Presentation is loading. Please wait.

Presentation is loading. Please wait.

Physical Security.

Similar presentations


Presentation on theme: "Physical Security."— Presentation transcript:

1 Physical Security

2 Introduction The physical security domain provides
protection techniques for the entire facility, from the outside perimeter to the inside office space, including all of the information system resources.

3 Physical Security Definition
The physical measures & their associated procedures to safeguard & protect against: Damage Loss Theft Implementing controls that discourage attackers by convincing them that the cost of attacking is greater than the value received from the attack.

4 Objectives The CISSP should be able to:
Describe the threats, vulnerabilities, and countermeasures related to physically protecting the enterprise’s sensitive information assets. Identify the risk to facilities, data, media, equipment, support systems, and supplies as they relate to physical security.

5 Section Objectives List the goals of physical controls
List the threats to physical security Describe Crime Prevention Through Environmental Design

6 Goals of Information Security
The common thread among good information security objectives is that they address all three core security principles. Availability Confidentiality Prevents unauthorized disclosure of systems and information. Integrity Prevents unauthorized modification of systems and information. Prevents disruption of service and productivity. The cornerstone of information Security. In physical security, it is important to ensure all three elements are addressed.

7 Physical Security Requirements
Life Safety Safety of people is the primary concern. Life safety is the primary goal. In an emergency situation, the organization must ensure the safety of personnel before the safety of the facility.

8 Goals of Physical Security
Deter Delay Detect Assess Respond Physical security technology is comprised of barriers, entry and search controls, intrusion detection, alarm assessment, and testing and maintenance. Collectively this system, along with organizational practices and procedures, are intended to deter, delay, detect, assess, and appropriately respond to an unauthorized activity.

9 Threats to Physical Security
Natural/Environmental (e.g., earthquakes, floods, storms, hurricanes, fires) Utility Systems (e.g., communication outages, power outages) Human-Made/Political Events (e.g., explosions, vandalism, theft, terrorist attacks, riots)

10 Natural Events

11 Malicious Threats Theft HVAC Access Espionage Shoulder Surfing
Internal/external results in increased costs Espionage Loss of intellectual property & market share Dumpster Diving Access to sensitive corporate information Social Engineering Intelligence Attack Shoulder Surfing Results in unauthorized access HVAC Access via HVAC vents Theft HVAC Access Espionage 6 Key Threats Shoulder Surfing Dumpster Diving Social Engineering

12 Countermeasures Theft Espionage Dumpster Diving
Layered Defense System Disposal Policy Dumpster Diving Employee Tracking & Job Rotation Strict Internal Controls Espionage IDS & Locked Doors and Keys Access Control Theft

13 Countermeasures Social Engineering Shoulder Surfing HVAC Access
Narrow Shafts Section Lock Downs HVAC Access Keyboard Keystroke Placement Awareness of your Surroundings Shoulder Surfing Social Engineering Employee Accountability Employee Security Awareness Intelligence Attack: Intelligence Analyst is hired by your company to purposely seek out and acquire information deemed sensitive by the company stakeholders. Keyboard Keystroke Placement: When typing your user ID and password, run your fingers over numbers, letters, and special characters which are not part of your user ID and password without depressing them.

14 Physical Security Subtopics
Layered Defense Model Crime Prevention Through Environmental Design Site Location Facility Construction Impacts Infrastructure Support Systems

15 Layered Defense Model Building Floors/ Office Suites Building Grounds
Perimeter Building Entrance Offices/ Data Centers/ Equipment, Supplies, Media Different layers that need protection. What would you need? Concept of “defense in depth.” Focuses from the outside to the inside. It is the combination of controls at various layers that provide the security.

16 Crime Prevention Through Environmental Design
The physical environment of a building is changed or managed to produce behavioral effects that will assist in reducing the incidence and fear of crime. Focuses on the relationships between the social behavior of people and the environments. Since this is a concept discussed and known in the law enforcement field, most students will not know this term. As a CISSP they should be familiar with the concept of CPTED. Essentially, that people respond to factors within the environment, including security controls. CPTED has also been called “target handling.”  Crime Prevention Through Environmental Design For law enforcement officers, city planners, architects, urban planners, and educators. CPTED is defined as ‘the proper design and effective use of the built environment that can lead to a reduction in the fear and incidence of crime and an improvement in the quality of life. The goal of CPTED is to reduce opportunities for crime that may be inherent in the design of structures or in the design of neighborhoods. CPTED ordinances are being adopted throughout the country. These ordinances require site plan reviews with a focus on crime prevention. CPTED trained law enforcers are working together with City Officials, Planners, Architects and Educators to properly design structures.

17 Crime Prevention Through Environmental Design
Three Key Strategies Territoriality - people protect territory that is their own Surveillance - high degree of visual control Access Control - limit access and control the flow of access Some security practitioners have misunderstood CPTED by developing target programs that focus on tools such as locks, lighting, and alarms, but they miss important CPTED design elements. It is how the tools are used that makes the difference. Essentially, the security program is integrated into the environment, not just added on.

