Physical and Environmental Security

Slides:



Advertisements
Similar presentations
McMaster Universitys Moveable Assets Policy Property Protection.
Advertisements

Physical Security.
Facilities Management and Design Chapter 4 Safety and Security systems.
Emergency Preparedness and Response
GCSE ICT Networks & Security..
Chapter 7: Physical & Environmental Security
Computer Security Computer Security is defined as:
“Why do we need Security”  Each business has unique security and safety needs, e.g. Inventory Shrinkage and Theft Personal Safety Break Ins Moving Your.
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
Chapter 5 Enhancing Security Through Physical Controls
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Physical and Environmental Security Chapter 5 Part 1 Pages 427 to 456.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Physical (Environmental) Security.
Copyright © Center for Systems Security and Information Assurance Lesson Seven Physical Security.
Principles of Information Security, 3rd Edition 2 Introduction  Physical security addresses the design, implementation, and maintenance of countermeasures.
Stephen S. Yau CSE 465 & CSE591, Fall Physical Security for Information Systems.
Information Security Principles and Practices
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 16: Physical and Infrastructure Security.
Information Systems Security Physical Security Domain #4.
How to create... A Fire Evacuation Plan.
DUE Security and Fire Alarm Systems LEARNING OUTCOME 7B Describe design overview and location considerations.
Physical Security Chapter 9.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Chapter 3.  Security Framework  Operational Security Lifecycle  Security Perimeter  Access Control  Social Engineering  Environmental Issues.
Physical and Environmental Security CISSP Guide to Security Essentials Chapter 8.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Physical Security.
1 12. Physical Security ISA 562 Internet Security Theory & Practice.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Security Equipment Equipment for preventing unauthorised access to data & information.
Physical Security SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
每时每刻 可信安全 1 What category of water sprinkler system is currently the most recommended water system for a computer room? A Dry Pipe sprinkler system B Wet.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Module 02: 1 Introduction to Computer Security and Information Assurance Objectives Recognize that physical security and cyber security are related Recognize.
Understanding Security Layers
Chapter 6.  Natural environmental threats  Supply system threats  Manmade threats  Politically motivated threats.
Physical Security By: Christian Hudson. Overview Definition and importance Components Layers Physical Security Briefs Zones Implementation.
Physical Security “Least sexy of the 10 domains but the best firewall in the world will not stand up to a well placed brick.”
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 16 “Physical and Infrastructure.
Physical Security and Contingency Planning CS432 - Security in Computing Copyright © 2008 by Scott Orr and the Trustees of Indiana University.
Physical (Environmental) Security
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Site Security Policy Case 01/19/ : Information Assurance Policy Douglas Hines, Jr.
Security fundamentals Topic 11 Maintaining operational security.
Physical and Environmental Security Chapter 5 Part 2 Pages 457 to 499.
Physical security By Ola Abd el-latif Abbass Hassan.
Physical Security By Nathan Conroy COSC Outline Purpose of physical security Two types of physical security Different types of security devices.
Physical Security Concerns for LAN Management By: Derek McQuillen.
Access Control Jeff Wicklund Computer Security Fall 2013.
Physical Security Ch9 Part I Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 13 – Physical and.
West Cambridge Data Centre Ian Tasker Information Services.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
Criminal Justice Intro to Security, Instructor Name Date, Semester Chapter 4: PHYSICAL SECURITY: STRUCTURAL, ELECTRONIC, AND HUMAN PROTECTION SYSTEMS.
Onsite CRM Security
Physical Security.
CompTIA Security+ Study Guide (SY0-401)
NETW4005 COMPUTER SECURITY A
CompTIA Security+ Study Guide (SY0-401)
Physical and Environmental Security
CompTIA Security+ Study Guide (SY0-501)
Level 2 Diploma Unit 11 IT Security
Chapter 10 Physical Security
Objectives Telecommunications and Network Physical and Personnel
Security of Data  
Physical Security.
Managing the IT Function
Presentation transcript:

Physical and Environmental Security CISSP Guide to Security Essentials Chapter 8

Objectives Site access controls including key card access systems, biometrics, video surveillance, fences and walls, notices, and exterior lighting Secure siting: identifying and avoiding threats and risks associated with a building site

Objectives (cont.) Equipment protection from theft and damage Environmental controls including HVAC and backup power

Site Access Security

Site Access Controls Purpose Defense in Depth To restrict the movement of people, so only authorized personnel enter secure areas To record movements of people Defense in Depth Layers

Categories of Controls Detective Deterrent Preventive Corrective Recovery Compensating See chapter 2

Key Card System

Site Access Controls Key cards Centralized access control consists of card readers, central computer, and electronic door latches Pros: easy to use, provides an audit record, easy to change access permissions Cons: can be used by others if lost, people may "tailgate" Better if combined with a PIN Photo by IEI Inc.

