2 Review: Information and data are the most important assets. Watch for insiders, social engineering, distributed attacks using software exploits.

Slides:



Advertisements
Similar presentations
Museum Presentation Intermuseum Conservation Association.
Advertisements

Physical Security.
Facilities Management and Design Chapter 4 Safety and Security systems.
GCSE ICT Networks & Security..
Computer Security Computer Security is defined as:
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
9 - 1 Computer-Based Information Systems Control.
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Physical and Environmental Security Chapter 5 Part 1 Pages 427 to 456.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Physical (Environmental) Security.
Copyright © Center for Systems Security and Information Assurance Lesson Seven Physical Security.
Principles of Information Security, 3rd Edition 2 Introduction  Physical security addresses the design, implementation, and maintenance of countermeasures.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Information Security Principles and Practices
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 16: Physical and Infrastructure Security.
Information Systems Security Physical Security Domain #4.
Physical Security Chapter 9.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Chapter 3.  Security Framework  Operational Security Lifecycle  Security Perimeter  Access Control  Social Engineering  Environmental Issues.
Physical Security EECS710 Fall 2006 Professor Saiedian Presenter:
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Physical Security.
Introduction Physical security addresses design, implementation, and maintenance of countermeasures that protect physical resources of an organization.
每时每刻 可信安全 1 What category of water sprinkler system is currently the most recommended water system for a computer room? A Dry Pipe sprinkler system B Wet.
Principles of Information Security, Fourth Edition
Principles of Information Security, Fifth Edition
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
General Security Principles and Practices. Security Principles Common Security Principles Security Policies Security Administration Physical Security.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Module 02: 1 Introduction to Computer Security and Information Assurance Objectives Recognize that physical security and cyber security are related Recognize.
Understanding Security Layers
Physical Security “Least sexy of the 10 domains but the best firewall in the world will not stand up to a well placed brick.”
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
What does “secure” mean? Protecting Valuables
Principles of Information Security, 2nd Edition 2 Learning Objectives Upon completion of this material, you should be able to:  Understand the conceptual.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
Information Systems Security
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 16 “Physical and Infrastructure.
Physical (Environmental) Security
Chap1: Is there a Security Problem in Computing?.
Physical Security Chapter 9 If someone really wants to get at the information, it is not difficult if they can gain physical access to the computer or.
CPT 123 Internet Skills Class Notes Internet Security Session B.
Physical Security Concerns for LAN Management By: Derek McQuillen.
Access Control Jeff Wicklund Computer Security Fall 2013.
Physical Security Ch9 Part I Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
Physical Security Ch9 Part II Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 13 – Physical and.
Criminal Justice Intro to Security, Instructor Name Date, Semester Chapter 4: PHYSICAL SECURITY: STRUCTURAL, ELECTRONIC, AND HUMAN PROTECTION SYSTEMS.
Unit 1: Protecting the Facility (Virtual Machines)
Module 5: Designing Physical Security for Network Resources
Information Systems Security
Computers in the Ambulatory Care Setting
CS457 Introduction to Information Security Systems
Principles of Information Security, Fifth Edition
Risk management.
ISSeG Integrated Site Security for Grids WP2 - Methodology
NETW4005 COMPUTER SECURITY A
Understanding Security Layers
INFORMATION SYSTEMS SECURITY and CONTROL
Objectives Telecommunications and Network Physical and Personnel
RAKSHAK SECURITY Physical Security Presented by, Ranjit Patil Director.
Managing the IT Function
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Cyber Security For Civil Engineering
Presentation transcript:

2 Review: Information and data are the most important assets. Watch for insiders, social engineering, distributed attacks using software exploits

Learning Objectives Upon completion of this material, you should be able to: Discuss the relationship between threats to information security and physical security Describe the key physical security considerations including fire control and surveillance systems Identify critical physical environment considerations for computing facilities, including uninterruptible power supplies Principles of Information Security, 3rd Edition 3

Introduction Physical security addresses design, implementation, and maintenance of countermeasures that protect physical resources of an organization Most controls can be circumvented if an attacker gains physical access Physical security is as important as logical security Principles of Information Security, 3rd Edition 4

Introduction (continued) Seven major sources of physical loss: ◦ Extreme temperature ◦ Gases ◦ Liquids ◦ Living organisms ◦ Projectiles ◦ Movement ◦ Energy anomalies Principles of Information Security, 3rd Edition 5

Introduction (continued) Community roles ◦ General management: responsible for facility security ◦ IT management and professionals: responsible for environmental and access security ◦ Information security management and professionals: perform risk assessments and implementation reviews Principles of Information Security, 3rd Edition 6

Physical Access Controls Secure facility: a physical location engineered with controls designed to minimize risk of attacks from physical threats Secure facility can take advantage of natural terrain, traffic flow, and degree of urban development; can complement these with protection mechanisms (fences, gates, walls, guards, alarms) Principles of Information Security, 3rd Edition 7

Physical Security Controls Walls, fencing, and gates ◦ exterior perimeter controls Guards ◦ apply human reasoning, need standard operating procedures Dogs ◦ keen sense of smell and hearing to detect intrusions ID cards and badges ◦ information access control mechanism used for identification Locks and keys Principles of Information Security, 3rd Edition 8