18 Site Location Security should include where the building is and how it should be built. Crime? Riots? Natural disasters? Adjacent buildings? Airport? Highway? Military Base? Emergency support systems? Most security professionals will work for facilities that already exist. However, if the CISSP is involved in the building of a new facility, there are security concerns that need to be addressed from the beginning stages.

19 Facility/Construction Issues
Walls, Windows, and Doors Entry Points Primary & secondary entrances Windows Roof access Maintenance entrance Emergency exits Loading docks Emergency exits include those doors that do not have any outside hardware.

20 Doors Hollow-core versus solid-core Isolation of critical areas
Lighting of doorways Contact Devices (switches) Mantraps (double door systems) These are the types of controls that can be used to protect building entry points. The bullets list considerations that need to be thought of when designing security related to doors.

21 Door Safety Doors Do not block exit doors
Provide sufficient and appropriate lock mechanics Hinges securely fixed to the frames Frame securely fixed to the adjoining wall. Doors Good security practices are: Door should be solid core door Door should not open out Door locks should provide both daytime locks, such as push-button lock (while the room is occupied), and 24-hour locks, such as deadbolt locks for after business hours. Door hinges should be fixed to the frames with a minimum of three hinges per door Door frame should be permanently fixed to the adjoining wall studs Fire-resistant doors should be rated same as walls. Directional opening - Exterior doors, opening out, should have hinge pins sealed (welded) so they can't be removed. Forcible entry (doors & frames) Emergency egress (markings/hardware) Monitored/alarmed Emergency entry (power outage/fire)

22 Windows Standard plate glass Tempered glass Acrylic materials
Polycarbonate windows - glass and polycarbonite combinations combine the best quality of glass and acrylics The most common type of window in residential homes is standard plate glass. It is easy to cut for any size window and can shatter into dangerous jagged shards if broken. The next level up is tempered glass that is five-to-seven times more break-resistant. Once cut or pierced at any point, it shatters into small fragments. Because of this shattering, tempered glass must be pre-cut to the exact size of the window (i.e., it cannot be cut to size like plate glass). Windows can also be made from acrylic material. Standard acrylics are not as strong as polycarbonate acrylics but they are more resistant to breakage than standard plate glass. The disadvantages to acrylic are that they support flames and produce toxic fumes if burned; scratch easily; and, can be drilled, cut, or sawed. Polycarbonate windows are made from lightweight see-through plastic that is 20 times stronger than standard acrylic of the same thickness. Glass-clad polycarbonite combines the best qualities of glass and acrylics. They are high security windows that are resistant to abrasion, chemicals, fires, and even anti-ballistic. Because they are expensive they are usually limited to high-security areas. For windows, shatter-resistant, laminated glass of a minimum thickness should be used. Also, the windows should be installed in fixed frames so that the windowpanes are not removable from the outside. It is essential that window frames are securely anchored in the wall, and windows can be locked from the inside. If the organization has high-security needs, windows could be alarmed, contain steel wire mesh, or be protected by steel bars. Tempered glass – is made by rapidly cooling annealed glass that has been heated in a furnace. It is 4 times stronger than annealed glass. When broken, tempered glass crumbles into many tiny pieces less likely to cause serious injury. Much stronger than annealed glass Reduced danger from broken glass fragments Possible optical distortion Potential for spontaneous breakage

23 Windows cont… Laminated Glass Wired Glass Solar Window Films
Window Security Films Glass Breakage Sensors Security controls for windows include: ·        Laminated glass – glass is made by bonding a plastic inner layer between two outer layers of glass under high pressure and heat. When the glass layer is broken, it does not separate significantly from the bonding layer. Increasing the number of layers can strengthen its resistance to impact. For example, if the layers are increased to a half-inch, it is considered burglar resistant and if an inch thick, it is considered resistant to bullets from a small caliber gun. It is more expensive than plate or tempered glass and cannot be easily cut, thus it is usually ordered to size. As an example, in most cars, all the windows, except the windshield, are tempered glass. The windshield is usually made from laminated glass to provide better protection against shattering. ·        Wired glass – glass is made by embedding a continuous sheet of wire mesh between two layers of ordinary glass. The glass tends to cling to the wire mesh, which prevents it from shattering if broken. ·        Solar Window Films– materials that are affixed to windows to, for the most part, offer window efficiency for heating and cooling purposes. They filter out the majority of the sun’s damaging ultraviolet rays. They also offer security features by preventing those on the outside from viewing activities on the inside. It also improves security by protecting the glass from shattering if broken. Solar films are used on both building and vehicle windows. Note that films can be damaged from cleaning chemicals, mechanical wash brushes, and harmful environmental conditions such as ultraviolet sunlight. ·        Window Security Film – similar to solar film, but it is a commercially available film that is a transparent overlay applied over a window to protect it from unwanted entries, storm damage, and in some cases, bomb blasts. It is similar to transparent contact paper and keeps the glass underneath it from fragmenting. It is the most effective way to improve the integrity of plate and tempered glass windows. ·        Glass Breakage Sensors – small specialty microphones are tuned to the resonant frequency of breaking glass.

