Physical Site Security.  Personnel  Hardware  Programs  Networks  Data  Protection from:  Fire  Natural disasters  Burglary / Theft  Vandalism.

Slides:



Advertisements
Similar presentations
© Caveon, 2006 Under Lock and Key: Conducting a Physical Security Audit John Fremer, Ph.D – President, Caveon Jamie Mulkey, Ed.D. – Sr. Director Caveon.
Advertisements

GCSE ICT Networks & Security..
To ensure quality instruction and educational success, NVC Information Technology is committed to delivering high quality technical leadership, resources,
General Security Concepts Ali SHAYAN ZAKARIA 12.May.2010 Kish Island – CITELEX 2010 " The best way to predict the future is to invent it. Alan Kay 1General.
Ethics, Privacy and Information Security
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
An Introduction to System Administration Chapter 1.
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Physical (Environmental) Security.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
LittleOrange Internet Security an Endpoint Security Appliance.
Factors to be taken into account when designing ICT Security Policies
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Video Management Control-Bit Technologies video system manages various types of video inputs; analog or digital, originated in both analog & IP cameras,
New Data Regulation Law 201 CMR TJX Video.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Using Microsoft Network Access Protection to test Dr.Web anti-virus software The workstations successfully checked by NAP can be used in a corporate network.
Security Threats Connecting Computers Copyright Law & Ethics Storage & Memory Computer System
Physical Security By: Christian Hudson. Overview Definition and importance Components Layers Physical Security Briefs Zones Implementation.
Section 9 External and internal resources AQA ICT A2 Level © Nelson Thornes Section 9: External and internal resources Management of Internal Resources.
1.1 System Performance Security Module 1 Version 5.
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 16 1 Chapter 16: Advanced Security IT Essentials: PC Hardware and.
Chapter 15 Industrial Security. Loss Specific to Industry  Industrial losses frequently include:  Tools.  Materials.  Supplies.  Products.  Pallets.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
© CCI Learning Solutions Inc. 1 Lesson 5: Basic Troubleshooting Techniques Computer performance Care of the computer Working with hardware Basic maintenance.
Networks. A network is formed when a group of computers are connected together. Computers in a Local Area Network (LAN) are fairly close together, generally.
Chapter 18 Institutional Security. Special Security Institutions  Hospitals and other health care facilities.  Educational institutions.  Libraries.
Information Systems Security Operations Security Domain #9.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Networked Information Systems Network Security. Network Physical Security File server failure can severely affect network users. Server security: Locked.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Note1 (Admi1) Overview of administering security.
Physical (Environmental) Security
Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Security fundamentals Topic 11 Maintaining operational security.
FIT03.05 Explain features of network maintenance.
Physical Security Katie Parker and Robert Tribbia Katie Parker and Robert Tribbia Computer Security Computer Security Fall 2008 Fall 2008.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
E-Commerce and Security Dr. John P. Abraham Professor University of Texas Pan American.
1 Figure 2-6: Building Security Building Security Basics  Single point of (normal) entry to building  Fire doors, etc.: use closed-circuit television.
Bay Ridge Security Consulting (BRSC). Importance in Securing System  If don’t keep up with security issues or fixes Exploitation of root access Installation.
INFORMATION SECURITY AND CONTROL. SECURITY: l Deter l Detect l Minimize l Investigate l Recover.
Inutsystems.com. INut offers guaranteed Computer Repair Services for all computer hardware including monitors, motherboards, hard disks and power supplies.
Physical Security Concerns for LAN Management By: Derek McQuillen.
© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
Implementing a Security Policy JISC – ICT Security Threats & Promises, April 2002 Mick Ismail ICT Services Manager City of Wolverhampton College.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
The Physical Security in UTM NAWAF OMAR MAN Prof Hafiza Abas.
Computer Technology. HardwareSoftware  Hardware ◦ Monitor ◦ Keyboard ◦ Hard disk drive ◦ Mouse ◦ CPU (Central Processing Unit) ◦ Graphic and sound cards.
Question 1 Of the following choices, what type of control is least privilege? A. Corrective B. Detective C. Preventative D. Technical.
Module 5: Designing Physical Security for Network Resources
CompTIA Security+ Study Guide (SY0-401)
Huawei Digital Pipeline Solution
Call For Norton Customer Service. customerservice.com/norton- customer-service.html.
CompTIA Security+ Study Guide (SY0-501)
Computer security Computer security means protecting our computer system and the information they contain againts unwanted access, damage,destruction or.
County HIPAA Review All Rights Reserved 2002.
Data integrity and security
Level 2 Diploma Unit 11 IT Security
Physical Security.
Welcome to all Participants
An Introduction to System Administration
G061 - Network Security.
Presentation transcript:

Physical Site Security

 Personnel  Hardware  Programs  Networks  Data  Protection from:  Fire  Natural disasters  Burglary / Theft  Vandalism  Terrorism

 Install malware, keyloggers, viruses, etc.  Identify / capture credentials  Physical network connections  Data collection systems access  Plant rogue Aps  Theft / Dumpster diving

 Categories  Physical: Security guards, lighting, fences, locks, alarms, closed-circuit televisions, man-trap  Technical: Firewalls, IDS, filtering and scanning  Operational: Policies

 Lock the server room  Establish video surveillance  Secure workstations and components  Secure portable devices  Secure backups  Disable removable media devices  Secure printers and output  Lock picking:    

 Establish a response policy  Refine policies  Identify (notify?) stakeholders