Physical Security By: Christian Hudson. Overview Definition and importance Components Layers Physical Security Briefs Zones Implementation.

Slides:



Advertisements
Similar presentations
PowerPoint ® Presentation Chapter 14 Homeland Security Homeland Security Building Layout Specific CBR Attack Prevention Recommendations Securing Outdoor-
Advertisements

Chapter 7: Physical & Environmental Security
Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security.
How Electronic Security Solutions can Help the Government in Securing its Assets and Reduce Energy expenditure Presented By- Nimish Vishnoi Manager-Product.
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
Deter Detect Delay Assess Respond Copyright © BES.
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Physical and Environmental Security Chapter 5 Part 1 Pages 427 to 456.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Physical (Environmental) Security.
1 Telstra in Confidence Managing Security for our Mobile Technology.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Introduction to Information Technology.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Introduction Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey.
Information Security Principles and Practices
Microsoft Technology Associate
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Session 3 – Information Security Policies
Chapter 3.  Security Framework  Operational Security Lifecycle  Security Perimeter  Access Control  Social Engineering  Environmental Issues.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Section Ten: Security Violations and Deviations Note: All classified markings contained within this presentation are for training purposes only.
Module 02: 1 Introduction to Computer Security and Information Assurance Objectives Recognize that physical security and cyber security are related Recognize.
Property Risks – The Surveyor’s Perspective Stuart Blackie UK Risk Engineering - Property Snakes & Ladders Managing Risk in Higher Education 23 April 2008.
Understanding Security Layers
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Overview Of Information Security Management By BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
PANTHER SECURITY AND PRIVATE INVESTIGATION Security is degree of protection against danger, damage, loss and crime.
Chapter 18 Institutional Security. Special Security Institutions  Hospitals and other health care facilities.  Educational institutions.  Libraries.
Physical Site Security.  Personnel  Hardware  Programs  Networks  Data  Protection from:  Fire  Natural disasters  Burglary / Theft  Vandalism.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Note1 (Admi1) Overview of administering security.
Physical (Environmental) Security
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Unit 3: Identifying and Safeguarding Vital Records Unit Introduction and Overview Unit objective:  Describe the elements of an effective vital records.
LESSON 11 PHYSICAL SECURITY Prepared by: Camo, Christian Leo O. BS Criminology LEA 2.
Chap1: Is there a Security Problem in Computing?.
Site Security Policy Case 01/19/ : Information Assurance Policy Douglas Hines, Jr.
The Importance of Proper Controls. 5 Network Controls Developing a secure network means developing mechanisms that reduce or eliminate the threats.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Physical security Dr.Talal Alkharobi.
The Need for Access Control & Perimeter Protection
10. Security and Physical Protection Basic Concepts
Physical Security Ch9 Part I Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
The Physical Security in UTM NAWAF OMAR MAN Prof Hafiza Abas.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
Criminal Justice Intro to Security, Instructor Name Date, Semester Chapter 4: PHYSICAL SECURITY: STRUCTURAL, ELECTRONIC, AND HUMAN PROTECTION SYSTEMS.
Unit 1: Protecting the Facility (Virtual Machines)
Module 5: Designing Physical Security for Network Resources
Onsite CRM Security
Physical and Technological Security
Information Systems Security
CS457 Introduction to Information Security Systems
CompTIA Security+ Study Guide (SY0-401)
Risk management.
NETW4005 COMPUTER SECURITY A
Understanding Security Layers
A Holistic Approach to School Security
INFORMATION SYSTEMS SECURITY and CONTROL
Objectives Telecommunications and Network Physical and Personnel
Physical Security.
Managing the IT Function
Presentation transcript:

Physical Security By: Christian Hudson

Overview Definition and importance Components Layers Physical Security Briefs Zones Implementation

Definition Physical security is the protection of personnel, hardware, programs, networks, and data from physical circumstances and events that could cause serious losses or damage to an enterprise, agency, or institution. This includes protection from fire, theft, vandalism, natural disasters, and terrorism.

Is physical security important? Significance is underestimated Breaches in action require no technical background Accidents and natural disasters are inevitable so preparation is necessary

Components Accidental and environmental disasters  Placing obstacles  Idea is to confuse attacker, delay serious ones, and attempt to avoid the inevitable Monitoring and notification systems  Security mechanisms to monitor and detect potential harm or violations  Alarms, security lighting, security guards or closed- circuit television cameras (CCTV)

Components (cont.) Recovery mechanisms  To repel, catch or frustrate attackers when an attack is detected  Intrusion handling

Layers Environment Design  First layer of physical protection  Consists of external design void off intruders  May include objects like barbed wire, warning signs, fencing, metal barriers, and site lighting

Layers (cont.) Mechanical and electronic access control  Prevents intruders or unauthorized users to direct access to physical components  Includes gates, doors and locks

Layers (cont.)

Monitoring system  Less of a preventative measure  Used more for incident verification and analysis  Most common mechanism is CCTVs

Layers (cont.) Intrusion Detection  Monitors for attacks  Less of a preventative measure  More of an response mechanism  Alarms/Notification

Physical Security Briefs Security site brief  Security policies used for the framework of preventing the access to a physical setting Security design brief  Security policies used for the layout or design for a physical entity (may be coding, layout for servers, access control, etc)

Zoning Public Zone  Public has access to this area of a facility and its surrounding  Examples are facility grounds, elevator lobbies, etc Reception Zone  Zone which entail the transition from a public zone to a restricted-access area of control  Typically means where the contact of visitors and a department is initiated

Zones (cont.) Operations Zone  An area where access is limited to personnel who work at facility and to escorted visitors  Production floors and open office areas Security Zone  An area to which access is limited to authorized personnel and to authorized and escorted visitors  Area where secret information is processed/stored

Layers (cont.) High Security Zone  An area where access is limited to authorized, appropriately screened personnel and authorized and properly escorted visitors  A general example would be an area where high-value assets are handled by selected personnel

Implementation State the plan’s purpose Define the areas, buildings, and other structures considered critical and establish priorities for their protection Define and establish restrictions on access and movement of critical areas  Categorize restrictions

Questions?

References and Resources Bishop, Matt. Introduction to Computer Security. Massachusetts: Pearson Education, Inc., llc.com/Physical%2520Security%2520PolicyV4.pdf+physical+ security+policy&hl=en&ct=clnk&cd=1&gl=us - llc.com/Physical%2520Security%2520PolicyV4.pdf+physical+ security+policy&hl=en&ct=clnk&cd=1&gl=us ,00.html ,00.html security.html security.html