Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 13 – Physical and.

Slides:



Advertisements
Similar presentations
YOUR HOST!YOUR HOST!YOUR HOST!YOUR HOST! HOSTSHOSTSHOSTSHOSTS NAMENAMENAMENAME.
Advertisements

Museum Presentation Intermuseum Conservation Association.
1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA.
Chapter 7: Physical & Environmental Security
Preparing for Power Outages Like any other part of the infrastructure, electrical power to the campus can fail, either as an isolated incident (e.g., tripped.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Facilitating a Dialog between the NSDI and Utility Companies J. Peter Gomez Manager, Information Requirements, Xcel Energy.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
9 - 1 Computer-Based Information Systems Control.
Introduction to Disasters Daniel Kollek, MD, CCFP(EM) Director, Centre for Excellence in Emergency Preparedness Associate Professor, Division of Emergency.
Physical and Environmental Security Chapter 5 Part 1 Pages 427 to 456.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Physical (Environmental) Security.
Security+ Guide to Network Security Fundamentals
11/10/09 1 TEL382 Wallace Chapter 7. 11/10/09 2 Outline Electrical Service Risk Assessment Your Building’s Power System Building Power Protection Strategy.
Stephen S. Yau CSE 465 & CSE591, Fall Physical Security for Information Systems.
Introduction Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey.
Information Security Principles and Practices
Pertemuan 20 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 16: Physical and Infrastructure Security.
Computer Security: Principles and Practice
Physical Security Chapter 9.
Session 3 – Information Security Policies
Chapter 3.  Security Framework  Operational Security Lifecycle  Security Perimeter  Access Control  Social Engineering  Environmental Issues.
Chapter 8: Disaster Management
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Physical Security.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Continuity Planning & Disaster Recovery ( BRPASW Workshop)
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
Session 16: Distribution of Geospatial Data 1 Distribution of Geospatial Data in the Public Environment Hazard Mapping and Modeling.
Module 02: 1 Introduction to Computer Security and Information Assurance Objectives Recognize that physical security and cyber security are related Recognize.
Understanding Security Layers
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Physical Security By: Christian Hudson. Overview Definition and importance Components Layers Physical Security Briefs Zones Implementation.
Physical Security “Least sexy of the 10 domains but the best firewall in the world will not stand up to a well placed brick.”
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 1 – Overview.
By Srosh Abdali.  Disaster recovery is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure.
Preparing for Disasters General Liability. Introduction  The one coverage that provides you and your business the most protection is General Liability.
1 Crisis Management / Emergency Management Overview.
Information Systems Security Operational Control for Information Security.
Information Systems Security Operations Security Domain #9.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 16 “Physical and Infrastructure.
Ensuring Network Security Making Networks Secure Maintaining a Healthy Network Environment Avoiding Data Loss 1.
Physical Security and Contingency Planning CS432 - Security in Computing Copyright © 2008 by Scott Orr and the Trustees of Indiana University.
Physical (Environmental) Security
Viewing Information Systems Security. The basic objectives of Information Security are the same as the basic objectives of EDP auditing. They are: 1.To.
Introduction to Information Security
Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1.
Chap1: Is there a Security Problem in Computing?.
IS3220 Information Technology Infrastructure Security
Disaster Preparedness Are you prepared?. Effective Disaster Plans  Your plan should outline the basic preparedness steps needed to handle the anticipated.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
World War I Veteran’s Camp in 1934, Lower Matecumbe Key (Islamorada area)
Module 8 Risk Management. Manager, Customer Services Module 8Slide - 2 Objective The learner will be able to: –Develop an understanding of Security Responsibility.
Information Security Management Goes Global
Cybersecurity: Risk Management
Information Systems Security
CompTIA Security+ Study Guide (SY0-401)
Information Security, Theory and Practice.
Risk management.
NETW4005 COMPUTER SECURITY A
Understanding Security Layers
Physical and Infrastructure Security
Objectives Telecommunications and Network Physical and Personnel
Physical Security.
Principles and Practice
Presentation transcript:

Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 13 – Physical and Infrastructure Security

Physical and Infrastructure Security  now consider physical / premises security  three elements of info system security: logical security - protect computer data logical security - protect computer data physical security - protect systems & access physical security - protect systems & access premises security - protect people / property premises security - protect people / property

