SlideShare uma empresa Scribd logo
1 de 40
Physical Security
Objective
To address the threats, vulnerabilities, and
countermeasures which can be utilized to physically protect
an enterprise’s resources and sensitive information to
include people, facilities, data, equipment, support
systems, media, and supplies.

To discuss considerations for choosing a secure site, its
design and configuration, and the methods for securing the
facility against unauthorized access, theft of equipment and
information, and the environmental and safety measures
needed to protect people, the facility, and its resources.
Physical Security
 Physical Security Threats
 Site Design and Configuration
 Physical Security Requirements
  – For Centralized Computing Facilities
  – For Distributed Processing Facilities
  – For Extended Processing
The Layered Approach
Information Protection Environment

 Crime Prevention through Environmental Design
  (CPTED)
     • Concept that, as its basic premise, states that the
       physical environment of a building can be changed
       or managed to produce behavioral effects that will
       reduce the incidence and fear of crime
     • Territoriality
     • Surveillance
     • Access control
Information Protection Environment Cont…
 Site Location
      • Specific physical security concerns
      • Vulnerable to crime, riots, demonstrations, or terrorism
        attacks
      • Neighborhood crime rates and types
      • Vulnerable to natural disasters
 Construction Impacts
 Facility Impacts
      •   Entry points
      •   Infrastructure support systems
      •   Electrical power
      •   Heating, ventilation, air conditioning (and refrigeration)
      •   Internal sensitive or compartmentalized areas
      •   Portable computing
Information Protection Environment Cont…
 Electrical Power
   – Vulnerabilities include total power loss of short or long duration
     or degradation in power quality, such as brownouts, spikes, or
     sags
       • Blackout - complete loss of commercial power
       • Fault - momentary power outage
       • Brownout - an intentional reduction of voltage by a utility company
       • Sag/dip - a short period of low voltage
       • Surge - a sudden rise in voltage in the power supply
       • Transient - line noise or disturbance is superimposed on the supply
         circuit and can cause fluctuations in electrical power
       • In-rush current - the initial surge of current required by a load before
         it reaches normal operation
       • Electrostatic discharge - another type of electrical surge can occur
         when two non-conducting materials rub together, causing electrons
         to transfer from one material to another
The Layered Defense
 Perimeter and building grounds
   – Landscaping, Fences, Gates, Bollards, Walls, and Doors
      • 1 meter/3–4 feet - Deters casual trespassers
      • 2 meters/6–7 feet - Too high to climb easily
      • 2.4 meters/8 feet with top guard - Deters
        determined intruder
 Building entry points
 Inside the building - building floors, office suites,
  and offices
Fire Protection
 Fire Prevention
   –   Fireproof Construction materials
   –   False ceiling should not be flammable
   –   Magnetic tapes, if ignited, produce poisonous gases
   –   fire-prevention training

 Fire Detection
   – Ionization-type smoke detectors
   – Photoelectric detectors
   – Heat detectors

              “The first rule is to get the people out”
Fire Protection Cont…
 Fire Suppression
Fire Protection Cont…
 Portable Extinguishers
      At Exits
      Mark Locations and Type
      Types A, B & C
      Need to Inspect


 Water Sprinkler Systems
      Works to Lower Temperature
      Most Damaging to Equipment
      Conventional Systems
      “Dry Pipe” Systems: Less Risk of Leakage
      Employ in Throughout Building and in all Spaces
Fire Protection Cont…
 Carbon Dioxide (CO2)
      Colorless/Odorless
      Potentially Lethal
      Removes Oxygen
      Best for Unattended Facilities
      Delayed-Activation in Manned Facilities

 Halon
      Best Protection for Equipment
      Concentrations <10% are Safe
      Becomes Toxic at 900o
      Depletes Ozone (CFCs)
      Montreal Protocol (1987)
      Halon 1301: Requires Pressurization
      Halon 1211: Self-Pressurization (Portable Extinguishers)
Physical Security Threats
 Threat Components
   Agents
   Motives
   Results


 External Threats
     Wind/Tornado
     Flooding
     Lightning
     Earthquake
     Cold and Ice
     Fire
     Chemical
Physical Security Threats Cont…
 Internal Physical Threats
      Fire
      Environmental Failure
      Liquid Leakage
      Electrical Interruption