24 Infrastructure Support Systems
Infrastructure Support Systems include electrical power, water/plumbing, steam, gas lines, and heating, ventilation, air conditioning (HVAC), and refrigeration.

25 Support System Threats
Fire Fire Damage & destruction of facilities/equipment Water Flooding/dripping Power Loss Disruption/stop in operations Gas Leakage Explosion HVAC Overheating/overcooling HVAC Water 5 Key Threats Gas Leakage Power Loss

26 Fire Best Practices Fire Containment System (floors, vents, HVAC)
Fire Extinguishing System (permanent & mobile) Abiding by the Fire Codes Fire Prevention Training and Drills

27 Fire Protection Subtopics
Fire Prevention – reduce causes of fire. Fire Detection - receive warnings of fire before it becomes a problem. Fire Suppression - how to extinguish and contain a fire to minimize damage. All of these combined are “fire protection,” which refers to detecting fires and minimizing the damage to people and equipment if they should happen. Life safety issues include communications, alarms, routes of exit, and refuge areas.

28 Fire Prevention Use fire resistant materials for walls, doors, furnishings, etc. Reduce the amount of combustible papers around electrical equipment. Provide fire-prevention training to employees - remember, life safety is the most important issue. Conduct fire drills on all shifts so that personnel know how to safely exit a building.

29 Fire Detection Ionization-type smoke detectors detect charged particles in smoke. Optical (Photoelectric) detectors react to light blockage caused by smoke. Fixed or rate-of-rise temperature sensors - heat detectors that react to the heat of a fire. Combinations are usually used for the best effectiveness in detecting a fire. Fire detection systems are readily available and effective. Ionization-type smoke detectors react to the charged particles in smoke. Photoelectric detectors react to light blockage caused by smoke. Heat detectors react to the heat of a fire. Combinations of these detectors can detect a fire very quickly, often before it is critical problem. Again, if the fire is detected, the first rule is to get the people out.

30 Fire Types and Suppression
Class Type Suppression Agents A Common combustibles Water, foam, dry chemicals B Liquid Gas, CO2, foam, dry chemicals C Electrical Gas, CO2, dry chemicals D Combustible metals Dry powders K Commercial kitchens Wet chemicals Fire Classes: A - Common Combustible (i.e., wood products, laminates, clothing, furniture) B - Liquid (i.e., petroleum products, kerosene, coolants) C - Electrical (i.e., electrical equipment and wiring) D - Combustible Metals (i.e., potassium, calcium, magnesium, lithium) K – Commercial kitchens (Can be a concern for us if we have cafeteria or restaurant facilities nearby. Grease fires can spread very quickly and may need specialized wet chemicals as suppression agents.) Combustion elements: Fuel, Oxygen, Heat Suppression methods versus combustion elements: CO2 & foam reduces fuel & oxygen Water reduces temperature Gas (Halon/Halon substitutes) interfere with chemical reaction between elements CO2 - Gaseous carbon dioxide is 1.5 times denser than air. Therefore, it will be found in greater concentrations at low levels. The Occupational Safety and Health Administration (OSHA) warns that high concentrations of CO2 can displace oxygen, and can subsequently cause death if breathed especially if allowed to accumulate in open pits and other areas below grade.

31 Fire Suppression Agents
Carbon Dioxide (CO2) extinguishers provide a colorless, odorless chemical that displaces oxygen in the air. Halon gas - contains a white bromine powder produced in chlorofluorocarbon compounds (CFC) factor in the depletion of the ozone layer. FM200 most effective alternative - requires 7% concentration (Halon requires 5%) Types of suppression systems Flooding or area coverage - suppression agent discharged through installed pipes designed to protect personnel and extinguish fire Zones of coverage Timed release HVAC off before activation Water and Gas (e.g., Halon/substitute are common choices) Water offers conventional or pre-action (“dry pipe”) options Gas best used in pre-action, time delay mode - Halon concentration of <10% can be breathed Portable extinguishers - to minimize fire damage Filled with approved/applicable suppression agent. Located within 50 feet of any electrical equipment At exits Other considerations Clearly mark, with unobstructed view, Easily reached and operated by average-sized personnel , Inspected quarterly Halon (Halongenated extinguishing agent) Must be thoroughly mixed with air Fastest practical flooding desired Halon 1301 requires expensive pressurized flooding system Halon 1211 self-pressurizes (used in portable extinguishers) Other replacement alternatives for Halon include: PFC-410 or CEA-410, PFC-218 or CEA-308, NAF S-III, FE 13, Argon, Argonite, Inergen Water - The Fire Protection and Insurance Industries support the use of water as the primary fire extinguishing agent for all business environments, including those dependent on Information Systems! CO2 - colorless, odorless, and potentially lethal in that it removes oxygen Gas masks give no protection Best application is for unattended facilities Use built-in delay in manned areas. Gasses meet the safety requirements of less that 10% concentration. FM-200 does not release ozone depleting substances into the atmosphere.

