SlideShare uma empresa Scribd logo
1 de 17
PHYSICAL ACCESS
CONTROLS
GENERAL SECURITY
SUBMITTED BY:
AHSIN YOUSAF: L4F15ASOC0028
03032548705
SUBMITTED TO :-
PROF JAHANZAIB MALHI
WHAT IS THE PHYSICAL ACCESS
 Physical access is a term in computer security that refers to the
ability of people to physically gain access to a computer system.
According to Gregory White, "Given physical access to an
office, the knowledgeable attacker will quickly be able to find
the information needed to gain access to the organization's
computer systems and network.
THREATS
 Internal Threats:
 Internal threats are from individuals that have legitimate access such as employees, students, and
contractors. Insiders can be extremely difficult to detect or to protect
 • access, process, and distribute pornography materials.
 • access unauthorized information (salary, secret trade).
 External Threats:
Outside intruders can be hackers/crackers, saboteurs and thieves. If the network is compromised,
Intruders can attack or misuse the system.
WHAT DO YOU NEED TO DO?
 Make sure that doors and windows are kept locked when the area is not in use.
 Return any keys when no longer required or when you leave the University.
 Report any lost keys to the issuer.
 Report any unauthorised access or any alerts (e.g. burglar alarms) to site security.
 Make sure that information on your screen cannot be seen by unauthorised individuals – use a privacy
screen if required.
CONTINUE
•Ensure that any area where restricted University information is stored or processed has controlled access
or a staffed reception desk.
•Keep a record of key holders.
•Ensure that equipment such as photocopiers, scanners and digital cameras is protected from unauthorised
access.
•Situate faxes so that unauthorised individuals cannot see information sent to the machine. If your fax is
used to send or receive confidential information, ensure you have appropriate procedures and protection in
place to secure the information.
•If you are responsible for a restricted IT space, such as a data centre, telecommunications room, wiring
centre or IT storeroom, make sure that appropriate authorisation processes for access and physical security
measures are in place.
SECURITY CONTROLS
 Security controls are safeguards or countermeasures to avoid, detect, counteract, or
minimize security risks to physical property, information, computer systems, or other assets.
 They can be classified by several criteria.
 Before the event, preventive controls are intended to prevent an incident from occurring e.g. by
locking out unauthorized intruders;
 During the event, detective controls are intended to identify and characterize an incident in progress
e.g. by sounding the intruder alarm and alerting the security guards or police;
 After the event, corrective controls are intended to limit the extent of any damage caused by the
incident e.g. by recovering the organization to normal working status as efficiently as possible
PHYSICAL SECURITY
 Physical security is the protection of
personnel, hardware, software, networks and data from physical actions and events that
could cause serious loss or damage to an enterprise, agency or institution. This includes
protection from fire, flood, natural disasters, burglary, theft, vandalism and terrorism.
WHAT ARE PHYSICAL ACCESS CONTROLS?
CONTROLS
 CCTV
 A Biometric device
 Metal detectors
 Locks
 Lighting.
 Portable device security
 Alarm systems
 Doors
 Windows
 Emergency procedure
 On-going employee checks
 Electrical power
CCTV & DEPLOYMENT
 A television transmission system that uses cameras to transmit pictures to connected monitors
 Detection: The ability to detect the presence of an object
 Recognition: The ability to determine the type of object (animal, blowing debris, crawling human)
 • Cameras high enough to avoid physical attack
 • Cameras distributed to include blind areas
 • Appropriate Lenses must be high definition
 • Pan, Tilt, Zoom (PTZ) as required
 • Ability to be recorded
 • Camera system tied to alarm system.
A BIOMETRIC DEVICE
 It is a security identification and authentication device. Such devices verifying the identity of a living
person based on a physiological or behavioral characteristic.
These characteristics include:
 Fingerprint scanners
 Face and voice recognition systems
 Iris and retinal scans
METAL DETECTORS
SECURITY GUARD
 A metal detector is an electronic instrument which detects the presence of metal nearby. Metal
detectors are useful for finding metal inclusions hidden within objects, or metal objects buried
underground.
 Security guards use the metal detector and check every in going and out going person. That they any
harmful things or not. If they have any kind of these things they investigate on it.
 Also check that in going people are authorized or unauthorized.
LIGHTING
 • Provides a deterrent to intruders
 • Makes detection likely if entry attempted
 • Should be used with other controls such as fences, patrols, alarm systems, CCTV.
Types of lighting
 • Continuous Lighting (Most Common)
 – Glare Projection
 – Flood Lighting
 Trip Lighting , Standby Lighting , Movable (Portable) , Emergency Lighting.
PORTABLE DEVICE SECURITY
 Laptops, PDAs, Etc.
 Protect the device
 Protect the data in the device
 Examples: –
 Locking the cables – Tracing software – Encryption software – PIN Protection for PDAs – Inventory
system
ALARM SYSTEMS
 • Local alarm systems
 – Alarm sounds locally and must be protected from tampering and audible for at least 400 feet
 • Central station units
 – Monitored 7x24 and signalled over leased lines
 – Usually within < 10 minutes travel time
 – Private security firms
 Proprietary systems
 – Similar to central but owned and operated by customer

