SlideShare a Scribd company logo
1 of 87
The Perimeter Protection Issues,
Technique and Operation

Assoc Prof Dr Zuraini Ismail / Hafiza Abas
Information Protection Requirements
o

Classified information systems and the classified
material on them must be physically located in a
security area appropriate to the classification and
sensitivity of the data.

o

Users have an important role in ensuring that the
system and associated classified information are
protected to the required levels.
Information Protection Requirements
• The classified information system and associated classified
information must be physically located in a security area
appropriate to the classification and sensitivity of the data.
• Classified information system equipment has varying separation
distance requirements depending on the work performed (including
computers, cables, telephones, radios, etc.).
• Users must check with their respective ISSO ( Info Sys Sec Officer)
for the appropriate physical distance protection requirements
before beginning classified work.
• Connections between classified systems and unclassified systems
or networks are prohibited (dilarang).
Information Protection Requirements
• Removable classified electronic media may not be present in a
work area containing unclassified systems that can read or write to
similar media.
• Computer equipment may not be connected, disconnected, or
moved unless authorized by the ISSO.
• Monitors, printers, and other devices that display or output
classified information must be positioned to deter unauthorized
individuals from reading the information without the knowledge of
the user.
• During classified processing it is required that the classification
level and category of the system accreditation be displayed on the
monitor using a placard or sticker.
Information Protection Requirements

o

o

The Physical (Environmental) Security domain
addresses the threats (ancaman), vulnerabilities (kelemahan), and
countermeasures (langkah-langkah) that can be utilized to
physically protect an enterprise’s resources and
sensitive information.
These resources include people, the facility in which
they work, and the data, equipment, support
systems, media, and supplies they utilize.
Information Protection Environment
• Primary consideration in physical security is that nothing
should impede (dihalang) “life safety goals.”
o Eg.: Do not lock the only fire exit door from the
outside.
• Safety: Deals with the protection of life and assets
against fire, natural disasters, and devastating
accidents.
• Security: Addresses vandalism, theft (kecurian), and attacks
(serangan) by individuals.
Physical Security Planning
• Physical security, like general information
security, should be based on a layered defense
model.
• Layers are implemented at the perimeter and
moving towards an asset.
• Layers include: Deterrence, Delaying,
Detection, Assessment, Response
http://www.softwaresecuritysolutions.com/layered-security.html
http://technet.microsoft.com/en-us/library/cc875841.aspx
http://www.secureworks.com/cyber-threat-intelligence/advanced-persistent-threats/assessment/
http://technet.microsoft.com/en-us/library/cc767969.aspx
http://www.ricoh.com/products/security/
Physical Security Planning
• A physical security program must address:
o

o

o

o

o

Crime and disruption protection through deterrence
(fences, security guards, warning signs, etc.).
Reduction of damages through the use of delaying
mechanisms (e.g., locks, security personnel, etc.).
Crime or disruption (gangguan) detection (e.g., smoke
detectors, motion detectors, CCTV, etc.).
Incident assessment through response to incidents
and determination of damage levels.
Response procedures (fire suppression
mechanisms, emergency response processes, etc.).
Physical Security Planning
• Before an effective physical security plan is
rolled out:
o Identify the team
o Carry out risk analysis to determine the
threats, vulnerabilities and calculate
business impact on each threats.
o Work with the management to identify
acceptable risk level for the physical security
program
Physical Security Planning
• Crime Prevention Through Environmental
Design (CPTED)
o

o

o

Is a discipline that outlines how the proper design of
a physical environment can reduce crime by directly
affecting human behavior.
Crime deterrence (pencegahan) through environmental
design.
Concepts developed in 1960’s. As of 2004, elements
of the CPTED approach have gained wide
international acceptance due to law enforcement
attempts to embrace it.
Physical Security Planning
• CPTED has three main strategies:
o

Natural Access Control

o

Natural Surveillance

o

Territorial Reinforcement
http://www.cityoftaylor.com/node/29575
http://targetcrime.ca/2009/02/22/solutions-for-safe-communities/
Physical Security Planning
• Natural Access Control
o

limits the opportunity for crime by taking
steps to clearly differentiate between public
space and private space.

o

By selectively placing entrances and exits,
fencing, lighting and landscape to limit
access or control flow, natural access control
occurs.

http://wsblockwatchnet.wordpress.com/2011/05/25/crime-prevention-through-environmental-designcpted-slides-from-our-may-24th-meeting/
Physical Security Planning
• Natural Surveillance
o

o

(pengawasan secara semula jadi)

Increases the threat of apprehension by
taking steps to increase the perception that
people can be seen
Natural surveillance occurs by designing the
placement of physical features, activities and
people in such a way as to maximize visibility
and foster positive social interaction among
legitimate users of private and public space.
http://www.lancastercsc.org/CPTED/Natural_Surveillance.html

The diagram shows good lines of sight on a neighborhood street.
People and vehicles can clearly be seen from many different
angles.
The following examples
show how landscaping
can affect lines of sight
around a home. This first
picture shows how the
plants don't allow people
to see the street or other
people in the area easily.
This creates place for
people to hid or commit
crimes that won't be easily
caught.
This picture shows how appropriate plants and lighting can
allow everyone to see what is happening on and near the
street around a home. This reduces the incentive for a
someone to commit a crime in the area.
Physical Security Planning
• Territorial Reinforcement
o

o

Promotes social control through increased
definition of space and improved proprietary
concern.
Creates physical designs that highlight the
company’s area of influence to give
legitimate owners a sense of ownership.
(sah)

o

Accomplished through the use of walls,
lighting, landscaping, etc.
Physical Security Planning
• CPTED is not the same as Target Hardening
• Target hardening focuses on denying access through
physical and artificial barriers (can lead to restrictions on
use, enjoyment, and aesthetics of the environment).
• Target hardening refers to strengthening the security of
your building so that it is difficult for criminals to attack.
• The goal is to increase the time and effort needed to
compromise your facility to the point where a criminal
will move on to a softer target.
• One way to begin a target hardening program is to
consider Existence, Capability, and History.
Please Read:
http
://www.emeraldinsight.com/journals.htm?articleid
Physical Security Planning
• Existence
Who may want to do you harm?
• Capability
What means have been used to carry out attacks
against businesses like yours in the past?
• History.
Study the history of attacks against businesses like
yours. What have attackers accomplished in the
past?
Physical Security Planning
• Issues with selecting a facility site:
o

