Presentation is loading. Please wait.

Presentation is loading. Please wait.

Unit 1: Protecting the Facility (Virtual Machines)

Similar presentations


Presentation on theme: "Unit 1: Protecting the Facility (Virtual Machines)"— Presentation transcript:

1 Unit 1: Protecting the Facility (Virtual Machines)

2 How do you protect the facility

3 Risk Assessment 5 Risk Management Steps Identify – Count your _________ (inventory) Protect – Explain how you will protect assets (Train employees) Detect – Describe how you would know if someone or something was attempting to access, disable, degrade, or destroy one or more of the devices and/or systems in the substation (Monitor Personnel activity) Respond – Describe how you will react to the violation. (Examine information stored on servers) Recover –Describe how you return things back to normal?

4 How do you protect your business?

5 Infrastructure Security Defined Layers of Infrastructure Security When ____________ security initiatives are applied to providing security for the basic physical and organizational structures needed for the operation of an enterprise, organization and society.

6 The 3 Layers of Infrastructure Security  There must be a plan for designed for physically securing an infrastructure asset (a property, a building, a physical space, a system or a device):  Controls who can move (walk, drive, fly) across the physical facility. The outer perimeter –Examples property line the __________ walls of building. The inner perimeter – Examples doors and windows – either exterior or interior. The interior – Examples. inner-most level of security: inside of the building, office, cubicle, etc.

7 Infrastructure Security Protecting the Server Access control and ___________ systems Intrusion detection and reporting systems Video surveillance systems

8 The 1 st step Access Control  It is the first step to securing a physical facility.  It exists to deter potential intruders.

9 Access Control Security Terms 1. Ingress is the right of an individual to __________ a property, while 2. Egress is the legal right to leave a property. 3. Regress is the term used to describe the legal right to reenter a property. 4. Right is a legal privilege or permission granted to someone, or some group, by some recognized source of authority. This source can be a government, a legally recognized governmental agent, or a legally recognized owner of an asset. 5. Authorized person someone who has the right to access an asset. 6. Unauthorized person is anyone who has not been given this right. When unauthorized people attempt to gain access to an asset they do not have rights to access they become intruders.

10 Access Control provides….. Authorization  It involves being able to control the ingress, egress and regress to an ________ (Building)  Limiting the access of unauthorized personnel to important assets is the most fundamental security step that businesses can take.

11 Security Policies consists of ____________ control policy at each level that provides authorized people with appropriate levels of access to selected assets, while inhibiting access to assets by people who are not authorized. Tools used to enforce policies:  Sensors  Barriers  Logs  ID badges  Security guards

12 Access Control Physical _____________ Controls

13 Access Control Tool ___________ Locks and Keys

14 Authentication Systems Authentication- is the process of determining if someone is who they say they are. ________________ is based on authentication.

15 Authentication Factors Knowledge – Something that only the designated person should _____ Possession – Something that only the designated person should have Inheritance – Something that only the designated person is Location – Somewhere that only the designated person is

16 Types of Authentication Systems 1. Single authentication systems- Ex. Possessing a _____ that unlocks a device 2. Two-factor authentication systems Ex. possessing knowledge and possession of key. 3. Multi-factor authentication systems Ex. more than 2 authentication factors present.

17 Access Control Tool Smart Cards

18 Access Control Tool RFID

19 Access Control Tool Biometric Scanners Biometrics uses human physical ______________ to verify individuals.

20 Remote Access Monitoring Remote monitoring refers to ____________ or measurement of devices from a remote location or control room. In the security realm this involves having external access to the security system through a communication system.

21 Remote Access Monitoring Notifies supervisory security personnel when an unauthorized access or intrusion is attempted.

22 Remote Access Monitoring Notifications can come in the form of a visual notification, telephone call, instant messenger notice, or a ______ message, strobe lights, and high intensity sirens.

23 Access Control Monitoring Remote Control

24 Access Monitoring Remote Monitoring

25 Intrusion Detection Systems is the components of a basic commercial security system  It includes an intelligent control panel connected by ______ (or radio signals) to sensors at various locations throughout the facility.

26 Intrusion Detection Systems Perimeter area inputs to the control panel typically include sensors at every perimeter opening including doors, windows, garage doors and windows, and doors to crawl spaces. Additional perimeter protection may include using sound, vibration, and motion detector sensors to guard against entry through broken windows.

27 Intrusion Detection Systems When the controller receives an active input signal from one of its input sensors, it evaluates the conditions presented according to its programming (and the type of emergency response required), and if necessary, sends the appropriate output signals to annunciators (sirens or bells). It may also communicate with designated security contacts (security supervisors, __________ services or law enforcement/fire agencies) as directed by its programming.

28 Security Zones

29 Access Control Tools Sensors __________ input devices that generates a signal due to physical activity Examples:  magnetic switches for doors and windows  acoustic detectors  vibration detectors  motion detectors  glass break detectors Sensors protect the perimeter, selected outside areas, and the open spaces inside the facility.

30 Access Control Tool Keypads A _________ device for programming, controlling, and operating various access control and management devices.  Have a set of numerical pushbuttons that are similar to a telephone touchtone keypad.  Use to initiate commands for control options such as arming and disarming the system or bypassing a zone.

31 Access Control Tool Fire Detection Sensors included in many security systems..

32 Access Control Tool 3 Types of Output Devices 1. visual notification 2. audible annunciators 3. Remote messaging

33 Remote Notification Systems The most common remote notification systems involve the use of a ____________ line by the security system control panel to automatically call a remote monitoring facility or key personnel when an alarm condition exists.  The security controller can receive signal and message recipient can also use remote access to check on the status from a remote location.

34 Video Surveillance Systems  The most important element of most commercial security systems.  Many organizations include visible cameras in their infrastructure security systems to inhibit unlawful activity and to record events that occur at the perimeter or key interior

35 Video Recorders

36 Switchers Reference http://www.mcgrathnorth.com/privacy-data- security/ftc-gets-thumbs-up-to-act-as-cybersecurity- cop-what-does-it-mean-for-your-business/


Download ppt "Unit 1: Protecting the Facility (Virtual Machines)"

Similar presentations


Ads by Google