Unit 1: Protecting the Facility (Virtual Machines)

Slides:



Advertisements
Similar presentations
INTRUSION ALARM TECHNOLOGY
Advertisements

Knells Door and Hardware SINCE 1906 Electronic Access Control Presentation.
S ECURITY A LARM S YSTEM. I NTRODUCTION Security alarms are electronic alarms designed to alert the user to a specific danger. Security alarms have become.
How Electronic Security Solutions can Help the Government in Securing its Assets and Reduce Energy expenditure Presented By- Nimish Vishnoi Manager-Product.
1 INTRUSION ALARM TECHNOLOGY NOTIFICATION DEVICES.
Tel: Unique Home Security Systems Security Supplies Captures Boards Digital Video Recorders Power Line Communication Wireless Solutions.
“Why do we need Security”  Each business has unique security and safety needs, e.g. Inventory Shrinkage and Theft Personal Safety Break Ins Moving Your.
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
Deter Detect Delay Assess Respond Copyright © BES.
Remote Monitoring and Management Solutions ®
Fire Alarm System Notification Appliances
An Overview of Security Capabilities and Technology.
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Physical and Environmental Security Chapter 5 Part 1 Pages 427 to 456.
Linkage Connecting system components. Allows configuring automatic actions Triggering outputs based on specific inputs Used for removing human reliance.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Physical (Environmental) Security.
Information Security Policies and Standards
Chapter 18 Lesson Goal After completing this lesson, the student shall be able to identify indicators of an incendiary fire and protect and preserve evidence.
Microsoft Technology Associate
DUE Security and Fire Alarm Systems LEARNING OUTCOME 7B Describe design overview and location considerations.
1 INTRUSION ALARM TECHNOLOGY LOCAL VS. MONITORING.
1 © National Burglar & Fire Alarm Association Alarm User Awareness Class.
Security Devices A modern security system, with its array of electronic components, is designed to sense, decide, and act. The security system senses events.
BUILDING SECURITY ALARM SYSTEM. BUILDING SECURITY ALARM SYSTEM Any electrical or mechanical device which is designed or used for the detection of an unauthorized.
1 INTRUSION ALARM TECHNOLOGY KEYPADS (CONTROL UNITS)
Country house Control Panel Glass break detector Hooter alarm Magnetic sensor Motion detector Security light.
Activated by the control panel, it gives a loud audio signal to alert that an intrusion has occurred.
EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.
Physical Security SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Alarms and Cameras Presented by Sgt. Steve Garst, L.C.C./ C.C.P.S. Little Elm Police Department Little Elm, Texas C.P.T.E.D. The third line of defense.
Understanding Security Layers
Intrusion Detection Presentation : 1 OF n by Manish Mehta 01/24/03.
Chapter 2 What is an Alarm System? Alarms: The First Line of Defense
Physical Security By: Christian Hudson. Overview Definition and importance Components Layers Physical Security Briefs Zones Implementation.
© 2008 Delmar, Cengage Learning Property Security, Emergency Response, and Fire Protection Systems Chapter 13.
4 May I/O Control. 4 May What is I/O Control? A Doors feature that allows you to program input events to drive output responses – for example:
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Lesson Goal After completing this lesson, the student shall be able to identify indicators of an incendiary fire and protect and preserve evidence after.
The Monitor 4000 Alarm provides the most cost effective, worry-free method of keeping backdoors secure during business hours…protecting your business,
Lesson 4 Physical Security - Motion Sensor - Passive Ultrasonic Sensor - Photoelectric System - Ultrasonic - Ultrasonic Motion Sensor - Vibration Sensor.
Physical (Environmental) Security
Laser Navigation srl Calcio (BG) Italy VIDEOSURVEILLANCE ANTI INTRUSION SENSORS H24OPERATINGCENTER MONITORING SERVICE THRU INTERNET.
Site Security Policy Case 01/19/ : Information Assurance Policy Douglas Hines, Jr.
The Need for Access Control & Perimeter Protection
Access Control Jeff Wicklund Computer Security Fall 2013.
The Safety of Exhibits. The Safety of Objects The Safety of People.
10. Security and Physical Protection Basic Concepts
Physical Security Ch9 Part I Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Alarm User Awareness Class © Electronic Security Association.
Automatic Data Capture  Process where many techniques are used to automatically collect data without need for manual entry. Manual entry has following.
Motion Sensors By Elva S. Agbon ICS 30 B MOTION SENSORS A sensor specifically designed to detect a gentle or sharp up and down or side to side motion.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
1 Alarm System Orientation Welcome Training & Certification Committee Your Instructors Are: 2.
Criminal Justice Intro to Security, Instructor Name Date, Semester Chapter 4: PHYSICAL SECURITY: STRUCTURAL, ELECTRONIC, AND HUMAN PROTECTION SYSTEMS.
Physical and Technological Security
Information Systems Security
Chapter 8 Analysis Engineering
Motion Sensors By Elva S. Agbon ICS 30 B.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Understanding Security Layers
County HIPAA Review All Rights Reserved 2002.
Building Management System − 1
RFID Security System Problem Impact Approach Diagram
Physical Security.
Managing the IT Function
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Microsoft Data Insights Summit
FACILITY TARGET HARDENING
Presentation transcript:

Unit 1: Protecting the Facility (Virtual Machines)

How do you protect the facility

Risk Assessment 5 Risk Management Steps Identify – Count your _________ (inventory) Protect – Explain how you will protect assets (Train employees) Detect – Describe how you would know if someone or something was attempting to access, disable, degrade, or destroy one or more of the devices and/or systems in the substation (Monitor Personnel activity) Respond – Describe how you will react to the violation. (Examine information stored on servers) Recover –Describe how you return things back to normal?