Visibility (terrain, neighbors, population of area,
building markings)

o

Surrounding area and external factors (crime rate,
riots, terrorism, first responder locations)

o

Accessibility (road access, traffic, proximity to
transportation services)

o

Natural Disasters (floods, tornados, earthquakes)
Physical Security Planning
• Other facility considerations:
o

Physical construction materials and structure
composition


Be familiar with: load, light frame construction
material, heavy timber construction material,
incombustible material, dire resistant material
(know the fire ratings and construction
properties).
Physical Security Planning
Mantrap: A small room with two doors. The first
door is locked; a person is identified and
authenticated. Once the person is authenticated
and access is authorized, the first door opens and
allows the person into the mantrap. The person
has to be authenticated again in order to open the
second door and access a critical area. The
mantrap area could have a weight sensing floor
as an additional control to prevent literal
piggybacking.
“
Physical Security Planning
Automatic door lock configuration:
•“Fail safe:” If a power disruption occurs,
the door defaults to being unlocked.
•“Fail secure:” If a power disruption
occurs, the door defaults to being locked.
Physical Security Planning
• Windows can also be used to promote physical security.
• Know the different types of glass:
o Standard
o Tempered
o Acrylic
o Wired
o Laminated
o Solar Window Film
o Security Film
Insulated Glass
Physical Security Planning
• Consider use of internal partitions
carefully:
o

o

True floor to true ceiling to counter security
issues
Should never be used in areas that house
sensitive systems and devices
Power Supply
Power issues:
o

o

o

A continuous supply of electricity assures the
availability of company resources and
business continuity.
Data centers should be on a different power
supply from the rest of the building
Redundant power supplies: two or more
feeds coming from two or more electrical
substations
Ensuring Power Supply
o

UPS Systems
 Maintain continuous supply of power
 Use voltage stabilizer
 Online UPS systems
 Standby UPS System

o

Maintain proper operating temperature
 High temp can affect the power supply to cause
damage to devices
 Proper cooling systems
 PC and exhaust fans are working properly
&
unobstructed
Types of Voltage Fluctuations
Power Excess (quick burst of voltage)



Spike (momentary high voltage))
Surge (prolonged high voltage)

Power Failure



Fault (momentary power outrage)
Blackout (prolonged power lost, drops to
zero)

Power Degradation (under voltage)




Sag/dip (short term power shortage)
Brownout (under voltage)
Inrush Current (initial surge to startup a load)
Common power supply problems
o

Line Noise


o

Frequency


o

Variation of power waveform

Switching Transient


o

Distortion superimposed on power waveform

Under-voltage or over-voltage up to a few
nanoseconds

Harmonic Distortion


Multiples of power freq superimposed on power
waveform.
Internal Support System

Environmental Issues (in Brief)
o

Positive Drains: Contents flow out instead of
in.

o

Static Electricity due to low humidity,
hygrometer used

o

Ventilation :


Closed loop == do not bring outside air
in.



Positive pressurization

*
Internal Support System

Environmental Issues: Static Electricity
o

To prevent:






Use antistatic flooring in data processing areas
Ensure proper humidity
Proper grounding
No carpeting in data centers
Antistatic bands
Internal Support System

Environmental Issues: Temperature
Computing components can be affected
by temperature:




Magnetic Storage devices: 100 0F.
Computer systems and peripherals: 175 0F.
Paper products: 350 0F.
Kinds of Ventilation

Natural Ventilation


Uncontrolled movement of air thro cracks,
small holes & vents.

Whole-house ventilation


Controlled & uniform air movement.

Spot ventilation


Controlled air movement that improve the
effectiveness of natural & whole-house
ventilation by removing indoor pollutants
and/or moisture at their very source.
Internal Support System

• Fire Prevention: Includes training employees on how to
react, supplying the right equipment, enabling fire
suppression supply, proper storage of combustible
elements.

• Fire Detection: Includes alarms, manual detection pull
boxes, automatic detection response systems with
sensors, etc.

• Fire Suppression: Is the use of a suppression agent to
put out a fire.
Internal Support System

American Society for Testing and
Materials (ASTM)
is the organization that creates the
standards that dictate how fire resistant
ratings tests should be carried out and
how to properly interpret results.
results
Internal Support System
o

Fire needs oxygen and fuel to continue to grow.

o

Ignition sources can include the failure of an electrical
device, improper storage of materials, malfunctioning
heating devices, arson, etc.

o

Special note on “plenum areas:” The space above
drop down ceilings, wall cavities, and under raised
floors. Plenum areas should have fire detectors and
should only use plenum area rated cabling.
Internal Support System
Types of Fire:
A: Common Combustibles
• Elements: Wood products, paper, laminates
• Suppression: Water, foam
B: Liquid
• Elements: Petroleum products and coolants
• Suppression: Gas, CO2, foam, dry powders
C: Electrical
• Elements: Electrical equipment and wires
• Suppression: Gas, CO2, dry powders
D: Combustible Metals
• Elements: magnesium, sodium, potassium
• Suppression: Dry powder
K: Commercial Kitchens
• Elements: Cooking oil fires
• Suppression: Wet chemicals such as potassium
acetate.
Internal Support System

Types of Fire Detectors
o
o

Smoke Activated
Heat Activated

Know the types and properties of each
general category.
Internal Support System
•

Types of suppression agents:







Water
Halon and halon substitutes
Foams
Dry Powders
CO2
Soda Acid




Know suppression agent properties and the types of
fires that each suppression agent combats.
Know the types of fire extinguishers (A,B,C, D) that
combat different types of fires.
Internal Support System
Internal Support System

Types of Sprinklers






Wet Pipe Systems (aka Closed
Head System)
Dry Pipe Systems
Pre action Systems
Deluge Systems
Perimeter Security – Tools and Techniques

• The first line of defense is perimeter control
at the site location, to prevent unauthorized
access to the facility.
• Perimeter security has two modes:



Normal facility operation
Facility closed operation
Perimeter Security – Tools and Techniques

Proximity protection components put in
place to provide the following services:







Control of pedestrian and vehicle traffic
Various levels of protection for different security
zones
Buffers and delaying mechanisms to protect
against forced entry
Limit and control entry points
Perimeter Security – Tools and Techniques

Protection services can be provided by







Access Control Mechanisms
Physical Barriers
Intrusion Detection
Assessment
Response
Deterrents
Perimeter Security – Tools and Techniques