Physical Security Controls (continued) Mantraps ◦ specifically intended to prevent tailgating Electronic monitoring ◦ cameras, VCRs, closed circuit TV Alarms and alarm systems Computer rooms and wiring closets ◦ require special consideration Interior walls and doors Principles of Information Security, 3rd Edition 9

ID Cards and Badges Ties physical security with information access control ◦ ID card is typically concealed ◦ Name badge is visible Serve as simple form of biometrics (facial recognition) Should not be only means of control as cards can be easily duplicated, stolen, and modified Tailgating occurs when unauthorized individual follows authorized user through the control Principles of Information Security, 3rd Edition 10

Locks and Keys Two types of locks: mechanical and electromechanical Locks can also be divided into four categories: manual, programmable, electronic, biometric Locks fail and alternative procedures for controlling access must be put in place Locks fail in one of two ways: ◦ Fail-safe lock  unlock when lock fails - required for human safety ◦ Fail-secure lock  remain locked when the lock fails. Principles of Information Security, 3rd Edition 11

Figure 9-1 Principles of Information Security, 3rd Edition 12

Mantrap Small enclosure that has entry point and different exit point Individual enters mantrap, requests access, and if verified, is allowed to exit mantrap into facility Individual denied entry is not allowed to exit until security official overrides automatic locks of the enclosure Principles of Information Security, 3rd Edition 13

Figure 9-2 Mantraps Principles of Information Security, 3rd Edition 14

Electronic Monitoring Records events where other types of physical controls are impractical or incomplete May use cameras with video recorders; includes closed-circuit television (CCT) systems Drawbacks ◦ Reactive - does not prevent access or prohibited activity ◦ Recordings often are not monitored in real time; must be reviewed to have any value Principles of Information Security, 3rd Edition 15

Alarms and Alarm Systems Alarm systems notify when an event occurs Detect fire, intrusion, environmental disturbance, or an interruption in services Rely on sensors that detect event; e.g., motion detectors, smoke detectors, thermal detectors, glass breakage detectors, weight sensors, contact sensors, vibration sensors Principles of Information Security, 3rd Edition 16

Computer Rooms and Wiring Closets Require special attention to ensure confidentiality, integrity, and availability of information Logical controls easily defeated if attacker gains physical access to computing equipment Custodial staff often the least scrutinized persons who have access to offices; are given greatest degree of unsupervised access Principles of Information Security, 3rd Edition 17

Interior Walls and Doors Information asset security sometimes compromised by construction of facility walls and doors Facility walls typically either standard interior or firewall High-security areas must have firewall-grade walls to provide physical security from potential intruders and improve resistance to fires Doors allowing access to high security rooms should be evaluated Recommended that push or crash bars be installed on computer rooms and closets Principles of Information Security, 3rd Edition 18

Fire Security and Safety Most serious threat to safety of people who work in an organization is possibility of fire Fires account for more property damage, personal injury, and death than any other threat Imperative that physical security plans examine and implement strong measures to detect and respond to fires Principles of Information Security, 3rd Edition 19

Fire Detection and Response Fire suppression systems: devices installed and maintained to detect and respond to a fire Deny an environment of heat, fuel, or oxygen ◦ Water and water mist systems ◦ Carbon dioxide systems ◦ Soda acid systems ◦ Gas-based systems Principles of Information Security, 3rd Edition 20

Fire Detection Fire detection systems fall into two general categories: manual and automatic Part of a complete fire safety program includes individuals that monitor chaos of fire evacuation to prevent an attacker accessing offices There are three basic types of fire detection systems: thermal detection, smoke detection, flame detection Principles of Information Security, 3rd Edition 21

Fire Suppression Systems consist of portable, manual, or automatic apparatus Portable extinguishers are rated by the type of fire: Class A, Class B, Class C, Class D Installed systems apply suppressive agents; usually either sprinkler or gaseous systems Principles of Information Security, 3rd Edition 22

Figure 9-3 Water Sprinkler System Principles of Information Security, 3rd Edition 23

Gaseous Emission Systems Until recently, two types of systems: carbon dioxide and Halon Carbon dioxide robs a fire of oxygen supply Halon is clean but has been classified as an ozone-depleting substance; new installations are prohibited Alternative clean agents include FM-200, Inergen, carbon dioxide, FE-13 (trifluromethane) Principles of Information Security, 3rd Edition 24

Figure 9-4 Fire Suppression System Principles of Information Security, 3rd Edition 25

Failure of Supporting Utilities and Structural Collapse Supporting utilities (heating, ventilation, and air conditioning; power; water; and others) have significant impact on continued safe operation of a facility Each utility must be properly managed to prevent potential damage to information and information systems Principles of Information Security, 3rd Edition 26

Heating, Ventilation, and Air Conditioning Areas within heating, ventilation, and air conditioning (HVAC) systems that can cause damage to information systems include: ◦ Temperature ◦ Filtration ◦ Humidity ◦ Static electricity Principles of Information Security, 3rd Edition 27

