Physical Security By Nathan Conroy COSC 316-002. Outline Purpose of physical security Two types of physical security Different types of security devices.

Slides:



Advertisements
Similar presentations
CLOSED CIRCUIT TELEVISION (CCTV) SURVEILLANCE SYSTEMS
Advertisements

PRESENTED BY: FATIMA ALSALEH Credit Cards Fraud - skimmers -
Computer Security Computer Security is defined as:
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
EMI Systems Limited specializes in CCTV surveillance systems that ranges from stand-alone cameras to fully integrated security control centers and to the.
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Security: Playing in Safe By: Matt Hill Identification and Access Identification and Access | When Disaster Strikes | Disaster Recovery Plan | Software.
Microsoft Technology Associate
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Bus. Computer Applications Supervised by: t. Ahmed Abu msameh Prepared by Mohammed fathi al – amawi ID : CCTV systems.
Administrative Practices Outcome 1
Karthiknathan Srinivasan Sanchit Aggarwal
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Security Equipment Equipment for preventing unauthorised access to data & information.
Physical Security SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
The Impact of Physical Security on Network Security
MINISTRY OF SOCIAL AFFAIRS AND HEALTH 1 Introduction to corporate security Teemupekka Virtanen Helsinki University of Technology Telecommunication Software.
Neuromuscular Engineering 11 Neuromuscular Engineering & Technology BioMetrics SECURE AREA VETTING AND ACCESS CONTROL.
Understanding Security Layers
Introduction to Information Technology: Your Digital World © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Using Information Technology, 10e©
CCTV AND IT’S FUTURE SAMPLEPRESENTATION CCTV What are we doing with CCTV? What will CCTV be like in 10 Years? How about tomorrow?
BUSINESS B1 Information Security.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Information about Biometrics and its security By Ridham Bhatt.
Input By Hollee Smalley. What is Input? Input is any data or instructions entered into the memory of a computer.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Security Issues and Strategies Chapter 8 – Computers: Understanding Technology (Third edition)
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Biometrics.
By: Ash, Jess, Natasha, Eslie.  Prevent customers from using fraud identity (false tickets) when being admitted into the theme park.
Network Security & Accounting
PARTNERING for your INTERESTS Companies invest in security to protect their people, property and information. In doing so, they are also protecting the.
Biometric Technologies
Prevent Data Breaches and PII from Walking Out the Door Jim Farrell, Senior Vice President Products Archive Systems 9/18/2015.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Surveillance For IB-1 ITGS By Indrani.  Surveillance is the use of IT to monitor the actions of people.  For example, monitoring may be used to track,
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Physical security By Ola Abd el-latif Abbass Hassan.
CHAPTER 18 TECHNOLOGY ADVANCEMENTS IN THE WORKPLACE.
Unit 32 – Networked Systems Security
Physical Security Concerns for LAN Management By: Derek McQuillen.
Access Control Jeff Wicklund Computer Security Fall 2013.
Access Control for Security Management BY: CONNOR TYGER.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from.
An Introduction to Biometrics
Access control Presented by: Pius T. S. : Christian C. : Gabes K. : Ismael I. H. : Paulus N.
3D Password.
NETWORK VIDEO SURVEILLANCE. CCTV Closed-Circuit Television (CCTV) is the use of video cameras to transmit signal to a specific place on a designated device.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
Unit 1: Protecting the Facility (Virtual Machines)
LOGO Electronics security ING. El Kalamouni Samer.
Commercial CCTV Systems – Recording your Business.
Onsite CRM Security
Challenge/Response Authentication
Nexbase Invites You To Our Special Products
Administrative Practices Outcome 1
Understanding Security Layers
Biometric Security Fujitsu Palm Vein Technology
Major Difference between CCTV and Surveillance. As we know CCTV and Surveillance Camera both are majorly use as security purpose, but most of us doesn’t.
Security of Data  
Managing the IT Function
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Presentation transcript:

Physical Security By Nathan Conroy COSC

Outline Purpose of physical security Two types of physical security Different types of security devices Layers of security Conclusion

Purpose Preventing and protecting against physical intrusions Virtual security is useless if someone can just walk in and take what they want Both internal and external threats – Internal: employees physically intruding – External: anyone outside the scope of the company – Internal are typically more dangerous

