Physical security By Ola Abd el-latif Abbass Hassan.

Slides:



Advertisements
Similar presentations
Chapter 7: Physical & Environmental Security
Advertisements

HIPAA Security Standards Emmanuelle Mirsakov USC School of Pharmacy.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Mr C Johnston ICT Teacher
BIOMETRICS: Libraries have begun to see the value of biometrics. M.G. SELVI Technical Officer Center of Advanced Study in Crystallography and Biophysics,
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Security A system is secure if its resources are used and accessed as intended under all circumstances. It is not generally possible to achieve total security.
SECURITY Of the five basic elements of an Information System, DATA is our main concern in relation to security practices.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Brendan Cooney CSC 152. What is Input? Any data or instructions entered into the memory of a computer Data- unprocessed information Instructions- steps.
Marjie Rodrigues
Security-Authentication
Chapter 3.  Security Framework  Operational Security Lifecycle  Security Perimeter  Access Control  Social Engineering  Environmental Issues.
Administrative Practices Outcome 1
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Prepared by:Nahed AlSalah Data Security 2 Unit 19.
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
The Impact of Physical Security on Network Security
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Understanding Security Layers
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
BUSINESS B1 Information Security.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
© CCI Learning Solutions Inc. 1 Lesson 5: Basic Troubleshooting Techniques Computer performance Care of the computer Working with hardware Basic maintenance.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Networked Information Systems Network Security. Network Physical Security File server failure can severely affect network users. Server security: Locked.
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
Security Issues and Strategies Chapter 8 – Computers: Understanding Technology (Third edition)
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
1 Information Systems CS-507 Lecture Types of Controls Access Controls – Controlling who can access the system. Input Controls – Controls over how.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
PRESENTATION ON BIOMETRICS
Access Method. “ ” A key is usually intended to operate one specific lock or a small number of locks that are keyed alike, so each lock requires a unique.
Security fundamentals Topic 11 Maintaining operational security.
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.
LO: To be able to describe and compare physical and logical methods of security. All of you will be able to: Describe how physical security measures can.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
Lesson 8-The Impact of Physical Security on Network Security.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
Networking Network Classification, by there: 3 Security And Communications software.
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
Unit 32 – Networked Systems Security
Physical Security Concerns for LAN Management By: Derek McQuillen.
Technical Devices for Security Management Kathryn Hockman COSC 481.
Access Control Jeff Wicklund Computer Security Fall 2013.
BOPS – Biometric Open Protocol Standard Emilio J. Sanchez-Sierra.
Information Systems Design and Development Security Precautions Computing Science.
An Introduction to Biometrics
ANS File Security Chapter # 29 ( Prepared by : Mazhar Javed ) 1 Data Security “Protection against loss, corruption of, or unauthorized access of data”
Module 5: Designing Physical Security for Network Resources
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Administrative Practices Outcome 1
UNIT 19 Data Security 2.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Understanding Security Layers
Business Risks of Insecure Networks
Resource Management Chapter 19 9/20/2018 Crowley OS Chap. 19.
Level 2 Diploma Unit 11 IT Security
County HIPAA Review All Rights Reserved 2002.
Security of Data  
Managing the IT Function
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Presentation transcript:

Physical security By Ola Abd el-latif Abbass Hassan

There are many people should made accountable For security Physical security prevent unauthorized access Physical measures taken to protect Personnel and Assets Technicalmeasures taken to protect system (services and information technology element) Operational measures taken to protect from threats

Other equipment Access control Computer equipment maintenance Wiretapping Remote access Physical security check list Building surroundings Premises Reception Server Workstation area Wireless access points

Building surroundings The entrance to the building should be restricted to only authorized access Gats, Walls, Guards, Alarm should be secure

Premises Premises should be protected by CCTV Cameras with monitored screen and video recorded Intruder system Panic buttons Burglar alarms

Reception Reception must be design to keep file and document far from people in put every thing in order Receptionist must be careful to close desk and lock PCs after office hours

Server Servers is most important issues for any network it must be well lit Server should not be used day to day activities Remove DOS to prevent booting the server remotely Disable booting from floppy disk Avoid having any removable media or CD-ROM drive

Workstation area Workstation area where the majority of employee works It must be design well and use CCTV cameras The monitors and PCs must be locked

Wireless access points So simple to any intruder to act like any employee if he connected the company LAN by wireless access point So there are some rules must be followed WEP encryption SSID should not be revealed Every user has password to connect Password must be strong to prevent cracking

Other equipment like fax and removable media Fax must be locked if it is near reception removable media should not be in public place

Access control Access control used to prevent unauthorization access to work area there are many type of access control such as Separation of work area Biometric access control Entry cards Man traps Faculty sign-in procedures Identification badges

Biometric Identification Techniques Biometric devices consist of Reader or scanning devices Software that convert the scanned information to digital form Location for the data to be analyzed so we can save and comparison data Many methods use biometric devices such as Fingers prints Face scan Iris scan Voice recognition

Fingers prints Unique Surface of a finger used to identify person Iris scan Analysed the colored part of the eye retinal scanning Analysed the layer of blood vessels at the back of the eye Vein structure Thickness and location of veins Biometric Identification Techniques

Authentication Mechanism Authentication Mechanism challenge : biometric Fingerprints can be facked, face recognition can be tricked, rentail scan can hinder if the user does not focus on given point, iris scan very expensive So you must use a traditional password system Includes mechanisms such as challenge – response list, smarts card

Smart Cards It is a plastic card embedded microchip that loaded with data which identify the person and his authorization like personnel identification numbers Security token It is a small hardware that the owner carries to authorized access area or access network

Computer equipment maintenance The AMC company personnel should not left alone when they come for a maintenance

Wiretapping The action of secretly listing to other people’s conversation by device that interpret theses pattern as sound How to prevent wiretapping Inspect all data carrying wires routinely Using shield cables Never leave wire exposed

Remote access The employee can access remotely to company the network The most important reasons to avoid Remote access Easy for attack The data must be encrypted while transferring