Ventilation Shafts While ductwork is small in residential buildings, in large commercial buildings it can be large enough for an individual to climb though If vents are large, security can install wire mesh grids at various points to compartmentalize the runs Principles of Information Security, 3rd Edition 28

Power Management and Conditioning Electrical quantity (voltage level, amperage rating) is a concern, as is quality of power (cleanliness, proper installation) Noise that interferes with the normal 60 Hertz cycle can result in inaccurate time clocks or unreliable internal clocks inside CPU Grounding ensures that returning flow of current is properly discharged to ground Overloading a circuit causes problems with circuit tripping and can overload electrical cable, increasing risk of fire Principles of Information Security, 3rd Edition 29

Uninterruptible Power Supply (UPS) In case of power outage, UPS is backup power source for major computer systems Four basic UPS configurations: ◦ Standby ◦ Ferroresonant standby ◦ Line-interactive ◦ True online (double conversion online) Principles of Information Security, 3rd Edition 30

Emergency Shutoff Important aspect of power management is the need to be able to stop power immediately should a current represent a risk to human or machine safety Most computer rooms and wiring closets are equipped with an emergency power shutoff Principles of Information Security, 3rd Edition 31

Water Problems Lack of water poses problem to systems, including functionality of fire suppression systems and ability of water chillers to provide air-conditioning Surplus of water, or water pressure, poses a real threat (flooding, leaks) Very important to integrate water detection systems into alarm systems that regulate overall facilities operations Principles of Information Security, 3rd Edition 32

Structural Collapse Unavoidable forces can cause failures of structures that house organization Structures designed and constructed with specific load limits; overloading these limits results in structural failure and potential injury or loss of life Periodic inspections by qualified civil engineers assist in identifying potentially dangerous structural conditions Principles of Information Security, 3rd Edition 33

Maintenance of Facility Systems Physical security must be constantly documented, evaluated, and tested Documentation of facility’s configuration, operation, and function should be integrated into disaster recovery plans and operating procedures Testing helps improve the facility’s physical security and identify weak points Principles of Information Security, 3rd Edition 34

Interception of Data Three methods of data interception: ◦ Direct observation  requires proximity of observer; use physical access control mechanisms to prevent/avoid; use policies that require material outside office be tightly controlled to prevent shoulder surfing ◦ Interception of data transmissions  Internet provides easier access; use of sniffers; wiretaps; eavesdropping on wireless connections  physically inspect data ports; use fiberoptic cable; use encryption for privacy (wireless in particular) ◦ Electromagnetic interception  emanations from electromagnetic radiation (EMR) can be intercepted  U.S. government developed TEMPEST program to reduce risk of electromagnetic radiation (EMR) monitoring Principles of Information Security, 3rd Edition 35

Mobile and Portable Systems With the increased threat to information security for laptops, handhelds, and PDAs, mobile computing requires more security than average in-house system Many mobile computing systems have corporate information stored within them; some are configured to facilitate user’s access into organization’s secure computing facilities - VPN or dialup configuration, passwords, etc. Controls support security and retrieval of lost or stolen laptops ◦ CompuTrace software, stored on laptop; reports to a central monitoring center ◦ Burglar alarms made up of a PC card that contains a motion detector Principles of Information Security, 3rd Edition 36

Figure 9-6 Laptop Theft Deterrence Principles of Information Security, 3rd Edition 37

Remote Computing Security Remote site computing: away from organizational facility Telecommuting: computing using telecommunications including Internet, dial-up, or leased point-to-point links Employees may need to access networks on business trips; telecommuters need access from home systems or satellite offices To provide secure extension of organization’s internal networks, all external connections and systems must be secured Principles of Information Security, 3rd Edition 38

Special Considerations for Physical Security Threats Develop physical security in-house or outsource? ◦ Many qualified and professional agencies ◦ Benefit of outsourcing includes gaining experience and knowledge of agencies ◦ Downside includes high expense, loss of control over individual components, and level of trust that must be placed in another company Social engineering: use of people skills to obtain information from employees that should not be released Principles of Information Security, 3rd Edition 39

Inventory Management Computing equipment should be inventoried and inspected on a regular basis Classified information should also be inventoried and managed Physical security of computing equipment, data storage media, and classified documents varies for each organization Principles of Information Security, 3rd Edition 40

The Tools Available Google images for: ◦ biometric devices – effective vs easy biometric devices ◦ smart cards and tokens - at airport smart cardsat airport ◦ RFID cards and chips – contraversial, even banned in some states RFID cards and chips ◦ tiny portable storage – perfect for insider hackers tiny portable storage ◦ Various lock-me-downs Various lock-me-downs ◦ Computer forensics equipment – for good and bad guys Computer forensics equipment ◦ And a lot more! 41

Summary Some threats to information security are unique to physical security Key physical security considerations in a facility site Physical security monitoring components Essential elements of access control Fire safety, fire detection, and response Importance of supporting utilities, especially use of uninterruptible power supplies Countermeasures to physical theft of computing devices Principles of Information Security, 3rd Edition 42