Download presentation
Presentation is loading. Please wait.
Published byMelvyn Lewis Modified over 9 years ago
1
Physical Security and Contingency Planning CS432 - Security in Computing Copyright © 2008 by Scott Orr and the Trustees of Indiana University
2
Section Overview Environmental Threats Environmental Threats Accidents Accidents Physical Access and Threats Physical Access and Threats Backups Backups
3
References Security in Computing, 4 th Ed. Security in Computing, 4 th Ed. Chapter 8 (pg. 556-566) Chapter 8 (pg. 556-566)
4
Physical Security Concerns Environmental Environmental Accidents Accidents Physical Access Physical Access Vandalism Vandalism Theft Theft Eavesdropping Eavesdropping Unattended Workstations Unattended Workstations
5
Environmental Threats Fire Fire Heat/Water (sprinkler) damage Heat/Water (sprinkler) damage Halon/CO 2 /Argon extinguishers Halon/CO 2 /Argon extinguishers Have a Plan! Have a Plan! Smoke/Dust Smoke/Dust Abrasive to components Abrasive to components Smoke-free environments Smoke-free environments Smoke alarms Smoke alarms Keep system ventilation ducts open and clean Keep system ventilation ducts open and clean
6
Environmental Threats (Con’t) Earthquakes Earthquakes Avoid putting systems on high surfaces Avoid putting systems on high surfaces Place systems away from bookcases, etc. Place systems away from bookcases, etc. Vibrations Vibrations Dampen with rubber/foam mats Dampen with rubber/foam mats Explosions Explosions Temperature Extremes Temperature Extremes Bugs/Rodents Bugs/Rodents
7
Environmental Threats (Con’t) Electricity Electricity Line noise: Surge suppressors Line noise: Surge suppressors Lightning: Unplug if possible Lightning: Unplug if possible Outages: UPS short term solution Outages: UPS short term solution Humidity Humidity Too little: Static electricity Too little: Static electricity Too much: Condensation on circuitry Too much: Condensation on circuitry Water: Auto shutdown on signal from sensor Water: Auto shutdown on signal from sensor
8
Accidents Food and drink on system components Food and drink on system components Can be prevented Can be prevented Don’t allow food/drink near systems Don’t allow food/drink near systems Educate users Educate users Practice what you preach!!! Practice what you preach!!!
9
Physical Access Doors/Windows Doors/Windows Locks Locks Key Cards, RFID, Biometrics, etc. Key Cards, RFID, Biometrics, etc. Raised Floors/Drop Ceilings Raised Floors/Drop Ceilings Air Ducts Air Ducts Many small vents Many small vents Screens Screens Glass Walls Glass Walls
10
Vandalism Targets System components System components System ventilation holes System ventilation holes Network cables Network cables Difficult to find/fix Difficult to find/fix Protected conduits Protected conduits Network connectors/jacks Network connectors/jacks
11
Theft RAM/Processors RAM/Processors Hard Drives/Removable Media Hard Drives/Removable Media Lost/Exposed Data Lost/Exposed Data Encryption Encryption Storage Disposal Storage Disposal Laptops/PDAs/Phones Laptops/PDAs/Phones Easily Stolen Easily Stolen Encryption Concerns Encryption Concerns Backup Media Backup Media
12
Eavesdropping Wiretapping Wiretapping Network Hubs Network Hubs Wire Splicing Wire Splicing Induction Loops Induction Loops Open Network Access Open Network Access Unused Office Data Jacks Unused Office Data Jacks Rogue Wireless Access Points Rogue Wireless Access Points Hardware Keyloggers Hardware Keyloggers Van Eck Radiation - Tempest Van Eck Radiation - Tempest
13
Unattended Workstations Full access to user’s files and resources Full access to user’s files and resources User-based protective measures User-based protective measures Education Education Screen locking Screen locking Keyboard locking Keyboard locking Automatic idle time logout Automatic idle time logout BIOS passwords BIOS passwords
14
Contingency Planning Backups Backups Network Storage Network Storage Remote Facilities Remote Facilities Cold Sites Cold Sites Hot Sites Hot Sites Formal Plan and Testing Formal Plan and Testing
15
Backups!!! Full versus incremental Full versus incremental Backup verification Backup verification Storage Storage Onsite Onsite Offsite Offsite Tape erasing Tape erasing Backup Encryption Backup Encryption
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.