Perimeter Intrusion Detection and
Assessment System (PIDAS):




A type of fencing that has sensors on the
wire mesh and base of the fence.
A passive cable vibration sensor sets off
an alarm if an intrusion is detected.
Perimeter Security – Tools and Techniques

Gates have 4 distinct types:







Class I: Residential usage
Class II: Commercial usage, where general public
access is expected (eg., public parking lot, gated
community, self storage facility)
Class III: Industrial usage, where limited access is
expected (eg., warehouse property entrance not
intended to serve public)
Class IV: Restricted access (eg., a prison entrance
that is monitored either in person or via CCTV)
Perimeter Security – Tools and Techniques

• Locks are inexpensive access control
mechanisms that are widely accepted
and used.
• Locks are considered delaying devices.
• Know your locks.
Perimeter Security – Tools and Techniques
Perimeter Security – Tools and Techniques

Types of Locks
o

Mechanical Locks


o
o

Combination Locks
Cipher Locks (aka programmable locks)


o

Warded & Tumbler

Smart locks

Device Locks


Cable locks, switch controls, slot locks, port
controls, peripheral switch controls, cable
traps
Perimeter Security – Tools and Techniques

Lock Strengths:
o
o
o

Grade 1 (commercial and industrial use)
Grade 2 (heavy duty residential/light duty commercial)
Grade 3 (residential and consumer expendable)

•Cylinder Categories
o
o
o

Low Security (no pick or drill resistance)
Medium Security (some pick resistance)
High Security (pick resistance through many different
mechanisms—used only in Grade 1 & 2 locks)
Perimeter Security – Tools and Techniques

Lighting
o

o

o

Know lighting terms and types of lighting to use
in different situations (inside v. outside, security
posts, access doors, zones of illumination).
It is important to have the correct lighting when
using various types of surveillance equipment.
Lighting controls and switches should be in
protected, locked, and centralized areas.
Perimeter Security – Tools and Techniques
• Continuous lighting:
An array of lights that provide an even amount of illumination across an area.

• Controlled lighting:
An organization should erect lights and use illumination in such a way that does
not blind its neighbors or any passing cars, trains, or planes.

• Standby Lighting:
Lighting that can be configured to turn on and off at different times so that
potential intruders think that different areas of the facility are populated.

• Redundant or backup lighting:
Should be available in case of power failures or emergencies.

• Response Area Illumination:
Takes place when an IDS detects suspicious activities and turns on the lights
within the specified area.
Perimeter Security – Tools and Techniques

Surveillance Devices
o

o

These devices usually work in conjunction with
guards or other monitoring mechanisms to
extend their capacity.
Know the factors in choosing CCTV, focal length,
lens types (fixed v. zoom), iris, depth of field,
illumination requirements
Perimeter Security – Tools and Techniques

• Focal length: The focal length of a lens defines its
effectiveness in viewing objects from a horizontal
and vertical view.
• The sizes of images that will be shown on a monitor
along with the area that can be covered by one
camera are defined by focal length.
o Short focal length = wider angle views
o Long focal length = narrower views
Perimeter Security – Tools and Techniques

• Depth of field: Refers to the portion of the
environment that is in focus.
• Shallow depth of focus: Provides a softer
backdrop and leads viewers to the foreground
object.
• Greater depth of focus: Not much distinction
between objects in the foreground and
background.
Perimeter Security – Tools and Techniques

• Intrusion Detection Systems (IDS) are used
to detect unauthorized entries and to alert a
responsible entity to respond.
• Know the different types of IDS systems
(electro-mechanical v. volumetric) and
changes that can be detected by an IDS
system.
Perimeter Security – Tools and Techniques

• Patrol Force and Guards
Use in areas where critical reasoning skills are
required

• Auditing Physical Access
Need to log and review such as
Date & time of access attempt
Entry point
User ID
Unsuccessful access attempts
Perimeter Security – Tools and Techniques

Final Concept to Guide in Assessing Physical
Security Issues:
o Deterrence
o Delay
o Detection
o Assessment
o Response

More Related Content

What's hot

Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security PresentationWajahat Rajab
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentGary Bahadur
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control PresentationWajahat Rajab
 
Surveillance System, CCTV, BMS
Surveillance System, CCTV, BMSSurveillance System, CCTV, BMS
Surveillance System, CCTV, BMSMohammad Azam Khan
 
Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Securityleminhvuong
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principlesDivya Tiwari
 
PPT-Security-for-Management.pptx
PPT-Security-for-Management.pptxPPT-Security-for-Management.pptx
PPT-Security-for-Management.pptxRSAArcher
 
Risks threats and vulnerabilities
Risks threats and vulnerabilitiesRisks threats and vulnerabilities
Risks threats and vulnerabilitiesManish Chaurasia
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxMohanPandey31
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber EssentialsJisc
 
8. operations security
8. operations security8. operations security
8. operations security7wounders
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overviewxband
 
7. physical sec
7. physical sec7. physical sec
7. physical sec7wounders
 

What's hot (20)

Perimeter security systems
Perimeter security systemsPerimeter security systems
Perimeter security systems
 
Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security Presentation
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
Physical Security
Physical SecurityPhysical Security
Physical Security
 
Surveillance System, CCTV, BMS
Surveillance System, CCTV, BMSSurveillance System, CCTV, BMS
Surveillance System, CCTV, BMS
 
Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Security
 
Bms for security systems
Bms for security systemsBms for security systems
Bms for security systems
 
Access Control System, BMS
Access Control System, BMSAccess Control System, BMS
Access Control System, BMS
 
Fire detection and alarm systems
Fire detection and alarm systemsFire detection and alarm systems
Fire detection and alarm systems
 
Physical security
Physical securityPhysical security
Physical security
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principles
 
PPT-Security-for-Management.pptx
PPT-Security-for-Management.pptxPPT-Security-for-Management.pptx
PPT-Security-for-Management.pptx
 
Risks threats and vulnerabilities
Risks threats and vulnerabilitiesRisks threats and vulnerabilities
Risks threats and vulnerabilities
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptx
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber Essentials
 
8. operations security
8. operations security8. operations security
8. operations security
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overview
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
7. physical sec
7. physical sec7. physical sec
7. physical sec
 

Viewers also liked

Perimeter Protection: "Stairway to IP"
Perimeter Protection: "Stairway to IP"Perimeter Protection: "Stairway to IP"
Perimeter Protection: "Stairway to IP"cias-elettronica
 
