Unit 7 - Organisational Systems Security

Slides:



Advertisements
Similar presentations
CLOSED CIRCUIT TELEVISION (CCTV) SURVEILLANCE SYSTEMS
Advertisements

Automation of the home, housework or household activity. Linked systems/appliances to centralized control. Remote monitoring of the home from a tabletop.
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
Community Crime Prevention CCTV in Victoria A Guide to Developing CCTV in Victoria Presenter:Simon Walker Title:Senior Policy Officer Date:13 November.
BIOMETRICS, CCTV & DATA PROTECTION By Drudeisha Madhub Data Protection Commissioner Date:
“Why do we need Security”  Each business has unique security and safety needs, e.g. Inventory Shrinkage and Theft Personal Safety Break Ins Moving Your.
EMI Systems Limited specializes in CCTV surveillance systems that ranges from stand-alone cameras to fully integrated security control centers and to the.
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Physical (Environmental) Security.
FIT3105 Biometric based authentication and identity management
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Biometrics and Authentication Shivani Kirubanandan.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Security Equipment Equipment for preventing unauthorised access to data & information.
Physical Security SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States.
INPUT DEVICES. KEYBOARD Most common input device for a computer.
Neuromuscular Engineering 11 Neuromuscular Engineering & Technology BioMetrics SECURE AREA VETTING AND ACCESS CONTROL.
Networking Two or more computers linked together so that it is capable of sending messages between them. Network Stand Alone Computer.
B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by samaher el nbahen UNIVERSITY.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 6 BIOMETRICS.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
UNIT 15 WEEK 3 CLASS 1 LESSON OVERVIEW Pete Lawrence BTEC National Diploma Organisational System Security.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
$20 billion business 230 million printers sold  170 million inkjet  60 million laserjet #1 in ink, laser, scanners, designjet, print servers Consistent.
Biometrics Authentication Technology
Physical (Environmental) Security
LO: To be able to describe and compare physical and logical methods of security. All of you will be able to: Describe how physical security measures can.
Physical security By Ola Abd el-latif Abbass Hassan.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
Physical Security By Nathan Conroy COSC Outline Purpose of physical security Two types of physical security Different types of security devices.
Unit 32 – Networked Systems Security
Access Control Jeff Wicklund Computer Security Fall 2013.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
Information Systems Design and Development Security Precautions Computing Science.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from.
Biometrics Dr. Nermin Hamza
Residential Security, Access Control, and Surveillance Copyright © 2005 Heathkit Company, Inc. All Rights Reserved Presentation 4 – Secure Installation.
Unit 1: Protecting the Facility (Virtual Machines)
Hardware and software that can provide a good level of security In this presentation I am going to provide advices on hardware and software that needs.
Module 5: Designing Physical Security for Network Resources
A device tat transfers data from the outside world into a computer
Administrative Practices Outcome 1
Business Risks of Insecure Networks
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
OCR GCSE ICT Data capture methods.
OCR GCSE ICT Data capture methods.
Level 2 Diploma Unit 11 IT Security
Ian Ramsey C of E School GCSE ICT On the move Final steps.
Security of People, Property and Information
Seminar Presentation on Biometrics
Understand mechanisms to control organisational IT security
Biometric technology.
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
Security of Data  
Managing the IT Function
Welcome to all Participants
Unit 1 Fundamentals of IT
Network Security Mark Creighton GBA 576 6/4/2019.
G061 - Network Security.
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Unit 7 - Organisational Systems Security Lesson 4 – Information security Unit 7 - Organisational Systems Security

Last Session Counterfeit Goods Information security: confidentiality integrity and completeness of data availability of data as needed

This Session Complete assignment 1 Physical security Lock and key CCTV Intrusion detection Port lockdown Biometrics

Physical Security Lock and Key Equipment identification CCTV Intrusion detection systems Staff and visitor identification Access control [sign in/sign out] systems Security personnel Shielding network cables and wireless communication systems Port Lockdown

Lock and Key Secure mobile devices Master keys for whole building Submaster for group of rooms eg server rooms Log of who keys are issued to Uncuttable keys Digital keypads/ card entry Observation of code Tail-gating Passing code on to others Building weaknesses: plasterboard partitions, ceiling spaces, unsecured doors.