Mais conteúdo relacionado

Mais procurados

Access_Control_Systems_and_methodology
Access_Control_Systems_and_methodologyAccess_Control_Systems_and_methodology
Access_Control_Systems_and_methodology
Arti Ambokar
 
8. operations security
8. operations security8. operations security
8. operations security
7wounders
 
Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Security
leminhvuong
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
Sonu Sunaliya
 
Information security management
Information security managementInformation security management
Information security management
UMaine
 

Mais procurados (20)

Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Access_Control_Systems_and_methodology
Access_Control_Systems_and_methodologyAccess_Control_Systems_and_methodology
Access_Control_Systems_and_methodology
 
8 Access Control
8 Access Control8 Access Control
8 Access Control
 
Information Security Policies and Standards
Information Security Policies and StandardsInformation Security Policies and Standards
Information Security Policies and Standards
 
8. operations security
8. operations security8. operations security
8. operations security
 
Physical Security
Physical SecurityPhysical Security
Physical Security
 
6 Physical Security
6 Physical Security6 Physical Security
6 Physical Security
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principles
 
Ch07 Access Control Fundamentals
Ch07 Access Control FundamentalsCh07 Access Control Fundamentals
Ch07 Access Control Fundamentals
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Security
 
Physical Security.ppt
Physical Security.pptPhysical Security.ppt
Physical Security.ppt
 
Physical Security.ppt
Physical Security.pptPhysical Security.ppt
Physical Security.ppt
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
 
Physical security
Physical securityPhysical security
Physical security
 
Information security management
Information security managementInformation security management
Information security management
 
Incident response
Incident responseIncident response
Incident response
 
Incident Response
Incident Response Incident Response
Incident Response
 

Semelhante a Physical access control

Physical security.docx
Physical security.docxPhysical security.docx
Physical security.docx
MVNVKUMAR
 
Physical security is a fundamental component of any secure infrastru.pdf
Physical security is a fundamental component of any secure infrastru.pdfPhysical security is a fundamental component of any secure infrastru.pdf
Physical security is a fundamental component of any secure infrastru.pdf
feelinggift
 
Basic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpageBasic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpage
nakomuri
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
learnt
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & Cyber
Paul Andrews
 
Intrusion Detection & Electronic Surveillance For Security
Intrusion Detection & Electronic Surveillance For SecurityIntrusion Detection & Electronic Surveillance For Security
Intrusion Detection & Electronic Surveillance For Security
PLN9 Security Services Pvt. Ltd.
 