32 Halon Gas 1987 Montreal Protocol on Substances that Deplete the Ozone Layer. Began implementation in 1992 Any new installations of fire suppression systems must use alternate options EU requires removal of Halon for most applications In existing Halon systems, full-discharge testing should be avoided. Montreal protocol (1987) - stopped Halon production as of 01/01/94 due to agent releasing ozone-depleting substances There is a recent European directive requiring most Halon fire extinguishers and suppression systems to be removed by the end of EU Regulation 2037/2000. By ‘most’ we mean those that are not military or aerospace driven.

33 Fire Suppression Water Sprinkler Systems
Water could be a conductor of electricity - it may compound the problems in computer rooms. Water can cause damage to electrical equipment. “Pre-action” or “dry-pipe” system - water is held back by a valve and is released when the sensor activates. Water is held back by a valve that is activated by a sensor. It hopefully allows for the systems to be shutdown before the water is released

34 Gas Threats Gas Leakage
Identify Location and Test the main Shut-Off valve Secure the Natural Gas Line (using layered defenses) Communicate Natural Gas Line Design to Fire Department Clearly mark Shut-off Valves

35 Water Threats Water Detection Sensors
Raised Floors Emergency Shut-off Valves Server room above ground level Water pipes not located above server rooms

36 Electrical Power Disruptions in electrical power can have a serious business impact. Goal is to have “clean and steady power.” Dedicated feeders Alternate power source Access Controls Secure breaker and transformer rooms.

37 Electrical Power Countermeasures
Power Loss Surge Suppressors UPS and UPS Testing Electrical Facilities separated from Data Center Generators

38 Electrical Power Considerations
Electric Power Controls – ‘clean power’ Have an Emergency Power Off (EPO) switch that allows someone to shut down the power. Install a power line monitor that detects and records fluctuations in frequency and voltage. Ensure there is enough backup power to conduct an orderly shutdown to avoid data loss or device damage. The EPO switch should be near the exit: It allows the user to shut off the power before water or other substances could affect it.

39 Electrical Power Outages
Complete loss of power. Blackout Prolonged loss of commercial power Fault Momentary loss of power In July 2001, the Electric Power Research Institute (EPRI) released a study that said power outages and voltage fluctuations cost the US economy up to $188 billion a year. Prolonged = not instantaneous. Something that is beyond your battery-powered UPS capability.

40 Electrical Power Degradation
Brownout Intentional reduction of voltage by the utility company for a prolonged period of time Sag/Dip A short period of low voltage Surge Sudden rise in voltage in the power supply While the previous slide outlined a complete loss of power, this slide (and the next) outline various vulnerabilities of degradation of power, some momentary loss of power, instead of a complete loss of power for a sustained period of time.

41 Electrical Power Degradation, cont.
Transients Line noise that is superimposed on the supply circuit can cause a fluctuation in power. Inrush Current The initial surge of current required when there is an increase in power demand. Electrostatic Discharge A power surge generated by a person or device contacting another device and transferring a high voltage shock. Electrostatic discharge – you walk across a carpeted room on a day when the humidity is very low, reach for a doorknob, and get zapped. Here’s how it happens. Electrostatic charges, known as static electricity, build up when two insulating materials are rubbed together. Electrons are rubbed off of one surface and onto another. So, one surface will now have an excess amount of electrons and thus be negatively charged, while the other will have a relative deficiency of electrons and be positively charged.

42 Interference Noise – A natural occurrence that happens when unwanted signals are generated in circuits that are in close proximity. Typically, this disrupts the affected circuit. Electromagnetic Interference (EMI) Caused by motors, lightning, etc. Radio Frequency Interference (RFI) Created by components of electrical system Caused by electric cables, fluorescent lighting, truck ignition

43 Heating, Ventilation and Air Conditioning Issues
HVAC computerized controls Location Access controls Appropriate maintenance of Temperature Humidity levels Air quality Independence of the data center air conditioning system from the rest of the building. Documented maintenance procedures

44 Heating, Ventilation and Air Conditioning Practices
HVAC Temperature Controls Protection Emergency Detection System Auto Shutoff Mechanisms Proper Maintenance

45 Quick Quiz What are the goals of physical controls?
What are examples of threats to physical security? What are the three key strategies for crime prevention through environmental design? What is the most important factor to remember when implementing physical security controls? Explore: Instructor should use these questions to drive general discussion. Don’t directly give the answers, only curb responses that are clearly incorrect. Try to see what responses the participants can provide. The section summary on the following page answers these questions directly.

46 Section Summary The goals of physical controls are to prevent, delay, detect, assess, and appropriately respond to a physical intrusion. Natural or environmental, utility system, and human-made factors can all pose threats to physical security. The three key strategies for crime prevention through environmental design are territoriality, surveillance, and access control. The most important concept to remember when implementing physical security controls is to ensure the safety of people.

47 Layered Defense Model Subtopics
Perimeter and Building Grounds Building Entry Points Inside the Building -- Building Floors/Office Suites Data Centers or Server Room Security Computer Equipment Protection Object Protection With regard to providing physical security measures the environment should be considered multi-layered. This starts with the perimeter of the facility, the building grounds, the building entry points, and inside the building. The objective is to deter unauthorized or illegal events from occurring and if they do occur, to detect the event and delay the activity for a pre-determined length of time. It is a well-known axiom that if someone wants to gain access, regardless of any constraints, a method will be found to gain access. Thus, a layered defense can provide better physical security controls.

