Chapter 6.  Natural environmental threats  Supply system threats  Manmade threats  Politically motivated threats.

Slides:



Advertisements
Similar presentations
Security+ All-In-One Edition Chapter 7 – Physical Security
Advertisements

Signs of Wealth can draw undue attention. Signs of Wealth can draw undue attention. Dont present the outside of your home as a soft target. Dont present.
CISSP Luncheon Series: Physical (Environmental) Security
Facilities Management and Design Chapter 4 Safety and Security systems.
GCSE ICT Networks & Security..
Physical and Environmental Security
FIRES NEED 3 THINGS TO START _____________________ _________________ (any material that will burn) _____________________ (sparks, matches, flames)
UNIT PHYSICAL SECURITY PLAN
Fiber-Optic Perimeter Intrusion Detection System.
A best practice guide to...
Fire Safety The “Fire Triangle” identifies the three components of any fire: –Fuel paper, wood, flammable gas, energized electrical equipment, etc...
Chapter 5 Enhancing Security Through Physical Controls
SECURITY HARDWARE & TECHNOLOGY CCPOA REGION 3 TRAINING CLASS MAY 11, 2011.
Physical and Environmental Security Chapter 5 Part 1 Pages 427 to 456.
1 Introduction to Security Chapter 6 Enhancing Security through Physical Controls.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Physical (Environmental) Security.
Copyright © Center for Systems Security and Information Assurance Lesson Seven Physical Security.
Brian E. Brzezicki. Physical security is extremely important. There is no point in technical and administrative security controls if someone can simply.
Information Security Principles and Practices
Classes of Fires Agricultural Construction Skills.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 16: Physical and Infrastructure Security.
Information Systems Security Physical Security Domain #4.
Physical Security Chapter 9.
1 INTRUSION ALARM TECHNOLOGY DETECTION DEVICES. 2 INTRUSION ALARM TECHNOLOGY Detection devices can be either passive or active. Passive devices typically.
What you will learn in this session 1.The characteristics of fire, smoke and toxic fumes 2.Fire hazards involved in the working environment 3.Significant.
Chapter 3.  Security Framework  Operational Security Lifecycle  Security Perimeter  Access Control  Social Engineering  Environmental Issues.
Security Devices A modern security system, with its array of electronic components, is designed to sense, decide, and act. The security system senses events.
Physical Security.
Chapter 6 – Physical and Environmental Security. Physical and Environmental Security Physical security is extremely important. There is no point in technical.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Physical Security.
1 12. Physical Security ISA 562 Internet Security Theory & Practice.
Welcome Presentation On Office security system. Group Members: Md. Emdadul Haque Md. Sahed Hasan Md. Samsul Arefin Khokan Das.
Physical Security SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States.
PC Maintenance: Preparing for A+ Certification Chapter 2: Safety and Preventive Maintenance.
每时每刻 可信安全 1 What category of water sprinkler system is currently the most recommended water system for a computer room? A Dry Pipe sprinkler system B Wet.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
A Secure Frontline September 25, 2003
Physical Security By Pallavi Wankhede ISQS Physical Security Sub-divisions of Physical Security Means of implementing physical security Merits and.
Fire Extinguisher Training
Physical Security “Least sexy of the 10 domains but the best firewall in the world will not stand up to a well placed brick.”
Chapter 6 – Physical and Environmental Security Brian E. Brzezicki.
© 2008 Delmar, Cengage Learning Property Security, Emergency Response, and Fire Protection Systems Chapter 13.
1 Safety and Preventative Maintenance. 2 MB, One megabyte - MB or M-byte - represents about 1 million (10 6 ) bytes. Precisely, 1 MB = = 1 kB x 1 kB =
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 16 “Physical and Infrastructure.
Apartment Safety Burglary #1 crime nationwide 200 million burglaries a day, which is one in every 10 seconds. Average time it takes to burglarize a home.
Chapter 5-Fire Safety Developing Effect Ways to Prevent and Deal With Fires in Your Home.
Lesson 4 Physical Security - Motion Sensor - Passive Ultrasonic Sensor - Photoelectric System - Ultrasonic - Ultrasonic Motion Sensor - Vibration Sensor.
Physical (Environmental) Security
Fire No institution is immune from fire. Flood damage can be dried out and restored, stolen property has a chance of being recovered; damage from fire.
Chapter 5 ID 234 Building Codes Fire Resistant Materials and Assemblies.
FIRE SAFETY Unit 2, Activity 2
Physical and Environmental Security Chapter 5 Part 2 Pages 457 to 499.
Physical Security Katie Parker and Robert Tribbia Katie Parker and Robert Tribbia Computer Security Computer Security Fall 2008 Fall 2008.
Physical Security Concerns for LAN Management By: Derek McQuillen.
The Safety of Exhibits. The Safety of Objects The Safety of People.
10. Security and Physical Protection Basic Concepts
Physical Security Ch9 Part I Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
The Perimeter Protection Issues, Technique and Operation Assoc Prof Dr Zuraini Ismail / Hafiza Abas.
Building The topic ‘Building’ can be divided into three parts: Passive fire protection Fire protection that is built-in in the building (for example fire.
Presented BY BEISecurity. Fiber-Optic Perimeter Intrusion Detection System.
Criminal Justice Intro to Security, Instructor Name Date, Semester Chapter 4: PHYSICAL SECURITY: STRUCTURAL, ELECTRONIC, AND HUMAN PROTECTION SYSTEMS.
Security Systems In Buildings
Physical Security.
Presentation On Office security system
CompTIA Security+ Study Guide (SY0-401)
Physical and Environmental Security
Division of Computer Studies
Chapter 10 Physical Security
Fire safety Module 10.
Presentation transcript:

Chapter 6

 Natural environmental threats  Supply system threats  Manmade threats  Politically motivated threats

 Protecting life is the first priority

 Layered Defense model  If one layer fails, another layer protects.

 Crime Prevention Through Environmental Design – facility design, lighting and landscaping.  Natural Access Control  Natural Surveillance  Natural territorial reinforcement  Target Hardening – locks, etc

 Deter  Delay  Detect  Assessment  Response

 Facility – location/terrain, proximity to fire/police, etc.  Construction  Entry Points  Man trap  Fail safe  Fail secure

 Internal partitions – do they go past the drop ceiling?  Windows – Standard, Tempered, Acrylic, Wired, Laminated, film (solar/Security)  Computer room location  Access door (not doors).  Emergency off switch  Positive air pressure  Fire suppression

 Dedicated HVAC system  Temp 70°-74°F  40%-60% humidity  Closed loop – air reused  Positive pressurization – smoke goes out  Store backups in a safe  Encrypt backups

 Inventory laptop, serial number. Engraving  Don’t let the laptop out of sight when traveling  Most laptop locks are a joke.  Back up your critical data.  Encrypt the hard drive (or at least critical data) – BitLocker – TruCrypt  Lojack for laptops.

 UPS  Online - faster  Standby – cheaper  Voltage regulator/line conditioner  Spike/Surge, Fault/Blackout, Sag/brownout  In-rush current  Electromagnetic interference – other wires  Radio frequency interference – fluorescents  Generator

 Prevention – training, equipment, construction. BOXES  Detection – pull boxes, detectors, autodial  Suppression  Plenum area & plenum materials

 A – wood & paper - Water & foam  B – petroleum, natural gas – Gas, foam, powder  C – electrical – Gas, dry powders  D – metal – Powder/chemical specifically for Class D (NaCl, graphite, powdered copper)  K – cooking oil or fat (sub-type of class B)

 Halon – CFC, 10% concentration danger  FM in

 Wet pipe – always has water. Freezing problem.  Dry pipe – pipes dry until there is a fire  Preaction – dry pipe and thermal-fusible sprinklers.  deluge

 Keep honest people honest.  UL rating is on delay time. Test Door Locks/Cylind ers Security Container Key Locks Two-Key Locks Picking Impressioning Forcing Drilling0530n/a Sawing0530n/a Prying0530n/a Pulling0530n/a Punching0530n/a Source:

 Lockpicking  Keybumping  Kicking in the door  Reinforce deadbolt strikeplate;the ‘weakest link’  Use screws at least 3” long (studs behind door frame).  About $3-$5 on amazon.com

 32.00% Through unlocked window or door  26.64% Forced entry by impacts  24.02% Prying or jimmying  6.79% Use of pass key or picking the lock  5.10% Entry attempted, but failed  5.45% Other or unknown REF:

 Warded lock – some padlocks  Tumbler lock  Pin – most common  Wafer – no keybumping  Lever tumbler  Combination locks  Cipher locks

 Magnetic swipe cards  Proximity cards – not all cards are created equal.  PIN?  Piggybacking

 Deterrence – Fences, Gates, Guards  Delay – Barriers, man traps, locks  Detection – Motion detectors, cameras, smoke alarms  Response procedures – Fire evacuation plan, emergency phone numbers

 Crime in area  Emergency services available  Markings and signs on building  Accessibility  Some of these may run counter to non-security goals

 Fencing (3’-4’, 6’-7’, 8’) different mesh  Gates  Bollards  Lighting – (critical areas 8’ high two foot-candles)  Continuous, controlled, standby & responsive.  Surveillance devices – DVR, motion triggered recording/alerting  Guards and dogs  CPTED

 Beams of light  Sound and vibrations  Motion  Microwave, ultrasonic, or electrostatic fields  Electrical circuit (electromechanical)  PIR – passive infrared  Acoustical –prone to false alarm (some glass breaks are good)

 Flexible, good response, deterrent  Costly, usual personnel issues.

 Date and time of access attempt  Where access was attempted (Entry point)  User ID when access was attempted  Failed attempts, especially off-hours

 Test evacuation plan  Test other plans so people know what to do in a real emergency.