 Human Threats
      Theft
      Vandalism
      Sabotage
      Espionage
      Errors
Site Design Considerations
 Location and Access
    Local Crime
    Visibility
    Emergency Access
    Natural Hazards
    Air and Surface Traffic
    Joint Tenants
    Stable Power Supply
    Existing Boundary Protection (Barriers/Fencing/Gates)
Boundary Protection
   Area Designation: Facilitates Enforcement
   Vehicular Access
   Personnel Access
     Occupants
     Visitors (Escort & Logging)
 Fences
     Deter Casual Trespassing
     Compliments Other Access Controls
     Aesthetics
     Won’t Stop Determined Intruder
Boundary Protection Cont…
 Lighting
      Entrances
      Parking Areas
      Critical Areas


 Perimeter Detection Systems
      Does Not Prevent Penetration
      Alerts Response Force
      Requires Response
      Nuisance Alarms
      Costly
Boundary Protection Cont…
 CCTV
    Efficiency
    Requires Human Response
    Limitations


 Staffing
    Access Control Points
    Patrols
    Employees
Computing Facility Requirements
 Walls
     True Floor to Ceiling
     Fire Rating (at least 1 hour)
     Penetrations
     Adjacent Areas
 Doors
     Interior/Exterior
     Hinges
     Fire Rating
     Alarms
     Monitoring
Computing Facility Requirements Cont…
 Windows/Openings
     Interior/Exterior
     Fixed
     Shatterproof
 Computer and Equipment Room Lay Out
     Equipment Access
     Storage
     Occupied Areas
     Water Sources
     Cable Routing
Computing Facility Requirements Cont…
 Dedicated Circuits
 Controlled Access to
    Power Distribution Panels
    Master Circuit Breakers
    Transformers
    Feeder Cables
 Emergency Power Off Controls
 Voltage Monitoring/Recording
 Surge Protection
Computing Facility Requirements Cont…
 Backup Power
  Alternate Feeders
  Uninterruptible Power Supply
     Hydrogen Gas Hazard
     Maintenance/Testing
  Emergency Power Generator
     Fuel Consideration
     Maintenance/Testing
     Costs
 HVAC
 Telecom
Computing Facility Requirements Cont…

   Humidity Controls
      Risk of Static Electricity
      Risk to Electric Connections
   Air Quality (Dust)
   Water Protection
      Falling Water
      Rising Water
      Drains
      Protective Coverings
      Moisture Detection Systems
Securing Storage Areas
 Forms Storage Rooms
   Increased Threat of Fire
   Combustibles
   Access Controls
 Media Storage Rooms
   Media Sensitivity
   Segregation
   Access Controls
   Environmental Controls
Media Protection
 Storage
    Media Libraries/Special Rooms
    Cabinets
    Vaults
 Location
    Operational
    Off-Site
 Transportation
Cable Protection
 Optical Fiber
 Copper Wire
 Certifying the Wiring and Cabling
 Controlling Access to Closets and Riser Rooms
Other Considerations
 Dealing with Existing Facilities
    Planning
    Upgrade/Renovation
    Incremental New Construction
 Protecting the Protection
    Implement Physical and Environmental Controls
     for Security Systems
    Protect against both Intentional and Inadvertent
     Threats
Personnel Access Controls

 Position Sensitivity Designation
 Management Review of Access Lists
 Background Screening/Re-Screening
 Termination/Transfer Controls
 Disgruntled Employees
Access Controls – Locks
 Preset Locks and Keys
 Programmable Locks
   Mechanical (Cipher Locks)
   Electronic (Keypad Systems): Digital Keyboard
      Number of Combinations
      Number of Digits in Code
      Frequency of Code Change
      Error Lock-Out
      Error Alarms
Access Controls - Tokens
 Security Card Systems
   Dumb Cards
     Photo Identification Badges
     Manual Visual Verification
     Can be Combined with Smart Technology


   Digital Coded (Smart) Cards
     Often Require Use of PIN Number with Card
     Readers: Card Insertion, Card Swipe & Proximity
Types of Access Cards