Semelhante a Physical access control (20)

Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Physical security.docx
Physical security.docxPhysical security.docx
Physical security.docx
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issues
 
Physical security is a fundamental component of any secure infrastru.pdf
Physical security is a fundamental component of any secure infrastru.pdfPhysical security is a fundamental component of any secure infrastru.pdf
Physical security is a fundamental component of any secure infrastru.pdf
 
INFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMINFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEM
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
Basic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpageBasic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpage
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
Secure physical infrastructure
Secure physical infrastructureSecure physical infrastructure
Secure physical infrastructure
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & Cyber
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & Cyber
 
Smart
SmartSmart
Smart
 
Securing embedded systems
Securing embedded systemsSecuring embedded systems
Securing embedded systems
 
Security Intrusion Detection & Electronic Surveillance
Security Intrusion Detection & Electronic SurveillanceSecurity Intrusion Detection & Electronic Surveillance
Security Intrusion Detection & Electronic Surveillance
 
Intrusion Detection & Electronic Surveillance For Security
Intrusion Detection & Electronic Surveillance For SecurityIntrusion Detection & Electronic Surveillance For Security
Intrusion Detection & Electronic Surveillance For Security
 
Physical Penetration Testing - RootedCON 2015
Physical Penetration Testing - RootedCON 2015Physical Penetration Testing - RootedCON 2015
Physical Penetration Testing - RootedCON 2015
 
Physical Penetration Testing (RootedCON 2015)
Physical Penetration Testing (RootedCON 2015)Physical Penetration Testing (RootedCON 2015)
Physical Penetration Testing (RootedCON 2015)
 
computer security .ppt
computer security .pptcomputer security .ppt
computer security .ppt
 
INTRODUCTION TO SECURITY
INTRODUCTION TO SECURITYINTRODUCTION TO SECURITY
INTRODUCTION TO SECURITY
 

Mais de Ahsin Yousaf

Database Security Management
Database Security Management Database Security Management
Database Security Management
Ahsin Yousaf
 
Corporate law in pakistan
Corporate law in pakistanCorporate law in pakistan
Corporate law in pakistan
Ahsin Yousaf
 

Mais de Ahsin Yousaf (7)

Database Security Management
Database Security Management Database Security Management
Database Security Management
 
Corporate law in pakistan
Corporate law in pakistanCorporate law in pakistan
Corporate law in pakistan
 
Register Dld project
Register Dld projectRegister Dld project
Register Dld project
 
Three step writing process bovee by ahsin yousaf
Three step writing process bovee by ahsin yousafThree step writing process bovee by ahsin yousaf
Three step writing process bovee by ahsin yousaf
 
Financial Accounting presentation
Financial Accounting presentationFinancial Accounting presentation
Financial Accounting presentation
 
Bcrw
BcrwBcrw
Bcrw
 
Global market place
Global market placeGlobal market place
Global market place
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Physical access control

