers ” of controls-Mutli – layered: perimeter, grounds, building entrances

8 Perimeter and building boundary protection: landscaping Perimeter security controls: first line of defense Protective barriers either natural or structural Offer Natural barriers, such as terrain Structural barriers  fences, gates, bollards, and facility walls Landscaping Ponds, hedges can provide a barrier or entry point Spiny shrubs make it harder for an intruder to enter

9 Fences /controlled access points Fences Enclose Security areas and designate property boundaries Meet gauge and fabric specifications, etc Federal, state, or local codes may apply No parking near fences Gates – minimum number needed. Bollards variety of sizes and shapes depending on use Retractable ones are designed for traffic control Provide security against vehicles ramming into or stopping near buildings Lighted bollards can be used for lighting controls along parks, paths, and sidewalks

10 Perimeter intrusion detection systems Detects unauthorized access into an area Some of the characteristics are: Photoelectric Active infrared beam that triggers an alarm when crossed. Ultrasonic Ultrasound energy bounced off the floors, walls, objects. The receiver detects the foreign signal change caused by the intruder and sounds the alarm Microwave Receiver diode picks up transmitted and bounced energy waves in an enclosure. Intruder disrupts the waves and activities Passive infrared Where objects radiate IR with the heat of their bodies. Detector notes change and triggers an alarm Pressure sensitive Detects pressure on the sensor or surrounding area

11 Closed Circuit Television (CCTV) CCTV  an excellent tool for security. Not a simple security device. blind-spots, motion detection systems, and workplace privacy. CCTV capability requirements Detection Recognition Identification Mixing capabilities Provide joint capabilities Virtual CCTV Systems Fake systems that are installed as a deterrent

12 CCTV main components CCTV have three main components: Camera lens Fixed Zoom Automatic iris Fresnel lens Transmission media Wired or Wireless Display monitor National television System Committee (NTSC) Phase Alternative Line (PAL)

13 Additional CCTV system equipment Pan and tilt units Panning device Mountings Switchers/multiplexers Remote camera controls Infrared illuminators Time/date generators Videotape or digital recorders Motion detectors Computer controls

14 CCTV concerns Total surveillance Size depth, height, wand width Lighting Contrast

15 Lighting Use with other controls Support crime prevention Type Continuous A series of fixed lights arranged to flood a given area during hours of limited visibility Trip activated by sensor that detects activity such as movement or heat Standby Like continues lighting but lights not always on but are turned on either automatically or manually when suspicious activity suspected. Emergency Is used for power failures or other emergencies that render normal system inoperative

16 Building entry point protection Locks Considered delay devices and not foolproof barriers to entry Lock components Lock body Strike and strike plate Key Cylinder Types of locks Combination Deadbolt Keyless Smart

17 Lock picking /security measures Lock picking Basic picking tolls are tension wrench and pick Locks are “ pick-resistant ”, not “ pickproof ” Lock and key control system Key control procedures Who has access to keys? To whom are the keys issued? Key inventory Combination locks must be changed Every twelve months and when possibly compromised, etc Fail-soft vs. Fail-secure

18 Other important Controls Guards and guard stations provide a deterrent Electronic physical controls Card Access Biometric Methods Compartmentalized areas Extremely sensitive location and most stringent security controls Multi-layered physical access controls Data Center/ server room security Wall solid, of fire-proof material and permanent part of floor and ceiling Multi-factor access controls Computer equipment protections Laptop and portable device security Docking stations, tracing software, etc. Computer equipment security Protecting the device, data, etc Objects placed inside security containers Safes, vaults, etc

19 Crime prevention through environmental design Managing the physical environment Relationships between people and environments Three key strategies of CPTED (Crime Prevention through Environmental Design) Territoriality Surveillance Access control

20 Site and Facility considerations Site security Location of building Where to build Surroundings Highway Airport Military base, etc CPTED should be part of the process Facility security Entry points Primary & secondary Entrances Windows, etc Doors Hollow-Core versus solid-core Isolation of critical areas Lighting of doorways, etc Windows Standard plate glass Tempered glass, etc

21 Infrastructure Infrastructure support systems Electrical power water/plumbing Steam lines, etc Key threats to support the system Fire- Damage & destruction of facilities Water-flooding/dripping Power loss- Disruption/ stop operations Gas leakage-explosion HVAC failure-overheating/overcooling, etc

22 Fire Concerns Abiding by fire codes Fire containment system Fire extinguishing system Fire prevention training and drills Protection Fire prevention Fire detection Fire suppression

23 Fire types and suppression common combustion ( fuel, oxygen, etc) Suppression: water, foam, dry chemicals liquid Suppression: gas, CO 2, foam, dry chemicals Electrical Gas, CO 2, dry chemicals Combustible metals Dry powders Cooking Media Wet chemicals

24 Halon Gas Restricted by 1987 Montreal protocol Halon is no longer used due to this, and many jurisdictions require its removal Alternative replacements are: PFC-410 or CEA-410,PFC-218 or CEA-308, etc Water CO 2

25 Electrical power faults Complete loss of power Blackout Fault Power Degradation Brownout Sag/Dip Surge Transients Inrush Current Electrostatic Discharge Interference (noise) Electromagnetic Interference (EMI) Radio Frequency Interference (RFI)

Reference ISC2 CBK Material 26