48 Section Objectives Understand the ‘layered’ approach to physical security, from the outside perimeter to the inside of the building Describe boundary protection List perimeter intrusion detection systems Describe controls used inside the building List the key controls for data center or server room security

49 Layered Defense Model Approaching security through ‘layers’ of controls Multi-layered Starts with the perimeter, then building grounds, then building entry points, etc. With regard to providing physical security measures the environment should be considered multi-layered. This starts with the perimeter of the facility, the building grounds, the building entry points, and inside the building. The objective is to deter unauthorized or illegal events from occurring and if they do occur, to detect the event and delay the activity for a pre-determined length of time. It is a well-known axiom that if someone wants to gain access, regardless of any constraints, a method will be found to gain access. Thus, a layered defense can provide better physical security controls.

50 Perimeter and Building Grounds Boundary Protection
Perimeter security controls are the first line of defense. Protective barriers can be either natural or structural. Natural protective barriers offer terrains that are difficult to cross, such as mountains, bodies of water, deserts, etc. Structural barriers are devices such as fences, gates, bollards, and facility walls.  The perimeter security controls are the first line of defense and are usually located as far as possible from the main buildings. They should delay an intruder long enough for security personnel to react appropriately.

51 Perimeter and Building Grounds Boundary Protection
Landscaping Shrubs or trees can provide a barrier or an entry point. Spiny shrubs make it harder for an intruder to cross the barrier.

52 Perimeter and Building Grounds Boundary Protection
Fences Are used to enclose security areas and designate property boundaries. Should meet specific gauge and fabric specifications. High-security areas may need a “top guard” (barb wire at the top). Should meet certain height and location provisions.

53 Perimeter and Building Grounds Boundary Protection
Fences Fences must be checked and repaired on a regular basis. Fence fabric must be securely attached to poles. Be sure that vegetation or adjacent structures cannot provide a “bridge” over the fence. Fence heights: ·       1 Meter/3-4 Feet – will deter casual trespassers. ·       2 Meters/6-7 Feet – it is too high to climb easily. ·       2-4 Meters/8 Feet – it will delay the determined intruder. “Top Guard” is barbed wire or concertina wire at the top of the fence that will add 2-3 feet, and will deter access by severely cutting the intruder. A blanket, or mattress, however, can be used by attackers to alleviate this threat. Fencing must be checked and repaired on a regular basis. It is important to check for fence fabric that is not properly attached to the support poles. Erosion of the ground under the fence often results in gaps or washouts that may permit someone to crawl under the fence. Another issue is controlling the vegetation that grows close to the fence.

54 Perimeter and Building Grounds Boundary Protection
Gates The portions of a wall or fence system that control entrance and/or egress by persons or vehicles and complete the perimeter of the defined area. Gates Discussion Point: Does anyone work in a building that has a vehicular gate? Who controls the gate? Automated or Person controlled? “Entrapment” - the ability to sense someone or something that may be caught in the gate. Note that this is a different use of entrapment from that in the legal section.

55 Perimeter and Building Grounds Boundary Protection
Bollards A rising post designed for use in traffic control and protecting property premises. Provides security against vehicles ramming into, or stopping near buildings. Lighted bollards can be used for lighting controls along parks, paths, sidewalks, etc.

56 Perimeter and Building Grounds Boundary Protection Subtopics
Perimeter Intrusion Detection Systems Sensors that detect access into an area Surveillance Devices Closed-Circuit Television (CCTV)

57 Perimeter and Building Grounds Boundary Protection
Perimeter Intrusion Detection Systems Photoelectric Ultrasonic Microwave Passive infrared (PIR) Pressure-Sensitive Sensors can be installed as perimeter and building ground devices to detect unauthorized access into an area. Perimeter sensors include those that can detect intrusion across or under a land boundary or through a physical barrier, such as a chain link fence. Some of these use sound and pressure to detect motion, and many of them can be used to trigger lighting around your perimeters. The problem with some of these is that they can be triggered by non-adversarial activities, such as animals, wind, etc. The section on Building Entry Points provides more details on sensor systems. Note that these types of perimeter intrusion detection systems can also be used for ‘inside of the perimeter’ protection, and we will see them again later when we talk about inside of the building protection. Characteristics of different space protection/intrusion detection devices: Photoelectric - Active Infrared beam(s) that trigger an alarm when the beam is broken Ultrasonic - Ultrasound energy bounced of the floors, walls, objects. The receiver detects “foreign” signal change caused by intruder and sounds the alarm Microwave - Receiver diode picks up transmitted and “bounced” energy waves in an enclosure. Intruder disrupts the waves and activates the alarm Passive infrared - where objects radiate IR with the heat of their bodies. Detector notes change and triggers an alarm . Capacitance - as two conducting bodies approach each other, they build capacitance. As bodies (people, animals) approach metal plates, this increase in capacitance can be measured. Capacitance proximity detection systems can be very precisely tuned in regard to both proximity and size of body detected.