How do you protect your business?

Infrastructure Security Defined Layers of Infrastructure Security When ____________ security initiatives are applied to providing security for the basic physical and organizational structures needed for the operation of an enterprise, organization and society.

The 3 Layers of Infrastructure Security  There must be a plan for designed for physically securing an infrastructure asset (a property, a building, a physical space, a system or a device):  Controls who can move (walk, drive, fly) across the physical facility. The outer perimeter –Examples property line the __________ walls of building. The inner perimeter – Examples doors and windows – either exterior or interior. The interior – Examples. inner-most level of security: inside of the building, office, cubicle, etc.

Infrastructure Security Protecting the Server Access control and ___________ systems Intrusion detection and reporting systems Video surveillance systems

The 1 st step Access Control  It is the first step to securing a physical facility.  It exists to deter potential intruders.

Access Control Security Terms 1. Ingress is the right of an individual to __________ a property, while 2. Egress is the legal right to leave a property. 3. Regress is the term used to describe the legal right to reenter a property. 4. Right is a legal privilege or permission granted to someone, or some group, by some recognized source of authority. This source can be a government, a legally recognized governmental agent, or a legally recognized owner of an asset. 5. Authorized person someone who has the right to access an asset. 6. Unauthorized person is anyone who has not been given this right. When unauthorized people attempt to gain access to an asset they do not have rights to access they become intruders.

Access Control provides….. Authorization  It involves being able to control the ingress, egress and regress to an ________ (Building)  Limiting the access of unauthorized personnel to important assets is the most fundamental security step that businesses can take.

Security Policies consists of ____________ control policy at each level that provides authorized people with appropriate levels of access to selected assets, while inhibiting access to assets by people who are not authorized. Tools used to enforce policies:  Sensors  Barriers  Logs  ID badges  Security guards

Access Control Physical _____________ Controls

Access Control Tool ___________ Locks and Keys

Authentication Systems Authentication- is the process of determining if someone is who they say they are. ________________ is based on authentication.

Authentication Factors Knowledge – Something that only the designated person should _____ Possession – Something that only the designated person should have Inheritance – Something that only the designated person is Location – Somewhere that only the designated person is

Types of Authentication Systems 1. Single authentication systems- Ex. Possessing a _____ that unlocks a device 2. Two-factor authentication systems Ex. possessing knowledge and possession of key. 3. Multi-factor authentication systems Ex. more than 2 authentication factors present.

Access Control Tool Smart Cards

Access Control Tool RFID

Access Control Tool Biometric Scanners Biometrics uses human physical ______________ to verify individuals.

Remote Access Monitoring Remote monitoring refers to ____________ or measurement of devices from a remote location or control room. In the security realm this involves having external access to the security system through a communication system.

Remote Access Monitoring Notifies supervisory security personnel when an unauthorized access or intrusion is attempted.

Remote Access Monitoring Notifications can come in the form of a visual notification, telephone call, instant messenger notice, or a ______ message, strobe lights, and high intensity sirens.

Access Control Monitoring Remote Control

Access Monitoring Remote Monitoring

Intrusion Detection Systems is the components of a basic commercial security system  It includes an intelligent control panel connected by ______ (or radio signals) to sensors at various locations throughout the facility.

Intrusion Detection Systems Perimeter area inputs to the control panel typically include sensors at every perimeter opening including doors, windows, garage doors and windows, and doors to crawl spaces. Additional perimeter protection may include using sound, vibration, and motion detector sensors to guard against entry through broken windows.

Intrusion Detection Systems When the controller receives an active input signal from one of its input sensors, it evaluates the conditions presented according to its programming (and the type of emergency response required), and if necessary, sends the appropriate output signals to annunciators (sirens or bells). It may also communicate with designated security contacts (security supervisors, __________ services or law enforcement/fire agencies) as directed by its programming.

Security Zones

Access Control Tools Sensors __________ input devices that generates a signal due to physical activity Examples:  magnetic switches for doors and windows  acoustic detectors  vibration detectors  motion detectors  glass break detectors Sensors protect the perimeter, selected outside areas, and the open spaces inside the facility.

Access Control Tool Keypads A _________ device for programming, controlling, and operating various access control and management devices.  Have a set of numerical pushbuttons that are similar to a telephone touchtone keypad.  Use to initiate commands for control options such as arming and disarming the system or bypassing a zone.

Access Control Tool Fire Detection Sensors included in many security systems..

Access Control Tool 3 Types of Output Devices 1. visual notification 2. audible annunciators 3. Remote messaging

Remote Notification Systems The most common remote notification systems involve the use of a ____________ line by the security system control panel to automatically call a remote monitoring facility or key personnel when an alarm condition exists.  The security controller can receive signal and message recipient can also use remote access to check on the status from a remote location.

Video Surveillance Systems  The most important element of most commercial security systems.  Many organizations include visible cameras in their infrastructure security systems to inhibit unlawful activity and to record events that occur at the perimeter or key interior

Video Recorders

Switchers Reference security/ftc-gets-thumbs-up-to-act-as-cybersecurity- cop-what-does-it-mean-for-your-business/