Surviellance System-Naco
Surviellance System-NacoSurviellance System-Naco
Surviellance System-NacoGnanaranjan Das
 
SpyCameraCCTV Guide to IP Cameras
SpyCameraCCTV Guide to IP CamerasSpyCameraCCTV Guide to IP Cameras
SpyCameraCCTV Guide to IP CamerasSpyCameraCCTV
 
Digital recording system (Geo Physics)
Digital recording system (Geo Physics)Digital recording system (Geo Physics)
Digital recording system (Geo Physics)Junaid-sanwal
 
Post modernism
Post modernismPost modernism
Post modernismjuhi singh
 
13 propositions of Post-Modernism by Charles Jencks
13 propositions of Post-Modernism by Charles Jencks13 propositions of Post-Modernism by Charles Jencks
13 propositions of Post-Modernism by Charles JencksAnshuman Mishra
 
Models of landscape evolution and slope development by king
Models of landscape evolution and slope development by kingModels of landscape evolution and slope development by king
Models of landscape evolution and slope development by kingCharu Jaiswal
 
CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5Nil Menon
 
Electronic security system
Electronic security systemElectronic security system
Electronic security systemAtharva Chavan
 
Post Modern Architecture
Post Modern ArchitecturePost Modern Architecture
Post Modern ArchitectureCarla Faner
 
Ports and connectors
Ports and connectorsPorts and connectors
Ports and connectorschrispaul8676
 
Proposal to supply, installation and testing of CCTV Camera
Proposal to supply, installation and testing of CCTV Camera Proposal to supply, installation and testing of CCTV Camera
Proposal to supply, installation and testing of CCTV Camera Denis kisina
 
Ip Cctv Presentation
Ip Cctv PresentationIp Cctv Presentation
Ip Cctv Presentationwillyaoll
 
CCTV-Powerpoint-Presentation
CCTV-Powerpoint-PresentationCCTV-Powerpoint-Presentation
CCTV-Powerpoint-Presentationguestaec424
 
Post modern architecture
Post modern architecturePost modern architecture
Post modern architectureAlex Waktola
 
Seminar on CCTV Cameras
Seminar on CCTV CamerasSeminar on CCTV Cameras
Seminar on CCTV CamerasSachin Sharma
 

Viewers also liked (20)

Perimeter Protection: "Stairway to IP"
Perimeter Protection: "Stairway to IP"Perimeter Protection: "Stairway to IP"
Perimeter Protection: "Stairway to IP"
 
Perimeter monitoring, detection and surveillance
Perimeter monitoring, detection and surveillancePerimeter monitoring, detection and surveillance
Perimeter monitoring, detection and surveillance
 
Surviellance System-Naco
Surviellance System-NacoSurviellance System-Naco
Surviellance System-Naco
 
Man Overboard Detection
Man Overboard DetectionMan Overboard Detection
Man Overboard Detection
 
SpyCameraCCTV Guide to IP Cameras
SpyCameraCCTV Guide to IP CamerasSpyCameraCCTV Guide to IP Cameras
SpyCameraCCTV Guide to IP Cameras
 
POST MODERN ARCHITECTURE
POST MODERN ARCHITECTUREPOST MODERN ARCHITECTURE
POST MODERN ARCHITECTURE
 
Digital recording system (Geo Physics)
Digital recording system (Geo Physics)Digital recording system (Geo Physics)
Digital recording system (Geo Physics)
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Post modernism
Post modernismPost modernism
Post modernism
 
13 propositions of Post-Modernism by Charles Jencks
13 propositions of Post-Modernism by Charles Jencks13 propositions of Post-Modernism by Charles Jencks
13 propositions of Post-Modernism by Charles Jencks
 
Models of landscape evolution and slope development by king
Models of landscape evolution and slope development by kingModels of landscape evolution and slope development by king
Models of landscape evolution and slope development by king
 
CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5
 
Electronic security system
Electronic security systemElectronic security system
Electronic security system
 
Post Modern Architecture
Post Modern ArchitecturePost Modern Architecture
Post Modern Architecture
 
Ports and connectors
Ports and connectorsPorts and connectors
Ports and connectors
 
Proposal to supply, installation and testing of CCTV Camera
Proposal to supply, installation and testing of CCTV Camera Proposal to supply, installation and testing of CCTV Camera
Proposal to supply, installation and testing of CCTV Camera
 
Ip Cctv Presentation
Ip Cctv PresentationIp Cctv Presentation
Ip Cctv Presentation
 
CCTV-Powerpoint-Presentation
CCTV-Powerpoint-PresentationCCTV-Powerpoint-Presentation
CCTV-Powerpoint-Presentation
 
Post modern architecture
Post modern architecturePost modern architecture
Post modern architecture
 
Seminar on CCTV Cameras
Seminar on CCTV CamerasSeminar on CCTV Cameras
Seminar on CCTV Cameras
 

Similar to The Perimeter Protection Issues, Technique and Operation

CISSP week 26
CISSP week 26CISSP week 26
CISSP week 26jemtallon
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxTikdiPatel
 
Security & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxSecurity & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxdotco
 
Security & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxSecurity & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxTechnocracy2
 
Life Safety and Property Protection
Life Safety and Property ProtectionLife Safety and Property Protection
Life Safety and Property ProtectionQuality CCTV
 
Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdfNdheh
 
Types of Security in Industrial Security
Types of Security in Industrial SecurityTypes of Security in Industrial Security
Types of Security in Industrial SecurityRJCubillo
 
Informations Security and It's Consequence By Sulav Acharya
Informations Security and It's Consequence By Sulav AcharyaInformations Security and It's Consequence By Sulav Acharya
Informations Security and It's Consequence By Sulav AcharyaAchSulav
 
Crime prevention through environmental design
Crime prevention through environmental designCrime prevention through environmental design
Crime prevention through environmental designVijesh Kumar V
 
Innovative Ideas in Privacy Research.ppt
Innovative Ideas in Privacy Research.pptInnovative Ideas in Privacy Research.ppt
Innovative Ideas in Privacy Research.pptssuser991de0
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Chinatu Uzuegbu
 
Importance of workplace Security.pptx
Importance of workplace Security.pptxImportance of workplace Security.pptx
Importance of workplace Security.pptxSecurity Guards
 
Information Security
Information Security Information Security
Information Security Alok Katiyar
 