58 Perimeter and Building Grounds Boundary Protection
Closed Circuit Television (CCTV) A television transmission system that uses cameras to transmit pictures by a transmission medium to connected monitors. The transmission media can use wired or wireless technologies. Important considerations for CCTV cameras are blindspots, motion detection system, and workplace privacy. Note the possibility of having ‘virtual’ CCTV systems; fake systems that are installed as a deterrent controls.

59 Perimeter and Building Grounds Boundary Protection
CCTV Levels Detection - the ability to detect the presence of an object. Recognition - the ability to determine the type of object. Identification - the ability to determine the object details. In order to be effective, the CCTV system must meet these three requirements. Detect - see movement in the camera view Recognize – the view must be clear enough to recognize the movement Identify – determine what the movement is

60 Perimeter and Building Grounds Boundary Protection
CCTV - 3 Main Components Camera (e.g., Fixed or Zoom) Transmission Media (e.g., coaxial cable, fiber optic cable, or wireless) Monitor The three main components are the camera, transmission media, and monitor. The camera design and lens capabilities are the key components for successfully capturing movement. The transmission media, such as cabling, is used to transmit the camera images to the display monitor. The camera lens is one of the most important components of the camera. CCTV - Camera Lens Fixed - provides only one field of view image. Zoom - allows the user to change the field of view without changing the lens. Change can be done manually or with a motorized remote control. Automatic iris - a device in the lens that self-adjusts optically to light level changes via the video signal from the camera.   CCTV Transmission Media Wired: Coaxial Cable or Fiber Optic Cable Wireless: Microwave, Radio, Optical, Infrared CCTV Display Monitors Several different standards National Television Systems Committee (NTSC) specifies 525 horizontal lines of interlace scanning at 30 frames per second. NTSC is used in the United States and Japan Phase Alternative Line (PAL) and Sequential Color and Memory (SECAM) specify 625 horizontal lines of interlace scanning at 25 frames per second PAL is used in Europe, Australia, parts of Africa, and the Middle East. SECAM is used in Saudi Arabia, USSR, and France.

61 Perimeter and Building Grounds Boundary Protection
CCTV - Other Equipment Camera Tube Pan and Tilt Units Panning Device Mountings Switchers/Multiplexers Remote Camera Controls Infrared Illuminators Time/Date Generators Videotape or Digital Recorders Motion Detectors Computer Controls

62 Perimeter and Building Grounds Boundary Protection
CCTV - Key Success Items Understand the facilities total surveillance requirements. Determine the size of the area to be monitored - depth, height, and width - to know what size camera lens is needed. Lighting is important - different lamps and lighting provide various levels of effectiveness. ‘Contrast’ between the object and background

63 Perimeter and Building Grounds Boundary Protection
Lighting – is the illumination of a locale, typically by artificial means such as light fixtures or lamps. A consistent level of light supplying reasonably good visibility needs to be available. Features: Good lighting is one of the most successful crime preventive measures. When used properly, light discourages unlawful activity, improves natural observation, and decreases fear. Typically used with other controls, such as fences, patrols, alarm systems. For maximum effectiveness, lighting should be used with other controls, such as fences, patrols, or alarms. Lighting should allow security personnel to observe activities around or inside a facility without disclosing their presence. The objectives are to discourage or deter entry attempts by intruders and to make detection likely if unauthorized entry is attempted. It can be is used along fence perimeters, building faces, entrances, or other structures, such as docks, parking areas, etc.

64 Perimeter and Building Grounds Boundary Protection
Types of Lighting Continuous lighting Glare projection lighting Flood lighting Trip lighting Standby lighting Emergency lighting There are several common types of protective lighting systems: ·        Continuous lighting is the most common and consists of a series of fixed luminaries arranged to flood a given area continuously during hours of darkness. This includes glare projection lighting where the glare of lights is directed across the surrounding territory. Flood lighting uses luminaries that project their output in a forward direction (i.e., not up, down, sideways, or backward). Another type of continuous lighting is called controlled lighting. It is used where the width of the lighted area outside the perimeter must be controlled. ·        Trip lighting is activated by some trigger point, such as an intruder crossing a sensor. If the trigger point is activated, a light will shine. Note that these systems can be prone to nuisance tripping by pranksters and can also be used by intruders to create several false alarms that cause the security team to respond to various entry points. Since not every point could be monitored, an intruder may be able to gain access. ·        Standby lighting is similar to continuous lighting. The difference is that the luminaries are not continuously lit, but are either automatically or manually turned on when suspicious activity is suspected. Since incandescent lights can go out, standby lighting can provide a significant backup resource. ·        Emergency lighting is used for limited times of power failures or other emergencies that render the normal system inoperative. Fresnel lens - a thin optical lens of many concentric rings having the properties of a much thicker & heavier lens: used in cameras, lighthouse beacons, etc. In a really secure facility with high walls/fencing and guard towers a search light might be appropriate at the guard towers (e.g., prison yard, nuclear facility). Critical areas around buildings - install lighting at least 8 feet (2.4 meters) high & with illumination of 2 foot candles (lumens). (NIST specification).