Physical Security  protect physical assets that support the storage and processing of information  involves two complementary requirements: prevent damage to physical infrastructure prevent damage to physical infrastructure information system hardwareinformation system hardware physical facilityphysical facility supporting facilitiessupporting facilities personnelpersonnel prevent physical infrastructure misuse leading to misuse / damage of protected information prevent physical infrastructure misuse leading to misuse / damage of protected information

Physical Security Context

Physical Security Threats  look at physical situations / occurrences that threaten information systems: environmental threats (incl. natural disasters) environmental threats (incl. natural disasters) technical threats technical threats human-caused threats human-caused threats  first consider natural disasters

Natural Disasters  tornado  hurricane  earthquake  ice storm / blizzard  lightning  flood

Environmental Threats  inappropriate temperature and humidity  fire and smoke  water  chemical, radiological, biological hazards  dust  infestation

Technical Threats  electrical power is essential to run equipment power utility problems: power utility problems: under-voltage - dips/brownouts/outages, interrupt serviceunder-voltage - dips/brownouts/outages, interrupt service over-voltage - surges/faults/lightening, can destroy chipsover-voltage - surges/faults/lightening, can destroy chips noise - on power lines, may interfere with device operationnoise - on power lines, may interfere with device operation  electromagnetic interference (EMI) from line noise, motors, fans, heavy equipment, other computers, nearby radio stations & microwave relays from line noise, motors, fans, heavy equipment, other computers, nearby radio stations & microwave relays can cause intermittent problems with computers can cause intermittent problems with computers

Human-Caused Threats  less predictable, may be targeted, harder to deal with  include: unauthorized physical access unauthorized physical access leading to other threatsleading to other threats theft of equipment / data theft of equipment / data vandalism of equipment / data vandalism of equipment / data misuse of resources misuse of resources

Mitigation Measures Environmental Threats  inappropriate temperature and humidity environmental control equipment, power environmental control equipment, power  fire and smoke alarms, preventative measures, fire mitigation alarms, preventative measures, fire mitigation smoke detectors, no smoking smoke detectors, no smoking  water manage lines, equipment location, cutoff sensors manage lines, equipment location, cutoff sensors  other threats appropriate technical counter-measures, limit dust entry, pest control appropriate technical counter-measures, limit dust entry, pest control

Mitigation Measures Technical Threats  electrical power for critical equipment use use uninterruptible power supply (UPS) use uninterruptible power supply (UPS) emergency power generator emergency power generator  electromagnetic interference (EMI) filters and shielding filters and shielding

Mitigation Measures Human-Caused Threats  physical access control IT equipment, wiring, power, comms, media IT equipment, wiring, power, comms, media  have a spectrum of approaches restrict building access, locked area, secured, power switch secured, tracking device restrict building access, locked area, secured, power switch secured, tracking device  also need intruder sensors / alarms

Recovery from Physical Security Breaches  redundancy to provide recovery from loss of data to provide recovery from loss of data ideally off-site, updated as often as feasible ideally off-site, updated as often as feasible can use batch encrypted remote backup can use batch encrypted remote backup extreme is remote hot-site with live data extreme is remote hot-site with live data  physical equipment damage recovery depends on nature of damage and cleanup depends on nature of damage and cleanup may need disaster recovery specialists may need disaster recovery specialists

Threat Assessment 1. set up a steering committee 2. obtain information and assistance 3. identify all possible threats 4. determine the likelihood of each threat 5. approximate the direct costs 6. consider cascading costs 7. prioritize the threats 8. complete the threat assessment report

Planning and Implementation  after assessment then develop a plan for threat prevention, mitigation, recovery  typical steps: 1. assess internal and external resources 2. identify challenges and prioritize activities 3. develop a plan 4. implement the plan

Example Policy

Physical / Logical Security Integration  have many detection / prevention devices  more effective if have central control  hence desire to integrate physical and logical security, esp access control  need standards in this area FIPS “Personal Identity Verification (PIV) of Federal Employees and Contractors” FIPS “Personal Identity Verification (PIV) of Federal Employees and Contractors”

Personal Identity Verification

PIV Convergence

Summary  introduced physical security issues  threats: environmental,technical, human  mitigation measures and recovery  assessment, planning, implementation  physical / logical security integration