UNit 7 Information Security By Sulav Acharya
UNit 7 Information Security By Sulav AcharyaUNit 7 Information Security By Sulav Acharya
UNit 7 Information Security By Sulav Acharyanmnqknibzxthowqwzc
 

Similar to The Perimeter Protection Issues, Technique and Operation (20)

6 Physical Security
6 Physical Security6 Physical Security
6 Physical Security
 
CISSP week 26
CISSP week 26CISSP week 26
CISSP week 26
 
internet security and cyber lawUnit1
internet security and  cyber lawUnit1internet security and  cyber lawUnit1
internet security and cyber lawUnit1
 
SECURITY PLANNING DESIGN (SESSION 3).ppt
SECURITY PLANNING  DESIGN (SESSION 3).pptSECURITY PLANNING  DESIGN (SESSION 3).ppt
SECURITY PLANNING DESIGN (SESSION 3).ppt
 
1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptx
 
Security & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxSecurity & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptx
 
Security & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxSecurity & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptx
 
Life Safety and Property Protection
Life Safety and Property ProtectionLife Safety and Property Protection
Life Safety and Property Protection
 
Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdf
 
Internet safety and security strategies for building an internet safety wall
Internet safety and security strategies for building an internet safety wallInternet safety and security strategies for building an internet safety wall
Internet safety and security strategies for building an internet safety wall
 
Types of Security in Industrial Security
Types of Security in Industrial SecurityTypes of Security in Industrial Security
Types of Security in Industrial Security
 
Informations Security and It's Consequence By Sulav Acharya
Informations Security and It's Consequence By Sulav AcharyaInformations Security and It's Consequence By Sulav Acharya
Informations Security and It's Consequence By Sulav Acharya
 
Crime prevention through environmental design
Crime prevention through environmental designCrime prevention through environmental design
Crime prevention through environmental design
 
Innovative Ideas in Privacy Research.ppt
Innovative Ideas in Privacy Research.pptInnovative Ideas in Privacy Research.ppt
Innovative Ideas in Privacy Research.ppt
 
dexa.ppt
dexa.pptdexa.ppt
dexa.ppt
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2
 
Importance of workplace Security.pptx
Importance of workplace Security.pptxImportance of workplace Security.pptx
Importance of workplace Security.pptx
 
Information Security
Information Security Information Security
Information Security
 
UNit 7 Information Security By Sulav Acharya
UNit 7 Information Security By Sulav AcharyaUNit 7 Information Security By Sulav Acharya
UNit 7 Information Security By Sulav Acharya
 

More from Hafiza Abas

animated semut dengan menggunakan path animation.
animated semut dengan menggunakan path animation.animated semut dengan menggunakan path animation.
animated semut dengan menggunakan path animation.Hafiza Abas
 
Teknologi ePembelajaran
Teknologi ePembelajaran Teknologi ePembelajaran
Teknologi ePembelajaran Hafiza Abas
 
Access Controls Attacks
Access Controls AttacksAccess Controls Attacks
Access Controls AttacksHafiza Abas
 
Task 6 access_control_attacks_hong_kim_sheng_2
Task 6 access_control_attacks_hong_kim_sheng_2Task 6 access_control_attacks_hong_kim_sheng_2
Task 6 access_control_attacks_hong_kim_sheng_2Hafiza Abas
 
Example of access control
Example of access controlExample of access control
Example of access controlHafiza Abas
 
Islamic studies for disabled: teaching Salat for Autism Using Apps
Islamic studies for disabled: teaching Salat for Autism Using AppsIslamic studies for disabled: teaching Salat for Autism Using Apps
Islamic studies for disabled: teaching Salat for Autism Using AppsHafiza Abas
 
Quantitative search and_qualitative_research by mubarak
Quantitative search and_qualitative_research by mubarakQuantitative search and_qualitative_research by mubarak
Quantitative search and_qualitative_research by mubarakHafiza Abas
 
Chap 6 Avoiding Ambiguity
Chap 6 Avoiding Ambiguity Chap 6 Avoiding Ambiguity
Chap 6 Avoiding Ambiguity Hafiza Abas
 
Chapter 14 Review of the Literature
Chapter 14 Review of the LiteratureChapter 14 Review of the Literature
Chapter 14 Review of the Literature Hafiza Abas
 
Chapter 5 Be Concise
Chapter 5 Be ConciseChapter 5 Be Concise
Chapter 5 Be ConciseHafiza Abas
 
Chapter 13 Introduction in research paper
Chapter 13 Introduction in research paperChapter 13 Introduction in research paper
Chapter 13 Introduction in research paperHafiza Abas
 
Chapter 4 Structuring Paragraph and Sentences
Chapter 4 Structuring Paragraph and SentencesChapter 4 Structuring Paragraph and Sentences
Chapter 4 Structuring Paragraph and SentencesHafiza Abas
 
Chapter 12: Abstract ( english for writing research papers)
Chapter 12: Abstract ( english for writing research papers)Chapter 12: Abstract ( english for writing research papers)
Chapter 12: Abstract ( english for writing research papers)Hafiza Abas
 
Chapter 3 Breaking up long sentences (ENGLISH FOR WRITING RESEARCH PAPERS)
Chapter 3 Breaking up long sentences (ENGLISH FOR WRITING RESEARCH PAPERS)Chapter 3 Breaking up long sentences (ENGLISH FOR WRITING RESEARCH PAPERS)
Chapter 3 Breaking up long sentences (ENGLISH FOR WRITING RESEARCH PAPERS)Hafiza Abas
 
English for writing research papers (chap 2 and 11)
English for writing research papers (chap 2 and 11)English for writing research papers (chap 2 and 11)
English for writing research papers (chap 2 and 11)Hafiza Abas
 
Assessment vs. evaluation
Assessment vs. evaluationAssessment vs. evaluation
Assessment vs. evaluationHafiza Abas
 
Business Continuity Plan (Introduction)
Business Continuity Plan (Introduction)Business Continuity Plan (Introduction)
Business Continuity Plan (Introduction)Hafiza Abas
 

More from Hafiza Abas (20)

animated semut dengan menggunakan path animation.
animated semut dengan menggunakan path animation.animated semut dengan menggunakan path animation.
animated semut dengan menggunakan path animation.
 