   Photo ID Cards
   Optical Coded Cards (Magnetic Dot)
   Electric Circuit Cards (Embedded Wire)
   Magnetic Cards (Magnetic Particles)
   Metallic Stripe Card (Copper Strips)
Access Controls - Biometrics
  Fingerprint/Thumbprint Scan
  Blood Vein Pattern Scan
        Retina
        Wrist
        Hand
    Hand Geometry
    Facial Recognition
    Voice Verification
    Keystroke Recorders
    Problems
      Cost
      Speed
      Accuracy
Physical Security in Distributed
             Processing
 Threats
  To Confidentiality
    Sharing Computers
    Sharing Diskettes
  To Availability
     User Errors
  To Data Integrity
    Malicious Code
    Version Control
Physical Security Controls Distributed
            Processing
 Office Area Controls
   Entry Controls
   Office Lay-Out
   Personnel Controls
   Hard-Copy Document Controls
   Electronic Media Controls
   Clean-Desk Policy
Physical Security Controls - Office Area

  Printer/Output Controls
  Property Controls
  Space Protection Devices
  Equipment Lock-Down
Physical Security Controls - Distributed
          Processing Cont…
  Cable Locks
  Disk Locks
  Port Controls
  Power Switch Locks
  Keyboard Locks
  Cover Locks
Physical Security Controls - Distributed
          Processing Cont…
   Isolated Power Source
      Noise
      Voltage Fluctuations
      Power Outages
   Heat/Humidity Considerations
   Fire/Water
   Magnetic Media Controls
Physical Security Controls Extended
             Processing
 User Responsibilities Paramount
   Protection against Disclosure
      Shoulder Surfing
      Access to Sensitive Media and Written Material
   Integrity Protection
   Protection against Loss or Theft
      Locks
      Practices
 Management Responsibilities
   Approval
   Monitoring
Physical Security - Other Terms
   Tailgate                     Passive Ultrasonic
   Piggy-Back                   Fail Safe/Fail Soft
   Stay Behind                  IDS
                                Shoulder Surfing
    Degauss
                                 Electronic Emanation
   Remanence
                                 Tsunami
   Mantrap
                                 RFI
   Pass-Back                    Defense in Depth
   Dumpster Diving              EMI
   False Positive/Negative      Top Guard
   Montreal Protocol
   Duress Alarm
   Tamper Alarm
?

Mais conteúdo relacionado

Mais procurados

Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Securityleminhvuong
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overviewxband
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 
Physical Security Domain
Physical Security DomainPhysical Security Domain
Physical Security Domainamiable_indian
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentFaheem Ul Hasan
 
Security risk management
Security risk managementSecurity risk management
Security risk managementG Prachi
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best PracticesEvolve IP
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingDaniel P Wallace
 
The Perimeter Protection Issues, Technique and Operation
The Perimeter Protection Issues, Technique and OperationThe Perimeter Protection Issues, Technique and Operation
The Perimeter Protection Issues, Technique and OperationHafiza Abas
 
CISSP - Chapter 3 - Physical security
CISSP - Chapter 3  - Physical securityCISSP - Chapter 3  - Physical security
CISSP - Chapter 3 - Physical securityKarthikeyan Dhayalan
 

Mais procurados (20)

Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Security
 
Physical Security.ppt
Physical Security.pptPhysical Security.ppt
Physical Security.ppt
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overview
 
Physical Security Management System
Physical Security Management SystemPhysical Security Management System
Physical Security Management System
 
Security incident
Security incidentSecurity incident
Security incident
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
Physical Security Domain
Physical Security DomainPhysical Security Domain
Physical Security Domain
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
SECURITY AWARENESS
SECURITY AWARENESSSECURITY AWARENESS
SECURITY AWARENESS
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Physical Security.ppt
Physical Security.pptPhysical Security.ppt
Physical Security.ppt
 
Corporate security
Corporate securityCorporate security
Corporate security
 
Access control
Access controlAccess control
Access control
 
8 Access Control
8 Access Control8 Access Control
8 Access Control
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
The Perimeter Protection Issues, Technique and Operation
The Perimeter Protection Issues, Technique and OperationThe Perimeter Protection Issues, Technique and Operation
The Perimeter Protection Issues, Technique and Operation
 
Domain 1 - Security and Risk Management
Domain 1 - Security and Risk ManagementDomain 1 - Security and Risk Management
Domain 1 - Security and Risk Management
 
