Physical Security Concerns for LAN Management By: Derek McQuillen.

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

Chapter 7: Physical & Environmental Security
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Baltic High School Classroom Connections Presentation.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Security: Playing in Safe By: Matt Hill Identification and Access Identification and Access | When Disaster Strikes | Disaster Recovery Plan | Software.
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Introduction Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey.
Principles of Information Technology
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Computer Networks IGCSE ICT Section 4.
And how they are used. Hubs send data to all of the devices that are plugged into them. They have no ability to send packets to the correct ports. Cost~$35.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Security Equipment Equipment for preventing unauthorised access to data & information.
Data Security GCSE ICT.
The Impact of Physical Security on Network Security
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Types of Computers Desktop / Laptop PC / Mac Client / Server.
WHAT Exam Practice WHY All MUST Most SHOULD Some COULD Be able to understand the requirements of the exam to achieve a grade D Be able to understand the.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
LTEC 4560 Summer 2012 Justin Kappel Networking Components.
Understanding Security Layers
With Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Windows 7.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
Security and backups GCSE ICT.
COMPUTER CARE & MAINTENANCE. Protecting Your Computer From Damage Like any kind of equipment, your computer requires care and maintenance to run smoothly.
IT Infrastructure Chap 1: Definition
Chapter X When can I consider my personal data secure?
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Royal Latin School. Spec Coverage: a) Explain the advantages of networking stand-alone computers into a local area network e) Describe the differences.
© CCI Learning Solutions Inc. 1 Lesson 5: Basic Troubleshooting Techniques Computer performance Care of the computer Working with hardware Basic maintenance.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Physical Site Security.  Personnel  Hardware  Programs  Networks  Data  Protection from:  Fire  Natural disasters  Burglary / Theft  Vandalism.
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
Firewall firewalls Is a program on your computer to protect your computer from all types of threats and if you have a server and you wasn’t to protect.
Security fundamentals Topic 11 Maintaining operational security.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.
Physical Security Katie Parker and Robert Tribbia Katie Parker and Robert Tribbia Computer Security Computer Security Fall 2008 Fall 2008.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
Introduction TO Network Administration
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
Physical security By Ola Abd el-latif Abbass Hassan.
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
Access Control Jeff Wicklund Computer Security Fall 2013.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
An Introduction to Local Area Networks An Overview of Peer-to-Peer and Server-Based Models.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Network Management Chapter 8 Semester 3 By Roger Lewis.
WHAT IS A NETWORK TYPES OF NETWORK NETWORK HARDWARE
Networks 1 Key Revision Points.
UNIT 19 Data Security 2.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Operating Systems What are they and why do we need them?
Level 2 Diploma Unit 11 IT Security
Security of Data  
G061 - Network Security.
Principles of Information Technology
Presentation transcript:

Physical Security Concerns for LAN Management By: Derek McQuillen

Physical Concerns Choosing the correct site for constructing the LAN Choosing the correct site for constructing the LAN External Security External Security Internal Security Internal Security Weather or Natural Disasters Weather or Natural Disasters Is it Real? Is it Real? 6 steps everyone company should take to keep their network protected 6 steps everyone company should take to keep their network protected

What is a LAN? Local Area Network Local Area Network Network that covers a small area: Network that covers a small area: –Such as a small office, school, or home network Can serve anywhere from 2 to 1000 users Can serve anywhere from 2 to 1000 users

Choosing a Site Must have the correct utilities to begin the setup, such as electricity Must have the correct utilities to begin the setup, such as electricity Keep away from high risk areas where natural disasters occur Keep away from high risk areas where natural disasters occur Must be built in freestanding building not to close to other buildings or high traffic areas Must be built in freestanding building not to close to other buildings or high traffic areas Keep away from dry or fire hazardous areas Keep away from dry or fire hazardous areas

Choosing a Site (Ideal Distance Requirements) The building must be at least: The building must be at least: –10 miles from any nuclear power plant –2 miles from highway or railroad –5 miles from any military base –5 miles from any police station or fire station

Construction Barriers around the sites perimeters Barriers around the sites perimeters Fire Rated walls around perimeter Fire Rated walls around perimeter Keep server room in the center of the building with higher walls Keep server room in the center of the building with higher walls –So signal is difficult to get out Keep all other equipment away from the servers: Keep all other equipment away from the servers: –In case an outside source needs to come in to repair something they can not gain access to the private information