Biometric Access Controls Based upon a specific biometric measurement Greater confidence of claimed identity Fingerprint, iris scan, retina scan, hand scan, voice, facial recognition, others More costly than key card alone Photo by Ingersoll-Rand Corporation

Metal Keys Pros: suitable backup when a key card system fails Uses in limited areas such as cabinets Best to use within keycard access areas Cons Easily copied, cannot tell who used a key to enter, many locks can be opened with bump keys

Man Trap Double doors, where only one can be opened at a time Used to control personnel access Manually operated or automatic Only room for one person

Guards Trained personnel with a variety of duties: Checking employee identification, handling visitors, checking parcels and incoming/outgoing equipment, manage deliveries, apprehend suspicious persons, call additional security personnel or law enforcement, assist persons as needed Advantages: flexible, employ judgment, mobile

Guard Dogs Serve as detective, preventive, and deterrent controls Apprehend suspects Detect substances

Access Logs Record of events Personnel entrance and exit Visitors Vehicles Packages Equipment moved in or out

Fences and Walls Effective preventive and deterrent control Keep unwanted persons from accessing specific areas Better when used with motion detectors, alarms, and/or surveillance cameras Height Effectiveness 3-4 ft Deters casual trespassers 6-7 ft Too difficult to climb easily 8 ft plus 3 strands of barbed or razor wire Deters determined trespassers

Video Surveillance Supplements security guards Provide points of view not easily achieved with guards Locations Entrances Exits Loading bays Stairwells Refuse collection areas

Video Surveillance (cont.) Camera types CCTV, IP wired, IP wireless Night vision Fixed, Pan / tilt / zoom Hidden / disguised Recording capabilities None; motion-activated; periodic still images; continuous

Intrusion, Motion, and Alarm Systems Automatic detection of intruders Central controller and remote sensors Door and window sensors Motion sensors Glass break sensors Alarming and alerting Audible alarms Alert to central monitoring center or law enforcement

Visible Notices No Trespassing signs Surveillance notices Sometimes required by law Surveillance monitors These are deterrent controls

Exterior Lighting Discourage intruders during nighttime hours, by lighting intruders’ actions so that others will call authorities NIST standards require 2 foot-candles of power to a height of 8 ft This is a deterrent control

Other Physical Controls Bollards Crash gates Prevent vehicle entry Retractable

Crash Gates Some are so strong they can stop a truck at 50 mph Link Ch 8b

Secure Siting

Secure Siting Locating a business at a site that is reasonably free from hazards that could threaten ongoing operations Identify threats Natural: flooding, landslides, earthquakes, volcanoes, waves, high tides, severe weather Man-made: chemical spills, transportation accidents, utilities, military base, social unrest

Secure Siting (cont.) Other siting factors Building construction techniques and materials Building marking Loading and unloading areas Shared-tenant facilities Nearby neighbors

Protection of Equipment

Asset Protection Laptop computers Anti-theft cables Defensive software (firewalls, anti-virus, location tracking, destruct-if-stolen) Strong authentication such as fingerprint Full encryption Training

Asset Protection (cont.) Servers and backup media Keep behind locked doors Locking cabinets Video surveillance Off-site storage for backup media Secure transportation Secure storage

Asset Protection (cont.) Protection of sensitive documents Locked rooms Locking, fire-resistant cabinets “Clean desk” policy Reduced chance that a passer-by will see and remove a document containing sensitive information Secure destruction of unneeded documents

Asset Protection (cont.) Equipment check-in / check-out Keep records of company owned equipment that leaves business premises Improves accountability Recovery of assets upon termination of employment

Asset Protection (cont.) Damage protection Earthquake bracing Required in some locales Equipment racks, storage racks, cabinets Water detection and drainage Alarms

Asset Protection (cont.) Fire protection Fire detection: smoke alarms, pull stations Fire extinguishment Fire sprinklers Inert gas systems Fire extinguishers

Sprinkler Systems Wet pipe - filled with pressurized water Dry pipe - fills with water only when activated Deluge - discharges water from all sprinklers when activated Pre-Action - Dry pipe that converts to a wet pipe when an alarms is activated Foam water sprinkler - Uses water and fire-retardant foam Gaseous fire suppression - displaces oxygen

Asset Protection (cont.) Cabling security – on-premises Place cabling in conduits or away from exposed areas Cabling security – off-premises (e.g. telco) Select a different carrier Utilize diverse / redundant network routing Utilize encryption

Environmental Controls

Environmental Controls Heating, ventilation, and air conditioning (HVAC) Vital, yet relatively fragile Backup units (“N+1”) recommended Ratings BTU/hr Tons (link Ch 8c) Also regulates humidity Should be 30% - 50%

Environmental Controls (cont.) Electric power Anomalies Blackout. A total loss of power. Brownout. A prolonged reduction in voltage below the normal minimum specification. Dropout. A total loss of power for a very short period of time (milliseconds to a few seconds). Inrush. The instantaneous draw of current by a device when it is first switched on.

Environmental Controls (cont.) Anomalies (cont.) Noise. Random bursts of small changes in voltage. Sag. A short drop in voltage. Surge. A prolonged increase in voltage. Transient. A brief oscillation in voltage.

Environmental Controls (cont.) Electric power protection Line conditioner – filters incoming power to make it cleaner and free of most anomalies Uninterruptible Power Supply (UPS) – temporary supply of electric power via battery storage Electric generator – long term supply of electric power via diesel (or other source) powered generator

Redundant Controls Assured availability of critical environmental controls Dual electric power feeds Redundant generators Redundant UPS Redundant HVAC Redundant data communications feeds