CISSP - Chapter 3 - Physical security
CISSP - Chapter 3  - Physical securityCISSP - Chapter 3  - Physical security
CISSP - Chapter 3 - Physical security
 

Destaque

Beginner talk physical security - manasdeep
Beginner talk   physical security - manasdeepBeginner talk   physical security - manasdeep
Beginner talk physical security - manasdeepManas Deep
 
Transmission modes & medias networking
Transmission modes & medias networkingTransmission modes & medias networking
Transmission modes & medias networkingVINOTHINI DURAIRAJ
 
Rafał Korszuń: Security in Design of Cloud Applications
Rafał Korszuń: Security in Design of Cloud ApplicationsRafał Korszuń: Security in Design of Cloud Applications
Rafał Korszuń: Security in Design of Cloud ApplicationsAnalyticsConf
 
ITFT_Transmission modes
ITFT_Transmission modesITFT_Transmission modes
ITFT_Transmission modesSwati Aggarwal
 
Network Security
Network SecurityNetwork Security
Network Securityforpalmigho
 
Networking Devices and Networking Topologies
Networking Devices and Networking TopologiesNetworking Devices and Networking Topologies
Networking Devices and Networking Topologiesmc aa
 
Communication & network devices
Communication & network devicesCommunication & network devices
Communication & network devicesHarman Grewal
 
Memory organisation
Memory organisationMemory organisation
Memory organisationankush_kumar
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 pptvasanthimuniasamy
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference ModelMukesh Tekwani
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of NetworkingMukesh Tekwani
 
Networking devices
Networking devicesNetworking devices
Networking devicesrupinderj
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 

Destaque (20)

Beginner talk physical security - manasdeep
Beginner talk   physical security - manasdeepBeginner talk   physical security - manasdeep
Beginner talk physical security - manasdeep
 
Transmission modes & medias networking
Transmission modes & medias networkingTransmission modes & medias networking
Transmission modes & medias networking
 
Rafał Korszuń: Security in Design of Cloud Applications
Rafał Korszuń: Security in Design of Cloud ApplicationsRafał Korszuń: Security in Design of Cloud Applications
Rafał Korszuń: Security in Design of Cloud Applications
 
ITFT_Transmission modes
ITFT_Transmission modesITFT_Transmission modes
ITFT_Transmission modes
 
Network Security
Network SecurityNetwork Security
Network Security
 
Networking Devices and Networking Topologies
Networking Devices and Networking TopologiesNetworking Devices and Networking Topologies
Networking Devices and Networking Topologies
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Transmission modes
Transmission modesTransmission modes
Transmission modes
 
Communication & network devices
Communication & network devicesCommunication & network devices
Communication & network devices
 
Modem presentation
Modem presentationModem presentation
Modem presentation
 
Modem
ModemModem
Modem
 
Memory organisation
Memory organisationMemory organisation
Memory organisation
 
E governance
E governanceE governance
E governance
 
Memory organization
Memory organizationMemory organization
Memory organization
 
Network Security
Network SecurityNetwork Security
Network Security
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of Networking
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 

Semelhante a 7. physical sec

Physicalsecuritypresentation 130630193821-phpapp01
Physicalsecuritypresentation 130630193821-phpapp01Physicalsecuritypresentation 130630193821-phpapp01
Physicalsecuritypresentation 130630193821-phpapp01brijesh singh
 
Client Server Server Room Risk
Client  Server    Server  Room  RiskClient  Server    Server  Room  Risk
Client Server Server Room Riskcolmbennett
 
Data Center Security
Data Center SecurityData Center Security
Data Center Securitydevalnaik
 
Chapter 17 telecommunications and networkingConnections.docx
Chapter 17 telecommunications and networkingConnections.docxChapter 17 telecommunications and networkingConnections.docx
Chapter 17 telecommunications and networkingConnections.docxwalterl4
 
ZKTeco-Smart Park Solution - Smart Cloud Building-20201224.pptx
ZKTeco-Smart Park Solution - Smart Cloud Building-20201224.pptxZKTeco-Smart Park Solution - Smart Cloud Building-20201224.pptx
ZKTeco-Smart Park Solution - Smart Cloud Building-20201224.pptxLongBun1
 