65 Layered Defense Model Subtopics
Perimeter and Building Grounds Building Entry Points Inside the Building -- Building Floors/Office Suites Data Centers or Server Room Security Computer Equipment Protection Object Protection

66 Building Entry Point Protection
Locks Most accepted and used physical security device Considered delay devices and not foolproof bars to entry - they are easily defeated All lock types are subject to force and special tools that can be used to gain entry Should be just one aspect of many physical security controls They keep honest people out, but for unauthorized people who wish to gain access, locks are easily picked and keys can be readily duplicated.

67 Building Entry Point Protection
Lock Components Lock Body (Cylinder) Bolt Strike Key The lock body is the metal casing that encloses the cylinder and holds the protruding bolt that actually fastens the door. The strike and strike plate form a separate rectangular metal piece that is inserted into the door jam. The strike plate contains the strike that is the slot to receive the matching bolt attached to the lock body. The key matches the tumblers in the lock’s cylinder and releases them from the locked position. The cylinder accepts the key and causes the bolt to move in or out of its receptacle in the strike.

68 Building Entry Point Protection
Lock Types Combination Locks Uses a sequence of numbers in a specific order Deadbolt Locks A separate bolt not operated by the primary door handle is inserted into the frame of the door for added security. Combination locks Using a sequence of numbers in a specific order opens a combination lock. The lock contains wheels and a dial-face. The more wheels the better the protection; those with four or more wheels offer higher penetration resistance. Those with three or less wheels can be opened by listening to the sound of the wheels and by the feel of the dial. Deadbolt Locks A bolt is inserted into the frame of the door for added security. To be most effective, the bolt of the latch should be applied so the bolt slides into the door-casing frame or into a keeper firmly attached to the doorframe.

69 Building Entry Point Protection
Lock Types Keyless Locks Push-button (cipher) locks have buttons that are pushed in sequence to open the locks. Smart Locks Permit only authorized people into certain doors at certain times. An example is a magnetic stripe card that is time-sensitive. Keyless Locks Push button locks have buttons that are pushed in sequence to open the lock. Digital push-button locks are sometimes called cipher locks (Simplex is a brand name and is often used to describe push-button locks). The advantage to push-button locks is that there are no key control issues. The disadvantages are that the combination must be remembered, someone may be able to watch the input of the combination, the buttons for the code always show more wear than the unused buttons, and the combination code must be changed periodically.  Smart Locks Smart locks are designed to permit only authorized people into certain doors, at certain times. An example is the key system used in some hotels. The key is a plastic card that is programmed at a central computer to permit the guest access to a specific door.  Another type of smart lock is the combination keypad-electronic deadbolt. It replaces the deadbolt in the door to provide keyless entry. To lock the door, simply touch the lock button on the keypad, and the deadbolt slides into place. To unlock the door, enter the combination, and the deadbolt slides into the unlocked position. An alarm can be added that will activate after consecutive incorrect codes are entered. Cipher Lock Considerations: Keypad Options & Features Master-keying Supervisory access & code changing Key-override Emergency/supervisory use Door delay Time door held open before alarm Remote indication Guard station indication of open door Visitor’s call button to request entry “Hostage” alarm for safety-related emergencies Weatherproof units

70 Building Entry Point Protection
Locks Lock Picking Picks Tension wrench Locks are “pick-resistant,” not “pickproof” Basic picking tools are the tension wrench and the pick. The tension wrench imparts a rotary motion to the key plug of the lock and aids in finding the locking tumblers of the lock. The pick is used to move the binding tumblers, one at a time, to the shear line. When all tumblers are aligned properly with the shear line, the lock opens.

71 Building Entry Point Protection
Locks - Security Measures Lock and key control system Key control procedures must be documented and followed Procedures for issue, sign out, inventory, destruction, and lost keys Combinations must be changed at specified times and under specified circumstances. Lock Security Measures Appropriate usage of locks and keys is dependent upon effective controls. A lock and key control system is critical. Proper procedure for key controls should be implemented and documented. Accurate records must be maintained to include: - who has access to keys - who the keys are issued to - key inventory (sign out, destruction) Procedures to deal with lost keys must be established. Changing combinations must occur at specific times or under specific circumstances. I.e - When to change a safe lock: - every twelve months - when possibly compromised - when a facility member who knows the combination leaves

72 Building Entry Point Protection
Guard Stations Security forces (guards) can provide a deterrence to unauthorized entry. In some cases, may also prevent unauthorized entry. Guard Stations A guard station is a specially constructed enclosure that is usually manned 24 hours per day, seven days a week. They are equipped to monitor the security of the facility through TV monitors, alarm systems, intercoms, automatic photographing of persons entering the facility, radio police scanners tuned to emergency channels, and radio devices such as walkie-talkies for emergency communications. If in a high threat environment, they are constructed with bulletproof walls, doors, or windows. Ensure clear sight lines and access to main doors, etc.  Guards, or some type of security force, can provide a deterrence and a flexible security and safety response in the event of an unauthorized intrusion. Questions to consider when deciding on a security force are: ·        Is hiring or contracting more cost-effective? ·        Are the guards certified or licensed? ·        Should the guards be armed or unarmed? ·        Are there union considerations?