Teknologi ePembelajaran
Teknologi ePembelajaran Teknologi ePembelajaran
Teknologi ePembelajaran
 
Access Controls Attacks
Access Controls AttacksAccess Controls Attacks
Access Controls Attacks
 
Task 6 access_control_attacks_hong_kim_sheng_2
Task 6 access_control_attacks_hong_kim_sheng_2Task 6 access_control_attacks_hong_kim_sheng_2
Task 6 access_control_attacks_hong_kim_sheng_2
 
Example of access control
Example of access controlExample of access control
Example of access control
 
SPSS LEVEL 2
SPSS LEVEL 2SPSS LEVEL 2
SPSS LEVEL 2
 
Islamic studies for disabled: teaching Salat for Autism Using Apps
Islamic studies for disabled: teaching Salat for Autism Using AppsIslamic studies for disabled: teaching Salat for Autism Using Apps
Islamic studies for disabled: teaching Salat for Autism Using Apps
 
Quantitative search and_qualitative_research by mubarak
Quantitative search and_qualitative_research by mubarakQuantitative search and_qualitative_research by mubarak
Quantitative search and_qualitative_research by mubarak
 
Chap 15 Method
Chap 15 MethodChap 15 Method
Chap 15 Method
 
Chap 6 Avoiding Ambiguity
Chap 6 Avoiding Ambiguity Chap 6 Avoiding Ambiguity
Chap 6 Avoiding Ambiguity
 
Chapter 14 Review of the Literature
Chapter 14 Review of the LiteratureChapter 14 Review of the Literature
Chapter 14 Review of the Literature
 
Chapter 5 Be Concise
Chapter 5 Be ConciseChapter 5 Be Concise
Chapter 5 Be Concise
 
Chapter 13 Introduction in research paper
Chapter 13 Introduction in research paperChapter 13 Introduction in research paper
Chapter 13 Introduction in research paper
 
Chapter 4 Structuring Paragraph and Sentences
Chapter 4 Structuring Paragraph and SentencesChapter 4 Structuring Paragraph and Sentences
Chapter 4 Structuring Paragraph and Sentences
 
Chapter 12: Abstract ( english for writing research papers)
Chapter 12: Abstract ( english for writing research papers)Chapter 12: Abstract ( english for writing research papers)
Chapter 12: Abstract ( english for writing research papers)
 
Chapter 3 Breaking up long sentences (ENGLISH FOR WRITING RESEARCH PAPERS)
Chapter 3 Breaking up long sentences (ENGLISH FOR WRITING RESEARCH PAPERS)Chapter 3 Breaking up long sentences (ENGLISH FOR WRITING RESEARCH PAPERS)
Chapter 3 Breaking up long sentences (ENGLISH FOR WRITING RESEARCH PAPERS)
 
English for writing research papers (chap 2 and 11)
English for writing research papers (chap 2 and 11)English for writing research papers (chap 2 and 11)
English for writing research papers (chap 2 and 11)
 
Assessment vs. evaluation
Assessment vs. evaluationAssessment vs. evaluation
Assessment vs. evaluation
 
Rubric
RubricRubric
Rubric
 
Business Continuity Plan (Introduction)
Business Continuity Plan (Introduction)Business Continuity Plan (Introduction)
Business Continuity Plan (Introduction)
 

Recently uploaded

Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...Suhani Kapoor
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdftbatkhuu1
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 

Recently uploaded (20)

Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdf
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 

