CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Physical Security.

Slides:



Advertisements
Similar presentations
Chapter ADCS CS262/0898/V1 Chapter 1 An Introduction To Computer Security TOPICS Introduction Threats to Computer Systems –Threats, Vulnerabilities.
Advertisements

GCSE ICT Networks & Security..
Chapter 7: Physical & Environmental Security
INTD 51 human environments building systems. heating/ventilation/air-conditioning (HVAC) maintain a comfortable indoor climate control temperature and.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 4 th Edition Morrison / Wells.
If you use your computer more than a few hours per day, we suggest you not to turn off your computer at the end of the day. Instead turn off only the.
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Physical and Environmental Security Chapter 5 Part 1 Pages 427 to 456.
Maintaining and Troubleshooting Computer Systems Computer Technology.
Unit 3- Maintaining & Protecting Hardware.  Identify the importance of protecting computer hardware from theft and damage.  Explain how to protect data.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Physical (Environmental) Security.
Slides copyright 2010 by Paladin Group, LLC used with permission by UMBC Training Centers, LLC.
Copyright © Center for Systems Security and Information Assurance Lesson Seven Physical Security.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 16: Physical and Infrastructure Security.
Information Systems Security Physical Security Domain #4.
CIT 470: Advanced Network and System AdministrationSlide #1 CIT 470: Advanced Network and System Administration Data Centers.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Chapter 8Basic Computer Maintenance  8.1Preventive Maintenance 8.1Preventive Maintenance 8.1Preventive Maintenance  8.2Monitoring System Performance.
Security Devices A modern security system, with its array of electronic components, is designed to sense, decide, and act. The security system senses events.
Chapter 8: Disaster Management
CB Warm-up Get the sheet from the front table and answer these questions. rbasics/14http://
Physical Security. Types of Threats Human Intrusion ◦ Attackers looking to perform some sort of damage or obtain useful information “Natural” Disasters*
MAINTAINING AND TROUBLESHOOTING COMPUTER SYSTEMS UNIT 6.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
PC Maintenance: Preparing for A+ Certification Chapter 2: Safety and Preventive Maintenance.
CSC 382/582: Computer SecuritySlide #1 CSC 382/582: Computer Security Physical and EM Security.
Chapter 6.  Natural environmental threats  Supply system threats  Manmade threats  Politically motivated threats.
Part 2: Buildings as a System Lee F. Ball Jr., PhD
1.1 System Performance Security Module 1 Version 5.
Computer Care.
Security and backups GCSE ICT.
OCR National in ICT Unit 1 – ICT in Business AO1 - Safe Working Practices in a Business Environment.
COMPUTER CARE & MAINTENANCE. Protecting Your Computer From Damage Like any kind of equipment, your computer requires care and maintenance to run smoothly.
Presentation on Assembling a Computer Presenting By: Neeraj Dhiman.
1 Safety and Preventative Maintenance. 2 MB, One megabyte - MB or M-byte - represents about 1 million (10 6 ) bytes. Precisely, 1 MB = = 1 kB x 1 kB =
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Heating Systems.
© CCI Learning Solutions Inc. 1 Lesson 5: Basic Troubleshooting Techniques Computer performance Care of the computer Working with hardware Basic maintenance.
ESD What is it and How do we deal with it Background lightening.
Keep all food and drinks away from computer and equipment Liquid may spill and cause an electrical shock or the computer not to operate properly.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 4 th Edition Morrison / Wells.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 16 “Physical and Infrastructure.
Computer Care Proper Computer Care Keep food and drinks away from the computer and keyboard. Avoid dusty locations. Use a surge protector. Keep away.
Physical Security and Contingency Planning CS432 - Security in Computing Copyright © 2008 by Scott Orr and the Trustees of Indiana University.
Physical (Environmental) Security
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Security fundamentals Topic 11 Maintaining operational security.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.
Physical Security Katie Parker and Robert Tribbia Katie Parker and Robert Tribbia Computer Security Computer Security Fall 2008 Fall 2008.
Chapter 6 Protecting Your Files. Protecting Your Files FAQs: – What should I know about losing data? – How can I protect my files from viruses? – How.
Physical Security Concerns for LAN Management By: Derek McQuillen.
© 2012 MITSUBISHI HEAVY INDUSTRIES – MAHAJAK AIR CONDITIONERS CO., LTD. All Rights Reserved. Bad case of Installation RAC-B-A07.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 13 – Physical and.
By: Mike Nazzario. What is a Data Center?  Facility used to house computer servers for remote storage  Sensitive Data  Warehouse – room with a couple.
Computer Literacy BASICS: A Comprehensive Guide to IC 3, 5 th Edition Lesson 10 Data and Hardware Protection 1 Morrison / Wells / Ruffolo.
COMPUTER SAFETY AND CARE
Computer Technology. HardwareSoftware  Hardware ◦ Monitor ◦ Keyboard ◦ Hard disk drive ◦ Mouse ◦ CPU (Central Processing Unit) ◦ Graphic and sound cards.
Module 5: Designing Physical Security for Network Resources
Lesson 3 Computer Protection
Chapter 2: Introduction to Lab Procedures and Tool Use
IC3 GS3 Standard COMPUTING FUNDAMENTALS Module
ARAC/H/F Air-cooled water chillers, free-cooling chillers and heat pumps Range: kW.
NETW4005 COMPUTER SECURITY A
Lesson 3 Computer Protection
Division of Computer Studies
Level 2 Diploma Unit 11 IT Security
Lesson 3 Computer Protection
G061 - ICT Safety Problems.
Presentation transcript:

CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Physical Security

CIT 380: Securing Computer SystemsSlide #2 Physical Security 1.Physical Security Plan 2.Elements of Physical Security 3.Environmental Threats 4.Physical Access 5.Theft 6.Backups 7.Printouts 8.Unattended Terminals

CIT 380: Securing Computer SystemsSlide #3 Physical Security Plan List of physical assets to be protected –Descriptions –Replacement cost (hardware + data) Locations of physical assets Description of security perimeter(s) –Holes in perimeter (doors, windows, etc.) –Multiple perimeter example: Outermost: campus Outer: building Inner: server room Threats that you’re protecting against Security defenses

CIT 380: Securing Computer SystemsSlide #4 Elements of Physical Security 1.Determent –Convince people not to attack. 2.Detection –Alarms, guards, and other means of detecting attacks. 3.Delay –Elements that slow down an attacker, e.g. locks & safes. 4.Response –Guards or a call to the police.

CIT 380: Securing Computer SystemsSlide #5 Environmental Threats: Fire Dangers: –Flames –Heat –Smoke –Water Defenses –Gas-charged extinguishers –Dry-pipe water sprinkler systems

CIT 380: Securing Computer SystemsSlide #6 Environmental Threats: Temperature Most computer systems need 50-90F Dangers: –Cold: thermal shock on power-on, cracking ICs/boards. –Hot: unreliability, then system failures as heat increases. Defenses –Air-conditioning system –Good air circulation –Temperature alarm system

CIT 380: Securing Computer SystemsSlide #7 Environmental Threats: Water Humidity –Below 20% static discharge becomes a problem. –Must remain below dew point to avoid condensation on chilled surfaces. –Defenses: Humidifier/de-humidifier Humidity alarm Water –Defenses: Keep drinks away from computers. Alarm at low level of flooding. Automatic power shut-off at higher level.

CIT 380: Securing Computer SystemsSlide #8 Environmental Threats: Electrical Electrical Noise –Motors, fans, even vacuum cleaners can generate electrical surges. –Defenses: UPS with power line filter Anti-static mats Lightning –Defenses Turn off computer systems during lightning storms. Surge suppressors may help for distant strikes.

CIT 380: Securing Computer SystemsSlide #9 Environmental Threats Dust –Collects on drive heads and degrades media by abrasion. –Dust is slightly conductive and can cause circuit boards to short and fail if much accumulates. –Defenses: Air Filtering Systems Vacuuming Vibration –Can work circuit boards out of sockets and drive heads out of alignment over time. –Defenses: Rubber or foam mat.

CIT 380: Securing Computer SystemsSlide #10 Physical Access Raised floors/dropped ceilings –If internal walls do not extend above dropped ceilings and below raised floors, computer room door security can be easily bypassed. Air ducts –Serve computer room with many small air ducts. –Weld screens over air vents or within air ducts. –Motion detectors. Glass walls –Easy to break—avoid them.

CIT 380: Securing Computer SystemsSlide #11 Network Cabling Threats –Wiretapping/monitoring –Cutting –Connecting to AC power Defenses –Run through steel conduits, not open trays. –Double-walled conduits with pressurized gas between layers; alarm if pressure falls.

CIT 380: Securing Computer SystemsSlide #12 Alarms Sensor types –Vibration detectors –Video cameras –Motion sensors –Infrared (body heat) detectors False alarms –Causes Weather (thunder, lightning, wind) Created by attacker –Degrade response guards/police will ignore alarms if too many false.

CIT 380: Securing Computer SystemsSlide #13 Theft Reasons: –Resale –Access to stored information Targets –Laptops –Components: RAM, CPUs, hard disks –PCs/servers

CIT 380: Securing Computer SystemsSlide #14 Theft Defenses Limit physical access. –Keep critical systems in high security areas. Case locks to prevent access to components. Laptop locks to lock laptop to desk. Visible equipment tags with serial numbers. Phone-home software for tracing. Encryption of information.

CIT 380: Securing Computer SystemsSlide #15 Backups Protect availability of information. Offer potential for confidentiality violation.

Backups Defenses: –Secure in safe after creation. –Periodically move to secure offsite storage. –Verify that you can restore data from backups. Verify old backups periodically too. –Encrypt data on backup tapes. –Bulk erase tapes to destroy data before disposal. CIT 380: Securing Computer SystemsSlide #16

CIT 380: Securing Computer SystemsSlide #17 Printouts Provide availability when computers down. Potential for confidentiality violation. –Dumpster diving Defenses –Separate wastebaskets for confidential/unclassified information. –Paper shredding Expensive shredding recovery services exist.

CIT 380: Securing Computer SystemsSlide #18 Unattended Terminals Offer anonymous attacker access Defenses: –Auto-logout shells or daemons –Automatic screen locking –Boot only from hard disk –BIOS password to protect boot settings –Case lock to prevent battery removal or BIOS chip replacement

CIT 380: Securing Computer SystemsSlide #19 Key Points Physical security is an essential component of computer security. –Many systems are more vulnerable to physical threats than system/network attacks. Elements of Physical Security –Determent –Detection –Delay –Response Backups are a defense against many threats, but must be defended themselves.