Chapter 18 vital records recoveryVital assetsIn.docx
Chapter 18 vital records recoveryVital assetsIn.docxChapter 18 vital records recoveryVital assetsIn.docx
Chapter 18 vital records recoveryVital assetsIn.docxketurahhazelhurst
 
Defending our datacenters (BICSI 2016 ASEAN conference)
Defending our datacenters  (BICSI 2016 ASEAN  conference)Defending our datacenters  (BICSI 2016 ASEAN  conference)
Defending our datacenters (BICSI 2016 ASEAN conference)Jeffrey Lam
 
德國TSI公司簡報-1
德國TSI公司簡報-1德國TSI公司簡報-1
德國TSI公司簡報-1俠客科技
 
Photovoltaic Training Course - Module 3.4 - plant security
Photovoltaic Training Course - Module 3.4 - plant securityPhotovoltaic Training Course - Module 3.4 - plant security
Photovoltaic Training Course - Module 3.4 - plant securityLeonardo ENERGY
 
Datwyler data center presentation info tech middle east
Datwyler data center presentation info tech middle eastDatwyler data center presentation info tech middle east
Datwyler data center presentation info tech middle eastAli Shoaee
 
Concept of physical protection and its principals
Concept of physical protection and its principalsConcept of physical protection and its principals
Concept of physical protection and its principalsRasheed Abbasi
 
Presentation for power plant 2021 by link vue system
Presentation for power plant 2021 by link vue systemPresentation for power plant 2021 by link vue system
Presentation for power plant 2021 by link vue systemMahesh Chandra Manav
 
IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)
IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)
IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)sequi_inc
 
chapter 1 security.ppt
chapter 1 security.pptchapter 1 security.ppt
chapter 1 security.pptgirmawodajo
 
Physical Security.ppt
Physical Security.pptPhysical Security.ppt
Physical Security.pptssuserb680dd
 

Semelhante a 7. physical sec (20)

Physicalsecuritypresentation 130630193821-phpapp01
Physicalsecuritypresentation 130630193821-phpapp01Physicalsecuritypresentation 130630193821-phpapp01
Physicalsecuritypresentation 130630193821-phpapp01
 
Client Server Server Room Risk
Client  Server    Server  Room  RiskClient  Server    Server  Room  Risk
Client Server Server Room Risk
 
Data Center Security
Data Center SecurityData Center Security
Data Center Security
 
Highrise
HighriseHighrise
Highrise
 
Chapter 17 telecommunications and networkingConnections.docx
Chapter 17 telecommunications and networkingConnections.docxChapter 17 telecommunications and networkingConnections.docx
Chapter 17 telecommunications and networkingConnections.docx
 
ZKTeco-Smart Park Solution - Smart Cloud Building-20201224.pptx
ZKTeco-Smart Park Solution - Smart Cloud Building-20201224.pptxZKTeco-Smart Park Solution - Smart Cloud Building-20201224.pptx
ZKTeco-Smart Park Solution - Smart Cloud Building-20201224.pptx
 
Chapter 18 vital records recoveryVital assetsIn.docx
Chapter 18 vital records recoveryVital assetsIn.docxChapter 18 vital records recoveryVital assetsIn.docx
Chapter 18 vital records recoveryVital assetsIn.docx
 
Server Rack Fire Protection
Server Rack Fire ProtectionServer Rack Fire Protection
Server Rack Fire Protection
 
Defending our datacenters (BICSI 2016 ASEAN conference)
Defending our datacenters  (BICSI 2016 ASEAN  conference)Defending our datacenters  (BICSI 2016 ASEAN  conference)
Defending our datacenters (BICSI 2016 ASEAN conference)
 
Chapter 9 (1).ppt
Chapter 9 (1).pptChapter 9 (1).ppt
Chapter 9 (1).ppt
 
德國TSI公司簡報-1
德國TSI公司簡報-1德國TSI公司簡報-1
德國TSI公司簡報-1
 
Photovoltaic Training Course - Module 3.4 - plant security
Photovoltaic Training Course - Module 3.4 - plant securityPhotovoltaic Training Course - Module 3.4 - plant security
Photovoltaic Training Course - Module 3.4 - plant security
 