The Perimeter Protection Issues, Technique and Operation

  • 1. The Perimeter Protection Issues, Technique and Operation Assoc Prof Dr Zuraini Ismail / Hafiza Abas
  • 2. Information Protection Requirements o Classified information systems and the classified material on them must be physically located in a security area appropriate to the classification and sensitivity of the data. o Users have an important role in ensuring that the system and associated classified information are protected to the required levels.
  • 3. Information Protection Requirements • The classified information system and associated classified information must be physically located in a security area appropriate to the classification and sensitivity of the data. • Classified information system equipment has varying separation distance requirements depending on the work performed (including computers, cables, telephones, radios, etc.). • Users must check with their respective ISSO ( Info Sys Sec Officer) for the appropriate physical distance protection requirements before beginning classified work. • Connections between classified systems and unclassified systems or networks are prohibited (dilarang).
  • 4. Information Protection Requirements • Removable classified electronic media may not be present in a work area containing unclassified systems that can read or write to similar media. • Computer equipment may not be connected, disconnected, or moved unless authorized by the ISSO. • Monitors, printers, and other devices that display or output classified information must be positioned to deter unauthorized individuals from reading the information without the knowledge of the user. • During classified processing it is required that the classification level and category of the system accreditation be displayed on the monitor using a placard or sticker.
  • 5. Information Protection Requirements o o The Physical (Environmental) Security domain addresses the threats (ancaman), vulnerabilities (kelemahan), and countermeasures (langkah-langkah) that can be utilized to physically protect an enterprise’s resources and sensitive information. These resources include people, the facility in which they work, and the data, equipment, support systems, media, and supplies they utilize.
  • 6. Information Protection Environment • Primary consideration in physical security is that nothing should impede (dihalang) “life safety goals.” o Eg.: Do not lock the only fire exit door from the outside. • Safety: Deals with the protection of life and assets against fire, natural disasters, and devastating accidents. • Security: Addresses vandalism, theft (kecurian), and attacks (serangan) by individuals.
  • 7. Physical Security Planning • Physical security, like general information security, should be based on a layered defense model. • Layers are implemented at the perimeter and moving towards an asset. • Layers include: Deterrence, Delaying, Detection, Assessment, Response
  • 8.
  • 10.
  • 15. Physical Security Planning • A physical security program must address: o o o o o Crime and disruption protection through deterrence (fences, security guards, warning signs, etc.). Reduction of damages through the use of delaying mechanisms (e.g., locks, security personnel, etc.). Crime or disruption (gangguan) detection (e.g., smoke detectors, motion detectors, CCTV, etc.). Incident assessment through response to incidents and determination of damage levels. Response procedures (fire suppression mechanisms, emergency response processes, etc.).
  • 16. Physical Security Planning • Before an effective physical security plan is rolled out: o Identify the team o Carry out risk analysis to determine the threats, vulnerabilities and calculate business impact on each threats. o Work with the management to identify acceptable risk level for the physical security program
  • 17.
  • 18. Physical Security Planning • Crime Prevention Through Environmental Design (CPTED) o o o Is a discipline that outlines how the proper design of a physical environment can reduce crime by directly affecting human behavior. Crime deterrence (pencegahan) through environmental design. Concepts developed in 1960’s. As of 2004, elements of the CPTED approach have gained wide international acceptance due to law enforcement attempts to embrace it.
  • 19. Physical Security Planning • CPTED has three main strategies: o Natural Access Control o Natural Surveillance o Territorial Reinforcement
  • 22. Physical Security Planning • Natural Access Control o limits the opportunity for crime by taking steps to clearly differentiate between public space and private space. o By selectively placing entrances and exits, fencing, lighting and landscape to limit access or control flow, natural access control occurs. http://wsblockwatchnet.wordpress.com/2011/05/25/crime-prevention-through-environmental-designcpted-slides-from-our-may-24th-meeting/
  • 23. Physical Security Planning • Natural Surveillance o o (pengawasan secara semula jadi) Increases the threat of apprehension by taking steps to increase the perception that people can be seen Natural surveillance occurs by designing the placement of physical features, activities and people in such a way as to maximize visibility and foster positive social interaction among legitimate users of private and public space.
  • 24. http://www.lancastercsc.org/CPTED/Natural_Surveillance.html The diagram shows good lines of sight on a neighborhood street. People and vehicles can clearly be seen from many different angles.
  • 25. The following examples show how landscaping can affect lines of sight around a home. This first picture shows how the plants don't allow people to see the street or other people in the area easily. This creates place for people to hid or commit crimes that won't be easily caught.
  • 26. This picture shows how appropriate plants and lighting can allow everyone to see what is happening on and near the street around a home. This reduces the incentive for a someone to commit a crime in the area.
  • 27.
  • 28. Physical Security Planning • Territorial Reinforcement o o Promotes social control through increased definition of space and improved proprietary concern. Creates physical designs that highlight the company’s area of influence to give legitimate owners a sense of ownership. (sah) o Accomplished through the use of walls, lighting, landscaping, etc.
  • 29. Physical Security Planning • CPTED is not the same as Target Hardening • Target hardening focuses on denying access through physical and artificial barriers (can lead to restrictions on use, enjoyment, and aesthetics of the environment). • Target hardening refers to strengthening the security of your building so that it is difficult for criminals to attack. • The goal is to increase the time and effort needed to compromise your facility to the point where a criminal will move on to a softer target. • One way to begin a target hardening program is to consider Existence, Capability, and History.
  • 31. Physical Security Planning • Existence Who may want to do you harm? • Capability What means have been used to carry out attacks against businesses like yours in the past? • History. Study the history of attacks against businesses like yours. What have attackers accomplished in the past?
  • 32. Physical Security Planning • Issues with selecting a facility site: o Visibility (terrain, neighbors, population of area, building markings) o Surrounding area and external factors (crime rate, riots, terrorism, first responder locations) o Accessibility (road access, traffic, proximity to transportation services) o Natural Disasters (floods, tornados, earthquakes)
  • 33. Physical Security Planning • Other facility considerations: o Physical construction materials and structure composition  Be familiar with: load, light frame construction material, heavy timber construction material, incombustible material, dire resistant material (know the fire ratings and construction properties).
  • 34. Physical Security Planning Mantrap: A small room with two doors. The first door is locked; a person is identified and authenticated. Once the person is authenticated and access is authorized, the first door opens and allows the person into the mantrap. The person has to be authenticated again in order to open the second door and access a critical area. The mantrap area could have a weight sensing floor as an additional control to prevent literal piggybacking. “
  • 35.
  • 36.
  • 37. Physical Security Planning Automatic door lock configuration: •“Fail safe:” If a power disruption occurs, the door defaults to being unlocked. •“Fail secure:” If a power disruption occurs, the door defaults to being locked.
  • 38. Physical Security Planning • Windows can also be used to promote physical security. • Know the different types of glass: o Standard o Tempered o Acrylic o Wired o Laminated o Solar Window Film o Security Film
  • 39.
  • 41. Physical Security Planning • Consider use of internal partitions carefully: o o True floor to true ceiling to counter security issues Should never be used in areas that house sensitive systems and devices
  • 42. Power Supply Power issues: o o o A continuous supply of electricity assures the availability of company resources and business continuity. Data centers should be on a different power supply from the rest of the building Redundant power supplies: two or more feeds coming from two or more electrical substations
  • 43.
