Physical Security and Contingency Planning CS432 - Security in Computing Copyright © 2008 by Scott Orr and the Trustees of Indiana University.

Slides:



Advertisements
Similar presentations
Physical Security.
Advertisements

GCSE ICT Networks & Security..
Chapter 7: Physical & Environmental Security
Mark Heggli Consultant to the World Bank Expert Real-time Hydrology Information Systems Workshop Module 4: Data Management Solutions for a Modernized HIS.
By: Mrs. Allen.  To protect yourself and equipment, never tamper with or remove any power cords or cables (including mouse and keyboard)  To safeguard.
If you use your computer more than a few hours per day, we suggest you not to turn off your computer at the end of the day. Instead turn off only the.
Physical and Environmental Security Chapter 5 Part 1 Pages 427 to 456.
Security: Playing in Safe By: Matt Hill Identification and Access Identification and Access | When Disaster Strikes | Disaster Recovery Plan | Software.
Maintaining and Troubleshooting Computer Systems Computer Technology.
Unit 3- Maintaining & Protecting Hardware.  Identify the importance of protecting computer hardware from theft and damage.  Explain how to protect data.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Physical (Environmental) Security.
Copyright © Center for Systems Security and Information Assurance Lesson Seven Physical Security.
Information Security Principles and Practices
 Computers, like any other piece of electronic equipment, need special care and attention in order to perform properly and safely.  It is always true.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 16: Physical and Infrastructure Security.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Physical Security Chapter 9.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
CB Warm-up Get the sheet from the front table and answer these questions. rbasics/14http://
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Physical Security.
MAINTAINING AND TROUBLESHOOTING COMPUTER SYSTEMS UNIT 6.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
CSC 382/582: Computer SecuritySlide #1 CSC 382/582: Computer Security Physical and EM Security.
Physical Security “Least sexy of the 10 domains but the best firewall in the world will not stand up to a well placed brick.”
Unit 4- Maintaining & Protecting Hardware.  Identify the importance of keeping a computer clean.  Explain what is needed to clean a PC.  Identify the.
Week 11 - Friday.  What did we talk about last time?  Security planning  Risk analysis  Security policies.
Mike Meyers’ CompTIA Network+ ® Guide to Managing and Troubleshooting Networks, Third Edition (Exam N ) © 2012 The McGraw-Hill Companies, Inc. All.
Computer Care.
Security and backups GCSE ICT.
OCR National in ICT Unit 1 – ICT in Business AO1 - Safe Working Practices in a Business Environment.
COMPUTER CARE & MAINTENANCE. Protecting Your Computer From Damage Like any kind of equipment, your computer requires care and maintenance to run smoothly.
Cyber Security. Security – It’s About Layers There’s no one stop solution to protection Each layer you add, an additional tool will be needed to pierce.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
2.00 Understand Computer Fundamentals. Unit Objective: 2.02.
2.00 Understand Computer Fundamentals. Unit Objective: 2.02.
© CCI Learning Solutions Inc. 1 Lesson 5: Basic Troubleshooting Techniques Computer performance Care of the computer Working with hardware Basic maintenance.
2.00 Understand Computer Fundamentals
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Physical Site Security.  Personnel  Hardware  Programs  Networks  Data  Protection from:  Fire  Natural disasters  Burglary / Theft  Vandalism.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 16 “Physical and Infrastructure.
Ensuring Network Security Making Networks Secure Maintaining a Healthy Network Environment Avoiding Data Loss 1.
Course ILT Safety Unit objectives Identify safety issues and hazards in the computer environment Identify ways to avoid injury and strain when working.
Computer Care Proper Computer Care Keep food and drinks away from the computer and keyboard. Avoid dusty locations. Use a surge protector. Keep away.
Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Security fundamentals Topic 11 Maintaining operational security.
Physical Security Katie Parker and Robert Tribbia Katie Parker and Robert Tribbia Computer Security Computer Security Fall 2008 Fall 2008.
Physical security By Ola Abd el-latif Abbass Hassan.
Physical Security Concerns for LAN Management By: Derek McQuillen.
Physical Security Ch9 Part II Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 13 – Physical and.
Computer Literacy BASICS: A Comprehensive Guide to IC 3, 5 th Edition Lesson 10 Data and Hardware Protection 1 Morrison / Wells / Ruffolo.
Computer Literacy BASICS: A Comprehensive Guide to IC 3, 5 th Edition Lesson 10 Data and Hardware Protection 1 Morrison / Wells / Ruffolo.
COMPUTER SAFETY AND CARE
Chapter 14: System Administration Mark Milan. System Administration Acquiring new IS resources Maintaining existing IS resources Designing and implementing.
Computer Technology. HardwareSoftware  Hardware ◦ Monitor ◦ Keyboard ◦ Hard disk drive ◦ Mouse ◦ CPU (Central Processing Unit) ◦ Graphic and sound cards.
Module 5: Designing Physical Security for Network Resources
Chapter 2: Introduction to Lab Procedures and Tool Use
IC3 GS3 Standard COMPUTING FUNDAMENTALS Module
Week 12 - Friday CS363.
NETW4005 COMPUTER SECURITY A
Data Management Solutions for a Modernized HIS
Chapter 6 Purchasing and Maintaining a Computer
Division of Computer Studies
Computer Care.
Level 2 Diploma Unit 11 IT Security
G061 - ICT Safety Problems.
Computer Care.
Computer Care.
Presentation transcript:

Physical Security and Contingency Planning CS432 - Security in Computing Copyright © 2008 by Scott Orr and the Trustees of Indiana University

Section Overview Environmental Threats Environmental Threats Accidents Accidents Physical Access and Threats Physical Access and Threats Backups Backups

References Security in Computing, 4 th Ed. Security in Computing, 4 th Ed. Chapter 8 (pg ) Chapter 8 (pg )

Physical Security Concerns Environmental Environmental Accidents Accidents Physical Access Physical Access Vandalism Vandalism Theft Theft Eavesdropping Eavesdropping Unattended Workstations Unattended Workstations

Environmental Threats Fire Fire Heat/Water (sprinkler) damage Heat/Water (sprinkler) damage Halon/CO 2 /Argon extinguishers Halon/CO 2 /Argon extinguishers Have a Plan! Have a Plan! Smoke/Dust Smoke/Dust Abrasive to components Abrasive to components Smoke-free environments Smoke-free environments Smoke alarms Smoke alarms Keep system ventilation ducts open and clean Keep system ventilation ducts open and clean

Environmental Threats (Con’t) Earthquakes Earthquakes Avoid putting systems on high surfaces Avoid putting systems on high surfaces Place systems away from bookcases, etc. Place systems away from bookcases, etc. Vibrations Vibrations Dampen with rubber/foam mats Dampen with rubber/foam mats Explosions Explosions Temperature Extremes Temperature Extremes Bugs/Rodents Bugs/Rodents

Environmental Threats (Con’t) Electricity Electricity Line noise: Surge suppressors Line noise: Surge suppressors Lightning: Unplug if possible Lightning: Unplug if possible Outages: UPS short term solution Outages: UPS short term solution Humidity Humidity Too little: Static electricity Too little: Static electricity Too much: Condensation on circuitry Too much: Condensation on circuitry Water: Auto shutdown on signal from sensor Water: Auto shutdown on signal from sensor

Accidents Food and drink on system components Food and drink on system components Can be prevented Can be prevented Don’t allow food/drink near systems Don’t allow food/drink near systems Educate users Educate users Practice what you preach!!! Practice what you preach!!!

Physical Access Doors/Windows Doors/Windows Locks Locks Key Cards, RFID, Biometrics, etc. Key Cards, RFID, Biometrics, etc. Raised Floors/Drop Ceilings Raised Floors/Drop Ceilings Air Ducts Air Ducts Many small vents Many small vents Screens Screens Glass Walls Glass Walls

Vandalism Targets System components System components System ventilation holes System ventilation holes Network cables Network cables Difficult to find/fix Difficult to find/fix Protected conduits Protected conduits Network connectors/jacks Network connectors/jacks

Theft RAM/Processors RAM/Processors Hard Drives/Removable Media Hard Drives/Removable Media Lost/Exposed Data Lost/Exposed Data Encryption Encryption Storage Disposal Storage Disposal Laptops/PDAs/Phones Laptops/PDAs/Phones Easily Stolen Easily Stolen Encryption Concerns Encryption Concerns Backup Media Backup Media

Eavesdropping Wiretapping Wiretapping Network Hubs Network Hubs Wire Splicing Wire Splicing Induction Loops Induction Loops Open Network Access Open Network Access Unused Office Data Jacks Unused Office Data Jacks Rogue Wireless Access Points Rogue Wireless Access Points Hardware Keyloggers Hardware Keyloggers Van Eck Radiation - Tempest Van Eck Radiation - Tempest

Unattended Workstations Full access to user’s files and resources Full access to user’s files and resources User-based protective measures User-based protective measures Education Education Screen locking Screen locking Keyboard locking Keyboard locking Automatic idle time logout Automatic idle time logout BIOS passwords BIOS passwords

Contingency Planning Backups Backups Network Storage Network Storage Remote Facilities Remote Facilities Cold Sites Cold Sites Hot Sites Hot Sites Formal Plan and Testing Formal Plan and Testing

Backups!!! Full versus incremental Full versus incremental Backup verification Backup verification Storage Storage Onsite Onsite Offsite Offsite Tape erasing Tape erasing Backup Encryption Backup Encryption