Datwyler data center presentation info tech middle east
Datwyler data center presentation info tech middle eastDatwyler data center presentation info tech middle east
Datwyler data center presentation info tech middle east
 
Concept of physical protection and its principals
Concept of physical protection and its principalsConcept of physical protection and its principals
Concept of physical protection and its principals
 
Presentation for power plant 2021 by link vue system
Presentation for power plant 2021 by link vue systemPresentation for power plant 2021 by link vue system
Presentation for power plant 2021 by link vue system
 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
 
IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)
IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)
IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)
 
chapter 1 security.ppt
chapter 1 security.pptchapter 1 security.ppt
chapter 1 security.ppt
 
007.itsecurity bcp v1
007.itsecurity bcp v1007.itsecurity bcp v1
007.itsecurity bcp v1
 
Physical Security.ppt
Physical Security.pptPhysical Security.ppt
Physical Security.ppt
 

Mais de 7wounders

10. law invest & ethics
10. law invest & ethics10. law invest & ethics
10. law invest & ethics7wounders
 
8. operations security
8. operations security8. operations security
8. operations security7wounders
 
6. cryptography
6. cryptography6. cryptography
6. cryptography7wounders
 
5. telecomm & network security
5. telecomm & network security5. telecomm & network security
5. telecomm & network security7wounders
 
3. security architecture and models
3. security architecture and models3. security architecture and models
3. security architecture and models7wounders
 
2. access control
2. access control2. access control
2. access control7wounders
 
1. security management practices
1. security management practices1. security management practices
1. security management practices7wounders
 

Mais de 7wounders (8)

Cissp why
Cissp whyCissp why
Cissp why
 
10. law invest & ethics
10. law invest & ethics10. law invest & ethics
10. law invest & ethics
 
8. operations security
8. operations security8. operations security
8. operations security
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
5. telecomm & network security
5. telecomm & network security5. telecomm & network security
5. telecomm & network security
 
3. security architecture and models
3. security architecture and models3. security architecture and models
3. security architecture and models
 
2. access control
2. access control2. access control
2. access control
 
1. security management practices
1. security management practices1. security management practices
1. security management practices
 

Último

CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSpanmisemningshen123
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfwill854175
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSDurg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSkajalroy875762
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Adnet Communications
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGpr788182
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...meghakumariji156
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptxRoofing Contractor
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGpr788182
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165meghakumariji156
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGpr788182
 
Kalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book nowKalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book nowranineha57744
 
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book nowGUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book nowkapoorjyoti4444
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizharallensay1
 

Último (20)

CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSDurg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
WheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond InsightsWheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond Insights
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Kalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book nowKalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book now
 
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book nowGUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 