  • 44. Ensuring Power Supply o UPS Systems  Maintain continuous supply of power  Use voltage stabilizer  Online UPS systems  Standby UPS System o Maintain proper operating temperature  High temp can affect the power supply to cause damage to devices  Proper cooling systems  PC and exhaust fans are working properly & unobstructed
  • 45.
  • 46. Types of Voltage Fluctuations Power Excess (quick burst of voltage)   Spike (momentary high voltage)) Surge (prolonged high voltage) Power Failure   Fault (momentary power outrage) Blackout (prolonged power lost, drops to zero) Power Degradation (under voltage)    Sag/dip (short term power shortage) Brownout (under voltage) Inrush Current (initial surge to startup a load)
  • 47. Common power supply problems o Line Noise  o Frequency  o Variation of power waveform Switching Transient  o Distortion superimposed on power waveform Under-voltage or over-voltage up to a few nanoseconds Harmonic Distortion  Multiples of power freq superimposed on power waveform.
  • 48.
  • 49. Internal Support System Environmental Issues (in Brief) o Positive Drains: Contents flow out instead of in. o Static Electricity due to low humidity, hygrometer used o Ventilation :  Closed loop == do not bring outside air in.  Positive pressurization *
  • 50.
  • 51.
  • 52.
  • 53. Internal Support System Environmental Issues: Static Electricity o To prevent:      Use antistatic flooring in data processing areas Ensure proper humidity Proper grounding No carpeting in data centers Antistatic bands
  • 54. Internal Support System Environmental Issues: Temperature Computing components can be affected by temperature:    Magnetic Storage devices: 100 0F. Computer systems and peripherals: 175 0F. Paper products: 350 0F.
  • 55. Kinds of Ventilation Natural Ventilation  Uncontrolled movement of air thro cracks, small holes & vents. Whole-house ventilation  Controlled & uniform air movement. Spot ventilation  Controlled air movement that improve the effectiveness of natural & whole-house ventilation by removing indoor pollutants and/or moisture at their very source.
  • 56. Internal Support System • Fire Prevention: Includes training employees on how to react, supplying the right equipment, enabling fire suppression supply, proper storage of combustible elements. • Fire Detection: Includes alarms, manual detection pull boxes, automatic detection response systems with sensors, etc. • Fire Suppression: Is the use of a suppression agent to put out a fire.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61. Internal Support System American Society for Testing and Materials (ASTM) is the organization that creates the standards that dictate how fire resistant ratings tests should be carried out and how to properly interpret results. results
  • 62. Internal Support System o Fire needs oxygen and fuel to continue to grow. o Ignition sources can include the failure of an electrical device, improper storage of materials, malfunctioning heating devices, arson, etc. o Special note on “plenum areas:” The space above drop down ceilings, wall cavities, and under raised floors. Plenum areas should have fire detectors and should only use plenum area rated cabling.
  • 63. Internal Support System Types of Fire: A: Common Combustibles • Elements: Wood products, paper, laminates • Suppression: Water, foam B: Liquid • Elements: Petroleum products and coolants • Suppression: Gas, CO2, foam, dry powders C: Electrical • Elements: Electrical equipment and wires • Suppression: Gas, CO2, dry powders D: Combustible Metals • Elements: magnesium, sodium, potassium • Suppression: Dry powder K: Commercial Kitchens • Elements: Cooking oil fires • Suppression: Wet chemicals such as potassium acetate.
  • 64.
  • 65. Internal Support System Types of Fire Detectors o o Smoke Activated Heat Activated Know the types and properties of each general category.
  • 66.
  • 67. Internal Support System • Types of suppression agents:       Water Halon and halon substitutes Foams Dry Powders CO2 Soda Acid   Know suppression agent properties and the types of fires that each suppression agent combats. Know the types of fire extinguishers (A,B,C, D) that combat different types of fires.
  • 69. Internal Support System Types of Sprinklers     Wet Pipe Systems (aka Closed Head System) Dry Pipe Systems Pre action Systems Deluge Systems
  • 70.
  • 71. Perimeter Security – Tools and Techniques • The first line of defense is perimeter control at the site location, to prevent unauthorized access to the facility. • Perimeter security has two modes:   Normal facility operation Facility closed operation
  • 72. Perimeter Security – Tools and Techniques Proximity protection components put in place to provide the following services:     Control of pedestrian and vehicle traffic Various levels of protection for different security zones Buffers and delaying mechanisms to protect against forced entry Limit and control entry points
  • 73. Perimeter Security – Tools and Techniques Protection services can be provided by       Access Control Mechanisms Physical Barriers Intrusion Detection Assessment Response Deterrents
  • 74. Perimeter Security – Tools and Techniques Perimeter Intrusion Detection and Assessment System (PIDAS):   A type of fencing that has sensors on the wire mesh and base of the fence. A passive cable vibration sensor sets off an alarm if an intrusion is detected.
  • 75. Perimeter Security – Tools and Techniques Gates have 4 distinct types:     Class I: Residential usage Class II: Commercial usage, where general public access is expected (eg., public parking lot, gated community, self storage facility) Class III: Industrial usage, where limited access is expected (eg., warehouse property entrance not intended to serve public) Class IV: Restricted access (eg., a prison entrance that is monitored either in person or via CCTV)
  • 76. Perimeter Security – Tools and Techniques • Locks are inexpensive access control mechanisms that are widely accepted and used. • Locks are considered delaying devices. • Know your locks.
  • 77. Perimeter Security – Tools and Techniques
  • 78. Perimeter Security – Tools and Techniques Types of Locks o Mechanical Locks  o o Combination Locks Cipher Locks (aka programmable locks)  o Warded & Tumbler Smart locks Device Locks  Cable locks, switch controls, slot locks, port controls, peripheral switch controls, cable traps
  • 79. Perimeter Security – Tools and Techniques Lock Strengths: o o o Grade 1 (commercial and industrial use) Grade 2 (heavy duty residential/light duty commercial) Grade 3 (residential and consumer expendable) •Cylinder Categories o o o Low Security (no pick or drill resistance) Medium Security (some pick resistance) High Security (pick resistance through many different mechanisms—used only in Grade 1 & 2 locks)
  • 80. Perimeter Security – Tools and Techniques Lighting o o o Know lighting terms and types of lighting to use in different situations (inside v. outside, security posts, access doors, zones of illumination). It is important to have the correct lighting when using various types of surveillance equipment. Lighting controls and switches should be in protected, locked, and centralized areas.
  • 81. Perimeter Security – Tools and Techniques • Continuous lighting: An array of lights that provide an even amount of illumination across an area. • Controlled lighting: An organization should erect lights and use illumination in such a way that does not blind its neighbors or any passing cars, trains, or planes. • Standby Lighting: Lighting that can be configured to turn on and off at different times so that potential intruders think that different areas of the facility are populated. • Redundant or backup lighting: Should be available in case of power failures or emergencies. • Response Area Illumination: Takes place when an IDS detects suspicious activities and turns on the lights within the specified area.
  • 82. Perimeter Security – Tools and Techniques Surveillance Devices o o These devices usually work in conjunction with guards or other monitoring mechanisms to extend their capacity. Know the factors in choosing CCTV, focal length, lens types (fixed v. zoom), iris, depth of field, illumination requirements
  • 83. Perimeter Security – Tools and Techniques • Focal length: The focal length of a lens defines its effectiveness in viewing objects from a horizontal and vertical view. • The sizes of images that will be shown on a monitor along with the area that can be covered by one camera are defined by focal length. o Short focal length = wider angle views o Long focal length = narrower views
  • 84. Perimeter Security – Tools and Techniques • Depth of field: Refers to the portion of the environment that is in focus. • Shallow depth of focus: Provides a softer backdrop and leads viewers to the foreground object. • Greater depth of focus: Not much distinction between objects in the foreground and background.
  • 85. Perimeter Security – Tools and Techniques • Intrusion Detection Systems (IDS) are used to detect unauthorized entries and to alert a responsible entity to respond. • Know the different types of IDS systems (electro-mechanical v. volumetric) and changes that can be detected by an IDS system.
  • 86. Perimeter Security – Tools and Techniques • Patrol Force and Guards Use in areas where critical reasoning skills are required • Auditing Physical Access Need to log and review such as Date & time of access attempt Entry point User ID Unsuccessful access attempts
  • 87. Perimeter Security – Tools and Techniques Final Concept to Guide in Assessing Physical Security Issues: o Deterrence o Delay o Detection o Assessment o Response