Physical Security SAND No. 2005-3288 C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States.

Slides:



Advertisements
Similar presentations
C-TPAT SECURITY AWARENESS TRAINING
Advertisements

Airport Security – Post 9/11
Airflow and BSC Biosafety and Biosecurity Awareness Training
Computer Security Computer Security is defined as:
Facilitating a Dialog between the NSDI and Utility Companies J. Peter Gomez Manager, Information Requirements, Xcel Energy.
Administrative Council Retreat – “Campus Safety and Security” August 13, 2007 Administrative & Information Services Greg Burris.
Presentation Retail Security Key Holding Mobile Patrols Access Control Systems Manned Security Receptionist CCTV Monitoring.
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
Deter Detect Delay Assess Respond Copyright © BES.
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
Chapter 5 Enhancing Security Through Physical Controls
SECURITY HARDWARE & TECHNOLOGY CCPOA REGION 3 TRAINING CLASS MAY 11, 2011.
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Physical and Environmental Security Chapter 5 Part 1 Pages 427 to 456.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Physical (Environmental) Security.
October ISPS and SMDG What is the possible impact of the ISPS code on the messages controlled by SMDG?
Stephen S. Yau CSE 465 & CSE591, Fall Physical Security for Information Systems.
The Role of Computers in Surveillance ~ Katie Hatland.
Information Security Principles and Practices
What is Program Management?
Documentation Management Biosafety and Biosecurity Awareness Training For Afghan and Pakistani Bioscientists January 12-14, 2010 SAND No P Sandia.
Lesson 1-What Is Information Security?. Overview History of security. Security as a process.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 16: Physical and Infrastructure Security.
NVIC VESSEL SECURITY PLAN OUTLINE
1 SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of.
SAND Number: P Sandia is a multi-program laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department.
Personal Protective Equipment Biosafety and Biosecurity Awareness Training For Afghan and Pakistani Bioscientists January 12-14, 2010 SAND No P.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
TM Foundations of Real Estate Management BOMA International Module 5: Putting it All Together Security ® ®
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
Proving Your Case - Computer Security Terrence P. Maher Abrahams Kaslow & Cassman
A Secure Frontline September 25, 2003
Personnel Management SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
BUSINESS B1 Information Security.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.
General Requirements for a BSL-3/4 Laboratory
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Material Control & Accountability
Material Control and Accountability SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company,
Lesson 4 Physical Security - Motion Sensor - Passive Ultrasonic Sensor - Photoelectric System - Ultrasonic - Ultrasonic Motion Sensor - Vibration Sensor.
Physical (Environmental) Security
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
PARTNERING for your INTERESTS Companies invest in security to protect their people, property and information. In doing so, they are also protecting the.
Principles of Security
Physical security By Ola Abd el-latif Abbass Hassan.
Site Control Instructional Goal The participant will see the need for a well-planned site control program and will experience some of the decision making.
Unit 32 – Networked Systems Security
Access Control Jeff Wicklund Computer Security Fall 2013.
Access Control for Security Management BY: CONNOR TYGER.
10. Security and Physical Protection Basic Concepts
INMM Nuclear Security and Physical Protection Technical Division.
Physical Security Ch9 Part I Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
3D Password.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
Criminal Justice Intro to Security, Instructor Name Date, Semester Chapter 4: PHYSICAL SECURITY: STRUCTURAL, ELECTRONIC, AND HUMAN PROTECTION SYSTEMS.
Unit 1: Protecting the Facility (Virtual Machines)
Module 5: Designing Physical Security for Network Resources
Physical and Technological Security
Domain 5 – Identity and Access Management
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
TWIC Training & Maritime Security Awareness
CompTIA Security+ Study Guide (SY0-401)
Level 2 Diploma Unit 11 IT Security
County HIPAA Review All Rights Reserved 2002.
Managing the IT Function
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Presentation transcript:

Physical Security SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy’s National Nuclear Security Administration under contract DE-AC04-94AL Biosafety and Biosecurity Awareness Training For Afghan and Pakistani Bioscientists January 12-14, 2010

1 Physical Protection System Principles Detection Intrusion Detection is the process to determine that an unauthorized action has occurred or is occurring Detection includes sensing the action, communicating the alarm, and assessing the alarm Delay Slowing down an adversary’s progress Response The act of alerting, transporting, and staging a security force to interrupt and neutralize the adversary Mitigation and recovery interface with the response function Access Control The mechanism to ‘by pass’ the physical security system

Detect unauthorized access Many types of intrusion detection Personnel notice unauthorized access Electronic Sensor Intrusion Detection

3 Video Assessment vs. Video Surveillance Assessment Alarm information triggered by sensor activation and directed to a human to determine if unauthorized access has occurred Cameras can be used to communicate Humans can directly observe Surveillance Continuous use of a human as a intrusion detector to monitor several restricted areas Systems often have many cameras Someone must watch all video screens all the time

4 Delay Slow down an intruder Detection should come before delay Many types of delay methods Guards Perimeter Fencing Solid doors with locks Bars on windows Magnetic switches on doors

5 Guards Guards delay and detect the intruders and in some cases also provide response

Response The objective of response is tied to the overall system objective Deny: To prevent an adversary from reaching the target/objective Contain: To ‘catch’ an adversary before they leave with the target or before they accomplish the objective Deter: To initiate consequence mitigation measures

7 Response Force On-site guard force Patrols perimeter and buildings Summons and directs local law enforcement Deters Can be the primary response depending on the motives of the adversary Information gathering for secondary response Local law enforcement Secondary response Reinforce on-site guard force Respond according to plan when summoned Equipped and authorized to confront adversary

8 Qualification and training Enforcement responsibilities and skills Equipment familiarity and training Familiarity with facility features and operations Knowledge of restricted area access and biosafety Guard Force Orders List specific duties and limits of authority Procedures for response to specific alarm conditions Emergency response procedures Notification list Memorandum of understanding with local law enforcement Specific instructions and agreements On-site training and orientation Response Force Requirements

Access Control Mechanism to ‘by-pass’ security system Allow entry of Authorized persons Prevent entry of Unauthorized persons Allow exit of Authorized persons

Basis of Access Controls Something you have Key Card Something you know Personal Identification Number (PIN) Password Something you are Biometric feature (i.e., fingerprints, face) Combining factors greatly increases security 10 Card PIN Biometrics

Access Control Techniques 11 Personnel Entry Control Manual Guard Verification of Identity Automated Credential (Coded badge) Memorized Number (PIN) Personal Characteristics (Biometrics) Controlled Key

Examples of Electronic Access Controls Coded Badges Proximity Cards Magnetic Stripe Badges Wiegand Cards Smart Cards Biometrics Fingerprint Scanner Hand Geometry Scanner Iris Scanner 12

Key Considerations in Selecting Access Controls Access control systems Can be low or high tech Give varying levels of assurance of person’s identity Risk assessment! Have error rates and enrollment issues 1-3% of the population is incompatible with any biometric device Must have secondary method for those who cannot pass automated inspection Needs to accommodate peak loads Should be designed for both entry and exit 13

Physical Security: Example Laboratory Building 14 WINDOW ENTRY AUTOCLAVE MECHANICAL ROOM AIRLOCK SHOWER CHANGE ROOM CENTRAL AREA LIMITED AREA EXCLUSION AREA

15 Questions to think About What types of detection devices would be appropriate in a bioscience facility and why? Are there types of detection devices that can not be used and why? What are appropriate delay mechanisms for a bioscience facility? How should a bioscience facility respond to an alarm? What types of access controls can be used? Where? Are there types that can not be used in a bioscience facility and why?