External Security There are many layers of security when it comes to external security There are many layers of security when it comes to external security –Outside Alarm –Surveillance Cameras –Invisible electromagnetic field around sensor cables –Keep staff and visitor parking away from delivery areas

External Security Keep guards on duty at all times Keep guards on duty at all times Fingerprint Identification Readers Fingerprint Identification Readers –This prevents ID cards or Pin numbers for gaining access from being lost or stolen

Internal Security Man guard watching server room at all times Man guard watching server room at all times Heat and smoke detectors installed all though out the building Heat and smoke detectors installed all though out the building Cooling system to keep all electronic devices from overheating and causing damage Cooling system to keep all electronic devices from overheating and causing damage

Weather Every network needs to have a Uninterruptible Power Supply (UPS) Every network needs to have a Uninterruptible Power Supply (UPS) –In case the power goes out or any other weather related incident would occur Also, back up generators also should be purchased by all company’s Also, back up generators also should be purchased by all company’s –Same reasons as above

Is It Real? The previous slides show the most ideal ways to set up a network and keep it from being intruded. The previous slides show the most ideal ways to set up a network and keep it from being intruded. This would be outrageously expensive and almost impossible for a company to afford. This would be outrageously expensive and almost impossible for a company to afford. So depending on the financial situation, companies can pick and chose the security features they think are important. So depending on the financial situation, companies can pick and chose the security features they think are important.

Six steps everyone company should take to keep their network protected Lock the server room Lock the server room Use rack mount servers Use rack mount servers Protect your printers Protect your printers Disable the drives Disable the drives Pack up the backups Pack up the backups Don’t forget the workstations Don’t forget the workstations

Lock the server room The server room is the main component of the physical security of the network The server room is the main component of the physical security of the network If access is gained to servers, routers, hubs, or switch the entire company is now in danger. If access is gained to servers, routers, hubs, or switch the entire company is now in danger. So, when no one is in the area make sure a make sure the door is always locked. So, when no one is in the area make sure a make sure the door is always locked. The best way to do this is to make the door lock no matter what when it shuts and a code or fingerprint access must be used to enter. The best way to do this is to make the door lock no matter what when it shuts and a code or fingerprint access must be used to enter.

Use rack mount servers Take up less room and are easier to secure Take up less room and are easier to secure Easily locked into closed racks Easily locked into closed racks Can be bolted to the floor Can be bolted to the floor –Making the unit nearly impossible to move

Protect your printers Today’s printers store document contents in their own on-board memories Today’s printers store document contents in their own on-board memories Recently printed documents can be accessed then Recently printed documents can be accessed then Again, keep bolted to the ground Again, keep bolted to the ground If extra copies are printed If extra copies are printed –Do not just throw in the trash can  No one knows who can get a hold of the trash

Disable the drives Disable or remove floppy disks, USB, or other external drives Disable or remove floppy disks, USB, or other external drives Another way to disable the drives is to use a type of hardware called Disklock. Another way to disable the drives is to use a type of hardware called Disklock. –This is a piece that slides into the drive that can be locked in with a key and is not able to be removed without the key.

Pack up the backups Keep all tapes or discs from the servers locked away in a safe place, not just laying around next to the servers Keep all tapes or discs from the servers locked away in a safe place, not just laying around next to the servers Don’t use flash drives, floppy disks, or external hard drives for backing up files because they are easily lost or stolen Don’t use flash drives, floppy disks, or external hard drives for backing up files because they are easily lost or stolen

Don’t forget the workstations Disconnect computers that aren’t being used Disconnect computers that aren’t being used Equip computers that must remain in open areas with smart card so that it’s difficult for unauthorized persons to log on Equip computers that must remain in open areas with smart card so that it’s difficult for unauthorized persons to log on Keep cases closed so hard drives or other hardware can’t be stolen Keep cases closed so hard drives or other hardware can’t be stolen

Reminder Network security starts at the physical layer. Network security starts at the physical layer. If physical access is gained all the firewalls and software programs mean absolutely nothing. If physical access is gained all the firewalls and software programs mean absolutely nothing.