Physical Security “Least sexy of the 10 domains but the best firewall in the world will not stand up to a well placed brick.”

Slides:



Advertisements
Similar presentations
Physical Security.
Advertisements

Facilities Management and Design Chapter 4 Safety and Security systems.
Emergency Preparedness and Response
Chapter 7: Physical & Environmental Security
Computer Security Computer Security is defined as:
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
Physical and Environmental Security Chapter 5 Part 1 Pages 427 to 456.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Physical (Environmental) Security.
Copyright © Center for Systems Security and Information Assurance Lesson Seven Physical Security.
Principles of Information Security, 3rd Edition 2 Introduction  Physical security addresses the design, implementation, and maintenance of countermeasures.
Stephen S. Yau CSE 465 & CSE591, Fall Physical Security for Information Systems.
Information Security Principles and Practices
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 16: Physical and Infrastructure Security.
Information Systems Security Physical Security Domain #4.
Physical Security Chapter 9.
CVFD Training – Fire Protection Systems
What you will learn in this session 1.The characteristics of fire, smoke and toxic fumes 2.Fire hazards involved in the working environment 3.Significant.
Chapter 3.  Security Framework  Operational Security Lifecycle  Security Perimeter  Access Control  Social Engineering  Environmental Issues.
Security Devices A modern security system, with its array of electronic components, is designed to sense, decide, and act. The security system senses events.
Physical Security EECS710 Fall 2006 Professor Saiedian Presenter:
Physical Security.
Control Rooms  Serve as operations centers for the control and monitoring of a service or process  Flight control rooms  Power generation control rooms.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Physical Security.
1 12. Physical Security ISA 562 Internet Security Theory & Practice.
Welcome Presentation On Office security system. Group Members: Md. Emdadul Haque Md. Sahed Hasan Md. Samsul Arefin Khokan Das.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Introduction Physical security addresses design, implementation, and maintenance of countermeasures that protect physical resources of an organization.
每时每刻 可信安全 1 What category of water sprinkler system is currently the most recommended water system for a computer room? A Dry Pipe sprinkler system B Wet.
Principles of Information Security, Fourth Edition
Principles of Information Security, Fifth Edition
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Module 02: 1 Introduction to Computer Security and Information Assurance Objectives Recognize that physical security and cyber security are related Recognize.

Chapter 6.  Natural environmental threats  Supply system threats  Manmade threats  Politically motivated threats.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Principles of Information Security, 2nd Edition 2 Learning Objectives Upon completion of this material, you should be able to:  Understand the conceptual.
LABORATORY DESIGN AND SAFETY EQUIPMENT. 1. LABORATORY DESIGN a. Egress b. Traffic Patterns c. Floor Surfaces d. Master Controls e. Automated Detection.
CLIC CES Webex 12 Nov Summary: – Set of fire safety measures defined in CERN Safety Report – Proposed Structure for CLIC/ILC Fire Safety Report Fabio.
HE UTTAR PRADESH FIRE PREVENTION AND FIRE SAFETY RULES 2005
Preparing for Disasters General Liability. Introduction  The one coverage that provides you and your business the most protection is General Liability.
Information Systems Security Operations Security Domain #9.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 16 “Physical and Infrastructure.
CLIC CES Meeting 14 jan 2009 A resume table for fire safety in LHC, and a possible scheme for other machine – part 1 CERN –SC Fabio Corsanego.
Course ILT Safety Unit objectives Identify safety issues and hazards in the computer environment Identify ways to avoid injury and strain when working.
Physical Security and Contingency Planning CS432 - Security in Computing Copyright © 2008 by Scott Orr and the Trustees of Indiana University.
Lesson 4 Physical Security - Motion Sensor - Passive Ultrasonic Sensor - Photoelectric System - Ultrasonic - Ultrasonic Motion Sensor - Vibration Sensor.
Add name of trust / organisation in box 1 and name of trainer in box 2. Delete THIS box.
Physical (Environmental) Security
Fire No institution is immune from fire. Flood damage can be dried out and restored, stolen property has a chance of being recovered; damage from fire.
Chapter 5 ID 234 Building Codes Fire Resistant Materials and Assemblies.
Physical Security Chapter 9 If someone really wants to get at the information, it is not difficult if they can gain physical access to the computer or.
Physical and Environmental Security Chapter 5 Part 2 Pages 457 to 499.
PHYSICAL SECURITY DOMAIN
What you will learn in this session 1.The characteristics of fire, smoke and toxic fumes 2.Fire hazards involved in the working environment 3.Significant.
10. Security and Physical Protection Basic Concepts
Physical Security Ch9 Part I Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
Physical Security Ch9 Part II Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 13 – Physical and.
Criminal Justice Intro to Security, Instructor Name Date, Semester Chapter 4: PHYSICAL SECURITY: STRUCTURAL, ELECTRONIC, AND HUMAN PROTECTION SYSTEMS.
Physical Security.
Risk management.
What you will learn in this session
Presentation On Office security system
NETW4005 COMPUTER SECURITY A
GES SYSTEM THE IMPORTANCE OF GES SYSTEM IN BUILDING
Apply your knowledge Module 2.
Fire Prevention Safety Department
Chapter 10 Physical Security
Objectives Telecommunications and Network Physical and Personnel
Fire safety Module 10.
Presentation transcript:

Physical Security “Least sexy of the 10 domains but the best firewall in the world will not stand up to a well placed brick.”