7. physical sec

  • 2. Objective To address the threats, vulnerabilities, and countermeasures which can be utilized to physically protect an enterprise’s resources and sensitive information to include people, facilities, data, equipment, support systems, media, and supplies. To discuss considerations for choosing a secure site, its design and configuration, and the methods for securing the facility against unauthorized access, theft of equipment and information, and the environmental and safety measures needed to protect people, the facility, and its resources.
  • 3. Physical Security  Physical Security Threats  Site Design and Configuration  Physical Security Requirements – For Centralized Computing Facilities – For Distributed Processing Facilities – For Extended Processing
  • 5. Information Protection Environment  Crime Prevention through Environmental Design (CPTED) • Concept that, as its basic premise, states that the physical environment of a building can be changed or managed to produce behavioral effects that will reduce the incidence and fear of crime • Territoriality • Surveillance • Access control
  • 6. Information Protection Environment Cont…  Site Location • Specific physical security concerns • Vulnerable to crime, riots, demonstrations, or terrorism attacks • Neighborhood crime rates and types • Vulnerable to natural disasters  Construction Impacts  Facility Impacts • Entry points • Infrastructure support systems • Electrical power • Heating, ventilation, air conditioning (and refrigeration) • Internal sensitive or compartmentalized areas • Portable computing
  • 7. Information Protection Environment Cont…  Electrical Power – Vulnerabilities include total power loss of short or long duration or degradation in power quality, such as brownouts, spikes, or sags • Blackout - complete loss of commercial power • Fault - momentary power outage • Brownout - an intentional reduction of voltage by a utility company • Sag/dip - a short period of low voltage • Surge - a sudden rise in voltage in the power supply • Transient - line noise or disturbance is superimposed on the supply circuit and can cause fluctuations in electrical power • In-rush current - the initial surge of current required by a load before it reaches normal operation • Electrostatic discharge - another type of electrical surge can occur when two non-conducting materials rub together, causing electrons to transfer from one material to another
  • 8. The Layered Defense  Perimeter and building grounds – Landscaping, Fences, Gates, Bollards, Walls, and Doors • 1 meter/3–4 feet - Deters casual trespassers • 2 meters/6–7 feet - Too high to climb easily • 2.4 meters/8 feet with top guard - Deters determined intruder  Building entry points  Inside the building - building floors, office suites, and offices
  • 9. Fire Protection  Fire Prevention – Fireproof Construction materials – False ceiling should not be flammable – Magnetic tapes, if ignited, produce poisonous gases – fire-prevention training  Fire Detection – Ionization-type smoke detectors – Photoelectric detectors – Heat detectors “The first rule is to get the people out”
  • 10. Fire Protection Cont…  Fire Suppression
  • 11. Fire Protection Cont…  Portable Extinguishers  At Exits  Mark Locations and Type  Types A, B & C  Need to Inspect  Water Sprinkler Systems  Works to Lower Temperature  Most Damaging to Equipment  Conventional Systems  “Dry Pipe” Systems: Less Risk of Leakage  Employ in Throughout Building and in all Spaces
  • 12. Fire Protection Cont…  Carbon Dioxide (CO2)  Colorless/Odorless  Potentially Lethal  Removes Oxygen  Best for Unattended Facilities  Delayed-Activation in Manned Facilities  Halon  Best Protection for Equipment  Concentrations <10% are Safe  Becomes Toxic at 900o  Depletes Ozone (CFCs)  Montreal Protocol (1987)  Halon 1301: Requires Pressurization  Halon 1211: Self-Pressurization (Portable Extinguishers)
  • 13. Physical Security Threats  Threat Components  Agents  Motives  Results  External Threats  Wind/Tornado  Flooding  Lightning  Earthquake  Cold and Ice  Fire  Chemical
  • 14. Physical Security Threats Cont…  Internal Physical Threats  Fire  Environmental Failure  Liquid Leakage  Electrical Interruption  Human Threats  Theft  Vandalism  Sabotage  Espionage  Errors
  • 15. Site Design Considerations  Location and Access  Local Crime  Visibility  Emergency Access  Natural Hazards  Air and Surface Traffic  Joint Tenants  Stable Power Supply  Existing Boundary Protection (Barriers/Fencing/Gates)
  • 16. Boundary Protection  Area Designation: Facilitates Enforcement  Vehicular Access  Personnel Access  Occupants  Visitors (Escort & Logging)  Fences  Deter Casual Trespassing  Compliments Other Access Controls  Aesthetics  Won’t Stop Determined Intruder