73 Building Entry Point Protection
Card Access Controls or Biometric Systems Smart cards, Magnetic Stripe cards, Proximity Cards, etc. Fingerprint, retina scans, signature dynamics, voice recognition, hand geometry, etc.

74 Layered Defense Model Subtopics
Perimeter and Building Grounds Building Entry Points Inside the Building -- Building Floors/Office Suites Data Centers or Server Room Security Computer Equipment Protection Object Protection We are looking at physical security from a ‘layered approach’. Now, on to the next ‘layer’.

75 Inside the Building - Building Floors, Office Suites, Offices
Compartmentalized Areas Support System Controls Fire Protection Intrusion Detection Systems This is a subtopic slide for the controls inside the Building. The next few slides will cover these in more detail.

76 Inside the Building - Building Floors, Office Suites, Offices
Compartmentalized Areas Defines a location where sensitive equipment is stored and where sensitive information is processed. Must have a higher level of security controls. To be effective, they need an appropriate access control system. A compartmentalized area defines an actual location where sensitive equipment and information is operated and stored. It includes establishing restricted zones where only sensitive or classified information may be processed or stored.

77 Inside the Building - Building Floors, Office Suites, Offices
Intrusion Detection Systems Can be installed on: Windows, Doors, Ceilings, Walls, or Any other entry points such as ventilation openings or air conditioning openings. The obvious places for an intrusion detection system are the entry points such as doors and windows. However, it is wise to consider ventilation openings, construction openings, or air conditioning openings.

78 Inside the Building - Building Floors, Office Suites, Offices
Intrusion Detection Systems Detect a change in: Electrical circuits Light beams Sounds Vibrations Motion Capacitance due to penetration of an electrostatic field Characteristics of different space protection/intrusion detection devices: Photoelectric - Active Infrared beam(s) that trigger an alarm when the beam is broken Ultrasonic - Ultrasound energy bounced of the floors, walls, objects. The receiver detects “foreign” signal change caused by intruder and sounds the alarm Microwave - Receiver diode picks up transmitted and “bounced” energy waves in an enclosure. Intruder disrupts the waves and activates the alarm Passive infrared - where objects radiate IR with the heat of their bodies. Detector notes change and triggers an alarm . Capacitance - as two conducting bodies approach each other, they build capacitance. As bodies (people, animals) approach metal plates, this increase in capacitance can be measured. Capacitance proximity detection systems can be very precisely tuned in regard to both proximity and size of body detected.

79 Layered Defense Model Subtopics
Perimeter and Building Grounds Building Entry Points Inside the Building -- Building Floors/Office Suites Data Centers or Server Room Security Computer Equipment Protection Object Protection Next ‘layer’ is covered now.

80 Data Center or Server Room Security
Walls To the extent possible, walls should not form part of an external building. Walls should extend from the floor to the underside of the above floor slab (slab to slab). Besides intrusion deterrence, Slab-to-slab walls also provide fire protection by preventing the rapid spread of fire. Should be made of fire-resistant materials.

81 Data Center or Server Room Security
Access Controls Depending on the sensitivity of the information, and value of the equipment, electronic access controls may need to be installed Smart Cards Biometric Devices Locks

82 Layered Defense Model Subtopics
Perimeter and Building Grounds Building Entry Points Inside the Building -- Building Floors/Office Suites Data Centers or Server Room Security Computer Equipment Protection Object Protection Next ‘layer’ of our layered approach to physical security.

83 Computer Equipment Protections
Portable Device Security Involves protecting the device, protecting the data on the device, and keeping the security controls easy for the user.

84 Computer Equipment Protections
Portable device security includes items such as: Locking mechanisms for docking stations Tracing software Audible motion alarm Encryption software Constant control procedures Inventory system Anti-virus software These are just a few of the portable security mechanisms. It seems that every month there are new mechanisms to help protect portables. Constant control procedure is referring to such things as policies and procedures, and overall good laptop security controls. 

85 Layered Defense Model Subtopics
Perimeter and Building Grounds Building Entry Points Inside the Building -- Building Floors/Office Suites Data Centers or Server Room Security Computer Equipment Protection Object Protection Next ‘layer’ in our ‘layered’ approach to physical security.

86 Object Protection Objects are placed inside security containers such as safes, vaults, or locking file cabinets. Should be theft-resistant and fire-resistant. Steel containers with a locking device. Create good lock combinations, change them frequently, and monitor the distribution. A good lock combination is something that is not easy to guess.

87 Quick Quiz What is closed circuit television?
What are examples of building entry point protection? What are some of the key controls for data center or server room security? Explore: Instructor should use these questions to drive general discussion. Don’t directly give the answers, only curb responses that are clearly incorrect. Try to see what responses the participants can provide. The section summary on the following page answers these questions directly.

88 Section Summary Closed circuit television is a television transmission system that uses cameras to transmit pictures by a transmission medium to connected monitors. Doors, windows, locks, guard stations, card access controls, and biometric systems are examples of building entry point protection. Walls, doors, support systems, and access controls are some of the key controls for data center or server room security.

89 Questions?


Download ppt "Physical Security."

Similar presentations


Ads by Google