1 / 15

Physical Security

Physical Security. Chapter 9. Physical Security. “encompasses the design, implementation and maintenance of counter measures that protect the physical resources of an organization including the people, hardware, mission, storage, and processing”. Major Sources of Physical Loss.

penha
Download Presentation

Physical Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Physical Security Chapter 9

  2. Physical Security “encompasses the design, implementation and maintenance of counter measures that protect the physical resources of an organization including the people, hardware, mission, storage, and processing”

  3. Major Sources of Physical Loss • Extreme temperature • Gases – includes humidity or dry air • Liquids – includes water • Living organisms – viruses, bacteria, animals, people • Projectiles • Movement – shaking, vibrating • Energy anomalies

  4. Security Facility Controls • Wall, Fencing, and Gates • Guards • Dogs • ID Cards and Badges • Locks and Keys • Mechanical • Electromechanical • Manual • Electronic (sensors) • Biometric locks

  5. Security Facility Controls • Mantraps • Small enclosure • Entry point & different exit point • Does not allow access if break-in • Electronic Monitoring • Alarms & Alarm Systems • Computer Rooms and Wiring Closets • Require special attention • Overlooked • Interior Walls and Doors

  6. Fire Security and Safety • Fire suppression system • Water & water mist system • Lower temperature • Wet material • Carbon dioxide systems (rob fire of oxygen) • Soda acid (deny fire of fuel) • Gas-based – Halon (disrupt fire’s chemical reaction) • Fire Detection Systems • Thermal detection • Smoke detection • Air-aspirating systems • Flame detector

  7. Portable Extinguishers • Direct application of suppression is preferred • Fixed apparatus is impractical • Rated by type of fire they combat • Class A • Wood, paper, textiles, rubber, cloth, and trash • Interrupt the ability of fuel to ignite

  8. Portable Extinguishers • Class B • Solvents, gasoline, paint, lacquer, and oil • Remove oxygen from the air • Class C • Electrical equipment and appliance • Non-conducting agents • Class D • Metals, magnesium, lithium, and sodium • Special extinguishing agents and techniques

  9. Manual & Automatic Fire Response • Wet-pipe • Pressurized water in all pipes • Some form of valve in each protected area • System activated – valves are opened • Dry-pipe • Work in areas where electrical equipment is used • Air hold valves closed • Fire is detected – sprinkler heads activated • Deluge system • Individual sprinkler heads are kept open • System activated • Pre-action • Water mist • Gaseous Emission

  10. Failure of Supporting Utilities Structural Collapse • Heating, Ventilation, & Air Condition • Temperature and Filtration • Optimal temperature = 70-74 • Humidity And Static Electricity • Low humidity can cause static electricity • Optimal 40-60% • Ventilation Shafts • Now – generally 12” in diameter

  11. Failure of Supporting Utilities Structural Collapse • Power Management and Conditioning • Grounding and Amperage • Uninterruptible Power Supply • Emergency Shutoff • Water Problems • Structural Collapse • Maintenance of Facilities Systems

  12. Interception of Data • Direct observation • Individuals must be close enough to breach confidentiality • Risk when info is moved from protected place • Interception of data transmission • Internet a real problem • Direct wiretap • Wireless • Laws dealing with wiretap do not apply to wireless • No expectation of privacy with radio-based communications

  13. Interception of Data • Electromagnetic interception • Monitoring electromagnetic activity • Put back together • Not proven it can be done • Hoax • TEMPEST • Reduce the risk of EMR monitoring • Ensure computers placed as far as possible from outside perimeters • Installing special shielding inside CPU case • Maintaining distances from plumbing and other infrastructure

  14. Mobile and Portable Systems • Requires more monitoring than in-house • Loss of system = loss of access • Tracking technology now available • Telecommuting and remote access • Information traveling through often unsecure connections • Many employers do not supply secure connections

  15. Mobile and Portable Systems • Hotel rooms • Presume unencrypted transmissions being monitored • Notebooks lost or stolen • Leased facilities • Who is attached to network • Advanced authentication systems strongly recommended

More Related