Physical and Environmental Security Chapter 5 Part 2 Pages 457 to 499.

Slides:



Advertisements
Similar presentations
Electricity Chapter 13.
Advertisements

Electricity.
POWER QUALITY BACKGROUND & ELEC-SAVER TVSS
CISSP Luncheon Series: Physical (Environmental) Security
General Safety Overview and Information
Physical and Environmental Security
Chapter 4 Electricity and Power Supplies. You Will Learn…  How electricity is measured  How to protect your computer system against damaging changes.
Computer Security Computer Security is defined as:
Heating Control Devices
Engine Systems and Components
Physical and Environmental Security Chapter 5 Part 1 Pages 427 to 456.
Maintaining and Troubleshooting Computer Systems Computer Technology.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Physical (Environmental) Security.
Copyright © Center for Systems Security and Information Assurance Lesson Seven Physical Security.
Stephen S. Yau CSE 465 & CSE591, Fall Physical Security for Information Systems.
Information Security Principles and Practices
 Computers, like any other piece of electronic equipment, need special care and attention in order to perform properly and safely.  It is always true.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 16: Physical and Infrastructure Security.
Information Systems Security Physical Security Domain #4.
Power Supplies Chapter 6. Understanding Electricity Electricity is simply a flow of negatively charged particles, called electrons, through matter Materials.
Physical Security Chapter 9.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Chapter 3.  Security Framework  Operational Security Lifecycle  Security Perimeter  Access Control  Social Engineering  Environmental Issues.
Security Devices A modern security system, with its array of electronic components, is designed to sense, decide, and act. The security system senses events.
Physical Security.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Physical Security.
1 12. Physical Security ISA 562 Internet Security Theory & Practice.
MAINTAINING AND TROUBLESHOOTING COMPUTER SYSTEMS UNIT 6.
每时每刻 可信安全 1 What category of water sprinkler system is currently the most recommended water system for a computer room? A Dry Pipe sprinkler system B Wet.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
This courseware is copyrighted © 2011 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Physical Security By Pallavi Wankhede ISQS Physical Security Sub-divisions of Physical Security Means of implementing physical security Merits and.
Technician License Course Chapter 5 Amateur Radio Equipment Lesson Plan Module 12: Power Supplies and Batteries & RF Interference (RFI)
IT Essentials: PC Hardware and Software 1 Chapter 10 Preventative Maintenance.
Chapter 6.  Natural environmental threats  Supply system threats  Manmade threats  Politically motivated threats.
Physical Security “Least sexy of the 10 domains but the best firewall in the world will not stand up to a well placed brick.”
Chapter 6 – Physical and Environmental Security Brian E. Brzezicki.
Unit 4- Maintaining & Protecting Hardware.  Identify the importance of keeping a computer clean.  Explain what is needed to clean a PC.  Identify the.
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 2 1 Chapter 2: Safe Lab Procedures and Tool Use IT Essentials:
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
1 Hardware Security AbdelRahman abu_absah Teacher: Dr. Sanaa al_sayegh.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 16 “Physical and Infrastructure.
Electric Charges & Current Chapter 7. Types of electric charge Protons w/ ‘+’ charge “stuck” in the nucleus Protons w/ ‘+’ charge “stuck” in the nucleus.
Course ILT Safety Unit objectives Identify safety issues and hazards in the computer environment Identify ways to avoid injury and strain when working.
Physical (Environmental) Security
Physical Security Katie Parker and Robert Tribbia Katie Parker and Robert Tribbia Computer Security Computer Security Fall 2008 Fall 2008.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 4 Electricity and Power Supplies.
POWER FLUCTUATIONS Computer Systems. Power Fluctuations Voltage is the force that moves electrons through a circuit Unsteady voltages are called power.
Chapter 6 Lesson 2. How can electricity flow? When an object gains of loses electrons, it has an electric charge. Similar to magnetic force, unlike charges.
Safe Lab Procedures and Tool Use
Physical Security Concerns for LAN Management By: Derek McQuillen.
Copyright© 2005 Avaya Inc. All rights reserved Avaya UPS Training powerware.com/avaya.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: Safe Lab Procedures and Tool Use IT Essentials 5.0.
Electricity. TYPES OF CIRCUITS Individual electrical circuits normally combine one or more resistance or load devices. The design of the automotive electrical.
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 2 1 Chapter 2: Safe Lab Procedures and Tool Use IT Essentials:
Presented BY BEISecurity. Fiber-Optic Perimeter Intrusion Detection System.
HOW NOT TO INCORRECTLY CARE FOR COMPUTER HARDWARE HANDLING AND STORAGE BY BLAINE AND ZACH.
Criminal Justice Intro to Security, Instructor Name Date, Semester Chapter 4: PHYSICAL SECURITY: STRUCTURAL, ELECTRONIC, AND HUMAN PROTECTION SYSTEMS.
Physical Security.
CompTIA Security+ Study Guide (SY0-401)
NETW4005 COMPUTER SECURITY A
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: Safe Lab Procedures and Tool Use IT Essentials 5.0.
CompTIA Security+ Study Guide (SY0-401)
Physical and Environmental Security
CompTIA Security+ Study Guide (SY0-501)
Apply your knowledge Module 2.
Chapter 10 Physical Security
Chapter Overview Power Supplies Power Supply Problems.
Presentation transcript:

Physical and Environmental Security Chapter 5 Part 2 Pages 457 to 499

Protecting Assets Laptop thefts Cost to replace stolen items – Productivity – Reputation – Cost to restore lost data

Laptop Thefts Page 457 list Tracking software Safe for backups

Electric Power August 2003, 8 east coast states and portions of Canada lost power for several days Need a plan for fall back for storms, hardware failure, lightning and other disruptions of power

UPS Uninterrupted Power Supply Figure 5-6 on page 460 Standby UPS – Inactive until power failure – Switch to battery pack Online UPS Systems – AC Voltage line charges, constantly provide power – Most faster than standby

UPS Some just provide enough power to gracefully shutdown Others will allow systems to run for a longer period of time. Should be tested periodically

Line Noise Figure 5-7 on page 461 RFI – Radio Frequency Interference EMI – Electromagnetic Interference

Voltage Fluctuations Page 462 list When an electrical device is turned on it can draw a large amount of current (in-rush current). This can cause a sag in current for surrounding devices. It is a good idea to have the data center on a different wiring segment

Voltage Fluctuations Surge – A common problem – Storms, lightning – Surge protector Blackout – Voltage drops to zero Brownout – High demand such as a heatwave

Voltage Fluctuations Voltage regulators and line conditioners to ensure clean and smooth distribution of power. Figure 5-8 on page 464 List on page 465

Shutoff Valves Figure 5-9 on page465 Gas – in case of fire Water – in case of water pipe break

Environment & Electronic Equipment High humidity – corrosion Low humidity – static electricity – Spark from your finger several thousand volts – Winter and dry climates – Preventive step on page 467

Environment & Electronic Equipment Low Temperature – stop working High Temperature – Table 5-1 on page 466 Ventilation – Closed-loop filters and recycles air Positive pressurization – outside air does not enter Dust – clogs up fans

Fire Fire Prevention – Train employees to react properly when faced with a fire

Fire Detection Ignition – Combustible materials, malfunctioning heating devices, arson Computer systems are not combustible Electric fires are caused by overheating of wire insulation or overheating of electrical components that ignite surrounding plastic

Fire Detection Smoke activates – Figure 5-11 on page 470 Heat activated – Fixed Temperature – Rate-of-rise of temperature Quicker, more false positives Figure 5-12 on page 471 – Where the wiring is

Fire Suppression Page 472 – Figure 5-2 Page 473 – Figure 5-3 – Halon has not been manufactured since 1992 HVAC should shutdown in case of fire so smoke is not spread throughout the building

Water Sprinklers In a electrical fire, water can increase the intensity of the fire because it can work as a conductor for electricity Wet pipe – water in pipe Dry pipe – water in holding tank until it is released Preaction – Not held in pipe. Released when pressurized air within the pipe is reduced.

Perimeter Security Layered Defense Figure on page 476 Two modes 1.When the facility is open 2.When the facility is closed

Facility Access Control “Having personnel in sensitive areas is one of the best security controls because they can personally detect suspicious behavior.” Entrances and Exits – Figure 15-4 on page 417

Locks Locks can be picked or broken. Ward Lock – Figure 5-16 on page 479 Tumbler Lock – Figure 5-17 on page 479 Combination Lock Cipher Lock – Use keypad

Administrative Responsibility Key maintenance and procedures Lock choice Master Key, Submaster keys, individual keys

Circumventing Locks Tension wrench – Holds down internal cylinders while figuring out next cylinder

Personnel Access Control Identification of person attempting to access the facility – Biometric – Smart Card – Photo ID – Key – Card with PIN or Password Piggybacking

External Boundary Protection Bullets on pages Fences – Height (Pages 485-6) – Gauge and Mesh (Page 486) – Classification (Page 487) Bollards – Small concrete pillars

Lighting Unlit parking areas invite car break ins and attacking employees. Higher wattage more illumination. If the area has clean concrete and light- colored painted surfaces, then not as much illumination is required. Direct lighting toward where intruders will come from and away from security forces.

Lighting Direct lighting toward where intruders will come from and away from security forces. (glare protection). Responsive illumination – When IDS detects suspicious activity. – Turn on CCTV cameras to scan for intruders. Protect against lights being turned off or power cut to them.

Surveillance Devices Closed –Circuit TV (CCTV) – Figure 5-10 on page 491 – Considerations for purchase Internal or External Areas Large or small area Lit, unlit, sunlight – Charged-coupled devices (CCD) Light to electronic signals Extraordinary details

CCTV “When both wide scenes and close-up captures are needed, zoom lens is best.”

Intrusion Detection Systems Sense changes in the environment Perimeter scanning device – Figure 5-22 on page 494 Strip of foil embedded in a window Pressure pad under a carpet Photoelectric system detects change in a light beam

Security Guards – Costly – Screening is important – Need to be trained Dogs – Detect intruders – Hearing and sight outperforms humans