  • 17. Boundary Protection Cont…  Lighting  Entrances  Parking Areas  Critical Areas  Perimeter Detection Systems  Does Not Prevent Penetration  Alerts Response Force  Requires Response  Nuisance Alarms  Costly
  • 18. Boundary Protection Cont…  CCTV  Efficiency  Requires Human Response  Limitations  Staffing  Access Control Points  Patrols  Employees
  • 19. Computing Facility Requirements  Walls  True Floor to Ceiling  Fire Rating (at least 1 hour)  Penetrations  Adjacent Areas  Doors  Interior/Exterior  Hinges  Fire Rating  Alarms  Monitoring
  • 20. Computing Facility Requirements Cont…  Windows/Openings  Interior/Exterior  Fixed  Shatterproof  Computer and Equipment Room Lay Out  Equipment Access  Storage  Occupied Areas  Water Sources  Cable Routing
  • 21. Computing Facility Requirements Cont…  Dedicated Circuits  Controlled Access to  Power Distribution Panels  Master Circuit Breakers  Transformers  Feeder Cables  Emergency Power Off Controls  Voltage Monitoring/Recording  Surge Protection
  • 22. Computing Facility Requirements Cont…  Backup Power Alternate Feeders Uninterruptible Power Supply Hydrogen Gas Hazard Maintenance/Testing Emergency Power Generator Fuel Consideration Maintenance/Testing Costs  HVAC  Telecom
  • 23. Computing Facility Requirements Cont…  Humidity Controls  Risk of Static Electricity  Risk to Electric Connections  Air Quality (Dust)  Water Protection  Falling Water  Rising Water  Drains  Protective Coverings  Moisture Detection Systems
  • 24. Securing Storage Areas  Forms Storage Rooms  Increased Threat of Fire  Combustibles  Access Controls  Media Storage Rooms  Media Sensitivity  Segregation  Access Controls  Environmental Controls
  • 25. Media Protection  Storage  Media Libraries/Special Rooms  Cabinets  Vaults  Location  Operational  Off-Site  Transportation
  • 26. Cable Protection  Optical Fiber  Copper Wire  Certifying the Wiring and Cabling  Controlling Access to Closets and Riser Rooms
  • 27. Other Considerations  Dealing with Existing Facilities  Planning  Upgrade/Renovation  Incremental New Construction  Protecting the Protection  Implement Physical and Environmental Controls for Security Systems  Protect against both Intentional and Inadvertent Threats
  • 28. Personnel Access Controls  Position Sensitivity Designation  Management Review of Access Lists  Background Screening/Re-Screening  Termination/Transfer Controls  Disgruntled Employees
  • 29. Access Controls – Locks  Preset Locks and Keys  Programmable Locks  Mechanical (Cipher Locks)  Electronic (Keypad Systems): Digital Keyboard  Number of Combinations  Number of Digits in Code  Frequency of Code Change  Error Lock-Out  Error Alarms
  • 30. Access Controls - Tokens  Security Card Systems  Dumb Cards Photo Identification Badges Manual Visual Verification Can be Combined with Smart Technology  Digital Coded (Smart) Cards Often Require Use of PIN Number with Card Readers: Card Insertion, Card Swipe & Proximity
  • 31. Types of Access Cards  Photo ID Cards  Optical Coded Cards (Magnetic Dot)  Electric Circuit Cards (Embedded Wire)  Magnetic Cards (Magnetic Particles)  Metallic Stripe Card (Copper Strips)
  • 32. Access Controls - Biometrics  Fingerprint/Thumbprint Scan  Blood Vein Pattern Scan  Retina  Wrist  Hand  Hand Geometry  Facial Recognition  Voice Verification  Keystroke Recorders  Problems  Cost  Speed  Accuracy
  • 33. Physical Security in Distributed Processing  Threats To Confidentiality Sharing Computers Sharing Diskettes To Availability  User Errors To Data Integrity Malicious Code Version Control
  • 34. Physical Security Controls Distributed Processing  Office Area Controls  Entry Controls  Office Lay-Out  Personnel Controls  Hard-Copy Document Controls  Electronic Media Controls  Clean-Desk Policy
  • 35. Physical Security Controls - Office Area  Printer/Output Controls  Property Controls  Space Protection Devices  Equipment Lock-Down
  • 36. Physical Security Controls - Distributed Processing Cont… Cable Locks Disk Locks Port Controls Power Switch Locks Keyboard Locks Cover Locks
  • 37. Physical Security Controls - Distributed Processing Cont…  Isolated Power Source  Noise  Voltage Fluctuations  Power Outages  Heat/Humidity Considerations  Fire/Water  Magnetic Media Controls
  • 38. Physical Security Controls Extended Processing  User Responsibilities Paramount  Protection against Disclosure  Shoulder Surfing  Access to Sensitive Media and Written Material  Integrity Protection  Protection against Loss or Theft  Locks  Practices  Management Responsibilities  Approval  Monitoring
  • 39. Physical Security - Other Terms  Tailgate  Passive Ultrasonic  Piggy-Back  Fail Safe/Fail Soft  Stay Behind  IDS   Shoulder Surfing Degauss  Electronic Emanation  Remanence  Tsunami  Mantrap  RFI  Pass-Back  Defense in Depth  Dumpster Diving  EMI  False Positive/Negative  Top Guard  Montreal Protocol  Duress Alarm  Tamper Alarm
  • 40. ?