Equipment identification Deterrent Aids recovery Assists prosecution of offenders Indelible ink Ultra-violet sensitive ink Marking with ‘DNA’ compound created for your organisation.

CCTV ‘no official (or even unofficial) statistics on how many CCTV cameras there are. The information commissioner doesn't know, the government has repeatedly told parliament that figures are not collected’ Channel 4 Factcheck, 2008 Estimates vary: 4.2 million (2002, Michael McCahill and Clive Norris), 1.2 million 2007 Edexcel One camera for every 14 people (David Davies, 2008) invasion of privacy?

CCTV Monitor remote locations Comprehensive record 24/7 of events Visible cameras modify behaviour and can be a deterrent Admissible as evidence Technology and image quality continually improving, most can tilt, zoom and pan Can include directional microphone Covert surveillance

Intrusion detection systems Detect human presence Passive infrared detects body heat Microphones detect movement and enable listening Circuit breakers for doors, windows, hatches Pressure sensitive pads for floors Low-power lasers

Staff and visitor identification Identity badges for staff and visitors Used in combination with automated access Personnel database Can signify role, department, level of access etc Visitor cards will have an ’expiry’ date

Access control [sign in/sign out] systems Swipe cards Dongles System logs entry and exit Can be programmed to allow access door by door or at certain times only Keys can be disabled if not returned when employee leaves Can be reprogrammed when roles change May not contain info other than identifier can be used by wrong person

Security personnel Know most people in organisation (if not all) Can identify suspicious or unusual behaviour Monitor buildings out-of-hours

Shielding network cables and wireless communication systems Signal travelling along copper cable emits electromagnetic field, can be analysed to discover the data Fibre optics requires considerable effort and possible damage Shielded cables – dampen ‘noise’ from the cable and prevent external magnetic interference from power sources etc. Wireless systems less secure; WEP encryption. Total trust – preconfigure devices so that not just any device can join.

Port Lockdown Eg wall socket which ethernet cable plugged into; if port is inactive should be ‘locked down’ in central communications room. Achieved by remote access to switch and disabling port, or unplug the cable. Prevents additional devices joining system

Biometrics Fingerprint recognition Retinal scans Iris scans Voice recognition Other biometric technologies

Fingerprint recognition Used for over 100 years, 1 in 75 million identical Can be reproduced using super-glue and Vaseline Fine watery solution allows detection and scanners to operate. Some scanners may use rapid laser to detect ridges. Or electro-static sensitive pad detects current in the small quantities of water Often used with another system e.g. International travel combines fingerprints with passport/visa in some countries

Retinal scans Retina is the back of the eye Biologically unique configuration Very difficult to change without considerable damage – Fingerprints can be cut or burnt Remains same from birth Takes about two seconds to complete Requires close proximity of subject

Iris scans Which film? Minority report Another unique feature of the eye Remember Madeline McCann? Can be carried out while subject wearing glasses or contact lenses (unlike retinal scan) Unlikely to change at all during lifetime A public iris scanning device has been proposed in a patent from Samoff Labs in New Jersey. The device is able to scan the iris of the eye without the knowledge or consent of the person being scanned. http://www.technovelgy.com/ct/Science-Fiction-News.asp?NewsNum=930 "false match" less than one time per one hundred billion.

Voice recognition Considerable limitations Voices change according to circumstance: Stress, excitement, tiredness, illness, age! Use of other devices to circumvent eg mobile phones Used together with other systems eg CCTV Recent improvements used in games consoles, important for people with disability e.g. For speech to text systems

Other biometric technologies Facial recognition systems (with CCTV) Identifying suspicious behaviour through analysing posture/behaviour What could be next?

Automated Human Body Odor Recognition System

Assignment 1 Know your threats P1 - Explain the impact of different types of threat on an organisation. M1 - Discuss information security.