Two Types of Physical Security Preventative – Meant to restrict access – Gates, locks, security guards, etc. – Also includes deterrent measures Restorative – Meant to restore status of systems if preventative measures do not work – Security cameras, access logs, etc. – Find out who did it – Mitigate damage

Two Types (cont.) Many security features can serve both purposes – ID scanners Physically prevents someone without access entrance Keeps log of who attempted to access – Security camera CCTV and IP cameras Can be used in a security room Often used in real time Can be used to view who was in a secure room at a certain time

Security Policies Policies are possibly the most important part of security – Must be strong and must be enforced – Lacking in either of these will lead to problems They are also the easiest way to protect valuable electronics if done right Only allowing IT staff access to server rooms, etc. is a good start Make employees report when their ID cards are stolen or misplaced, particularly IT staff

Security Cameras Closed-Circuit TV (CCTV) – CCTV captures and records analog video and sound – This is recorded on tapes for possible future use – Still very common in many workplaces, however... IP Cameras – Becoming much more prevalent – Transmit video and sound through the local internet – Easy to use and very mobile – Almost all can record in HD

Advantages of IP Cameras Higher quality than CCTV cameras Video can be broadcast over the internet outside of the internal network Storage is not nearly as bulky – No special tapes – But this does mean that there needs to be a secure server for video and audio protection Much easier set-up than CCTV More likely to see advances in IP cameras than in CCTV Some IP cameras allow the viewer to interact with those in the cameras view via voice

Individual IDs All companies have some sort of employee identification system Can be as simple as username and passwords for factory workers Typically an ID badge for most employees – Either a magnetic stripe card or a “proximity card” Biometric security: fingerprint, retina, iris, and voice scanners More secure areas will require multiple forms of identification

ID Badges Magnetic stripe cards require the card be run through a scanner – Most common, used on credit cards, iCards, etc. – Scanner reads the magnetic stripes Proximity cards – Can hold more data than magnetic stripe cards – Passive vs. active cards Passive: lower range, most common Active: require a battery, used in vehicles – Passive cards require a reader which is constantly emitting a signal When in range of a reader, the card will react to the signal from the reader and transmit its information

ID Badges (cont.) Badges can be customized greatly – May only grant access to certain doors – Can only access at certain hours E.g. only from 7AM to 6PM They can log when they are used – This is part of restorative security Very handy, but also easy to lose – Can be bad if they fall into the wrong hands

Fingerprint Scanning Optical – An image of the fingerprint is captured using visible light – Problem: very susceptible to damage to the scanner or a dirty fingerprint Ultrasonic – An image is created using ultrasonography Ultrasonography uses very high pitched sound waves to penetrate the initial layer of skin – The layer under the first layer will have the same pattern – Thus the fingerprint will be much more accurate since it also ignores any substances on the fingerprint

Iris Scanning Uses a camera which captures visible and infrared or near-infrared light The camera takes a high-contrast picture of your entire eye and focuses on: – Center of the pupil – Edge of the pupil – Edge of the iris – The eyelids and eyelashes The pattern in the iris is then analyzed Over 200 patterns can be analyzed, far more than a fingerprint

Layers of Physical Security Ground entrance – Gates, fences, security guards Building entrance – Generally just an employee badge Individual room entrance – ID badge, biometric scanners Individual items – Safes for backups, lock-and-keys for individual computers or servers Each one can have multiple layers within itself – E.g. a military base

Other Measures “Crime prevention through environmental design” – Designing a building to increase its security – Make all entrances well lit – Place critical infrastructure in well watched areas

Conclusion Two types of security: preventative and restorative Most security can serve both purposes Security is costly, but worth it Policies can make or break security

Sources Talbot, Julian & Jakeman, Miles (2011). Security Risk Management Body of Knowledge. John Wiley & Sons. pp. 72–73. Deutsch, William. "Increased Visibility Means Increased Security." AboutMoney. N.p., n.d. Web. 12 Nov "Natural Surveillance." County of Henrico. N.p., n.d. Web. 12 Nov "Chapter 1: Physical Security Challenges". Field Manual : Physical Security. Headquarters, United States Department of Army Jeffery, C. R. "Crime Prevention Through Environmental Design." NCJRS. N.p., Web. 12 Nov "IP Camera -vs- CCTV Security Systems PROs / CONs." EBay. N.p., 20 Feb Web. 12 Nov Norman, Thomas L. (2011). Electronic Access Control. Elsevier. pp. 57–58.