Physical Security  Addresses threats, vulnerabilities, countermeasures to physically protect org’s resources & sensitive info  Natural disasters  Unauthorized entry and/or theft

Threats  Risk analysis or business impact assessment identify threats  Seven major sources of physical loss 1.Temperature 2.Gases 3.Liquids 4.Organisms 5.Projectiles 6.Movement 7.Energy Anomalies

Controls for Physical Security  Administrative Controls Emergency Procedures, Personnel control, & planning and policy implementation  Physical & Technical Controls

Facility Requirements Planning  Planning done in early stages of construction of data facility  Choosing a Secure Site  Designing a Secure Site

Choosing a Secure Site  Visibility: neighbors, external markings  Local Considerations: near possible threats, local crime rate  Natural Disasters: weather related, earthquake fault  Transportation: excessive air, highway or road traffic  Joint Tenancy: HVAC controls, elecriticity  External Services: local emergency, hospitals

Designing a secure site  Walls: fire ratings rooms & storage  Ceilings: weight-bearing, fire rating  Floors: weight bearing, static, electrical cables  Windows: none or translucent & shatterproof  Doors: resist forcible entry, fire rating, personnel safety is first  Sprinkler systems: fire resistant rating of not less than 1 hour  Liquid or gas lines: positive (outward) flow  Air Conditioning: dedicated power circuits, positive air flow  Electrical Requirements: dedicated circuits, alternative

Facility Security Management  Audit Trails Detecting security violations Performance Problems Design & programming flaws Include: date & time, successful or not, Where access granted, Who tried, data modified? Detective rather than preventative  Emergency Procedures Include: emergency shutdown procedures, Evacuation, Employee training, periodic tests

Administrative Personnel Controls  Human resources department  Pre-employment screening  Ongoing employee checks  Post-employment procedures

Environmental & Life Safety Controls  “Physical controls necessary to sustain either computer’s operating environment (OE) or personnel’s OE”  Main Areas: Electrical Power Fire detection & suppression Heating, Ventilation, & Air Conditioning (HVAC)

Electrical Power  Noise Radio frequency interference, EMI Cell phones, laptops, other ele. Equip. EMI eavesdropping Power line conditioning, proper shielding, grounding, magnets, fluorescent lights, electric motors, space heaters  Brownouts & Sag (NYC 15% common) Surges & spikes when come back up  Humidity Low == static (20,000 volts possible)

Fire Detection & Suppression  Fire classes, combustibles, detectors, & suppression methods  Factors in priority order: 1.Life safety aspects 2.Fire threat of installation to occupants & property 3.Economic loss from computing function 4.Economic loss from loss of equipment

Fire Classes & Combustibles  Classes A.Common combustibles – water or soda acid B.Liquid – CO 2, soda acid, or halon C.Electrical – CO 2 or halon  Fire requires: oxygen, heat, & fuel  Water: temperature, soda acid: fuel supply, CO 2 oxygen, halon: chemical reaction

Fire Detectors  Heat sensing Predetermined temp or fast change  Flame-actuated Infrared or pulsation of flame  Smoke-actuated In ventilation systems  Automatic dialup fire alarm

Fire Extinguishing Systems  Water Sprinkler Wet Pipe, Dry Pipe, Deluge, or Preaction (combination of wet & dry pipe)  Gas Discharge Pressurized inert gas CO 2, halon, argon, argonite, inergen

After the fire  Contamination Smoke: little damage at first, residue Heat Water Suppression medium  Water damage Shutoff power Move equipment Drain Wipe parts & spray

Physical & Technical Controls  Facility Control Requirements  Facility Access Control Devices  Intrusion Detection & Alarms  Computer Inventory Control  Media Storage Requirements

Facility Control Requirements  Guards  Dogs  Fencing  Mantrap  Lighting  Locks  Closed Circuit TV

Facility Access Control Devices  Security Access Cards Dumb: photo id Smart: digital coded smart card Smarter: processor on card  Wireless Proximity Readers Passive, field powered, transponders  Biometric

Intrusion Detection & Alarms  Perimeter Intrusion Detectors Photoelectric & dry contact switches  Motion Detectors Wave pattern (reflection), capacitance (electrical field), audio detectors  Alarm Systems Local, central station, proprietary Line supervision

Computer Inventory Control  Physical PC Control Cable locks Port controls Switch Controls Peripheral Switch Controls Electronic Security Boards  Laptops

Media Storage Requirements  Ongoing Storage Access & Environment  Disposal Clearing – overwriting (7 times min), Purging – Degaussing or overwriting, Destruction Erasing only changes FAT, Damaged sectors not changed, overwrite may not change cause new file shorter,  Encryption of sensitive data

Simplest Way to check physical Security  “walk-about”