  • 2. SUBMITTED BY: AHSIN YOUSAF: L4F15ASOC0028 03032548705 SUBMITTED TO :- PROF JAHANZAIB MALHI
  • 3. WHAT IS THE PHYSICAL ACCESS  Physical access is a term in computer security that refers to the ability of people to physically gain access to a computer system. According to Gregory White, "Given physical access to an office, the knowledgeable attacker will quickly be able to find the information needed to gain access to the organization's computer systems and network.
  • 4.
  • 5. THREATS  Internal Threats:  Internal threats are from individuals that have legitimate access such as employees, students, and contractors. Insiders can be extremely difficult to detect or to protect  • access, process, and distribute pornography materials.  • access unauthorized information (salary, secret trade).  External Threats: Outside intruders can be hackers/crackers, saboteurs and thieves. If the network is compromised, Intruders can attack or misuse the system.
  • 6. WHAT DO YOU NEED TO DO?  Make sure that doors and windows are kept locked when the area is not in use.  Return any keys when no longer required or when you leave the University.  Report any lost keys to the issuer.  Report any unauthorised access or any alerts (e.g. burglar alarms) to site security.  Make sure that information on your screen cannot be seen by unauthorised individuals – use a privacy screen if required.
  • 7. CONTINUE •Ensure that any area where restricted University information is stored or processed has controlled access or a staffed reception desk. •Keep a record of key holders. •Ensure that equipment such as photocopiers, scanners and digital cameras is protected from unauthorised access. •Situate faxes so that unauthorised individuals cannot see information sent to the machine. If your fax is used to send or receive confidential information, ensure you have appropriate procedures and protection in place to secure the information. •If you are responsible for a restricted IT space, such as a data centre, telecommunications room, wiring centre or IT storeroom, make sure that appropriate authorisation processes for access and physical security measures are in place.
  • 8. SECURITY CONTROLS  Security controls are safeguards or countermeasures to avoid, detect, counteract, or minimize security risks to physical property, information, computer systems, or other assets.  They can be classified by several criteria.  Before the event, preventive controls are intended to prevent an incident from occurring e.g. by locking out unauthorized intruders;  During the event, detective controls are intended to identify and characterize an incident in progress e.g. by sounding the intruder alarm and alerting the security guards or police;  After the event, corrective controls are intended to limit the extent of any damage caused by the incident e.g. by recovering the organization to normal working status as efficiently as possible
  • 9. PHYSICAL SECURITY  Physical security is the protection of personnel, hardware, software, networks and data from physical actions and events that could cause serious loss or damage to an enterprise, agency or institution. This includes protection from fire, flood, natural disasters, burglary, theft, vandalism and terrorism.
  • 10. WHAT ARE PHYSICAL ACCESS CONTROLS?
  • 11. CONTROLS  CCTV  A Biometric device  Metal detectors  Locks  Lighting.  Portable device security  Alarm systems  Doors  Windows  Emergency procedure  On-going employee checks  Electrical power
  • 12. CCTV & DEPLOYMENT  A television transmission system that uses cameras to transmit pictures to connected monitors  Detection: The ability to detect the presence of an object  Recognition: The ability to determine the type of object (animal, blowing debris, crawling human)  • Cameras high enough to avoid physical attack  • Cameras distributed to include blind areas  • Appropriate Lenses must be high definition  • Pan, Tilt, Zoom (PTZ) as required  • Ability to be recorded  • Camera system tied to alarm system.
  • 13. A BIOMETRIC DEVICE  It is a security identification and authentication device. Such devices verifying the identity of a living person based on a physiological or behavioral characteristic. These characteristics include:  Fingerprint scanners  Face and voice recognition systems  Iris and retinal scans
  • 14. METAL DETECTORS SECURITY GUARD  A metal detector is an electronic instrument which detects the presence of metal nearby. Metal detectors are useful for finding metal inclusions hidden within objects, or metal objects buried underground.  Security guards use the metal detector and check every in going and out going person. That they any harmful things or not. If they have any kind of these things they investigate on it.  Also check that in going people are authorized or unauthorized.
  • 15. LIGHTING  • Provides a deterrent to intruders  • Makes detection likely if entry attempted  • Should be used with other controls such as fences, patrols, alarm systems, CCTV. Types of lighting  • Continuous Lighting (Most Common)  – Glare Projection  – Flood Lighting  Trip Lighting , Standby Lighting , Movable (Portable) , Emergency Lighting.
  • 16. PORTABLE DEVICE SECURITY  Laptops, PDAs, Etc.  Protect the device  Protect the data in the device  Examples: –  Locking the cables – Tracing software – Encryption software – PIN Protection for PDAs – Inventory system
  • 17. ALARM SYSTEMS  • Local alarm systems  – Alarm sounds locally and must be protected from tampering and audible for at least 400 feet  • Central station units  – Monitored 7x24 and signalled over leased lines  – Usually within < 10 minutes travel time  – Private security firms  Proprietary systems  – Similar to central but owned and operated by customer