SlideShare uma empresa Scribd logo
1 de 39
Physical Security Assessment
Basic Concepts of a Physical Security Assessment Daniel R. Finger MPA, CPP, CHPA Physical Security Specialist
Why Do Assessment? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why Do Assessments? (Cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Three Requirements for a Security Issue Opportunity Motive Means
Definition: Risk Assessment ,[object Object],[object Object]
Evaluation ,[object Object],[object Object],[object Object]
Protection ,[object Object],[object Object],[object Object]
Risk Management Framework ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Common Oversights of Security Directors ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Major Categories ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Potential Pitfalls ,[object Object],[object Object],[object Object],[object Object]
Security Master Plan ,[object Object],[object Object]
Joint Commission Security Standards ,[object Object],[object Object]
Identification of Practices ,[object Object],[object Object],[object Object],[object Object]
Performance Elements ,[object Object],[object Object],[object Object],[object Object]
Performance Elements (Cont.) ,[object Object],[object Object],[object Object]
Performance Elements (Cont.) ,[object Object],[object Object],[object Object],[object Object]
Security Management Program ,[object Object]
Physical Survey ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Physical Security Examples ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Physical Security Examples (Cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Physical Security Examples (Cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Infrastructure ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CPTED ,[object Object],[object Object],[object Object],[object Object],[object Object]
CPTED Actors ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key CPTED Concepts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
CPTED Benefits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Traffic Calming ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Fencing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Lighting ,[object Object],[object Object],[object Object],[object Object],[object Object]
Lighting (Cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Summary ,[object Object],[object Object]
[object Object],[object Object]
KRAA Security Services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
KRAA Security Information Services Security End to End + Multi-Layer = Complete  Firewall Public Internet Access Remote Sites Main Site Workstations Application Servers Web Servers Database Servers Email Servers ,[object Object],[object Object],Vulnerability Defense ,[object Object],[object Object],[object Object],[object Object],Intrusion Defense ,[object Object],[object Object],[object Object],[object Object],[object Object],Network Defense ,[object Object],[object Object],[object Object],[object Object],User Defense ,[object Object],[object Object],[object Object],Email Defense ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],System Defense ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control PresentationWajahat Rajab
 
Security Presentation
Security PresentationSecurity Presentation
Security PresentationGerhard Peens
 
7. physical sec
7. physical sec7. physical sec
7. physical sec7wounders
 
Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Securityleminhvuong
 
Physical security
Physical securityPhysical security
Physical securityDhani Ahmad
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk ManagementSam Bowne
 
The Perimeter Protection Issues, Technique and Operation
The Perimeter Protection Issues, Technique and OperationThe Perimeter Protection Issues, Technique and Operation
The Perimeter Protection Issues, Technique and OperationHafiza Abas
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamMohammed Adam
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical SecurityJorge Sebastiao
 
Security risk management
Security risk managementSecurity risk management
Security risk managementG Prachi
 
Raising information security awareness
Raising information security awarenessRaising information security awareness
Raising information security awarenessTerranovatraining
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practicesamiable_indian
 
Security Awareness & Training
Security Awareness & TrainingSecurity Awareness & Training
Security Awareness & Trainingnovemberchild
 
Physical Security Domain
Physical Security DomainPhysical Security Domain
Physical Security Domainamiable_indian
 

Mais procurados (20)

Physical security
Physical securityPhysical security
Physical security
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
Domain 1 - Security and Risk Management
Domain 1 - Security and Risk ManagementDomain 1 - Security and Risk Management
Domain 1 - Security and Risk Management
 
Security Presentation
Security PresentationSecurity Presentation
Security Presentation
 
7. physical sec
7. physical sec7. physical sec
7. physical sec
 
Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Security
 
6 Physical Security
6 Physical Security6 Physical Security
6 Physical Security
 
Physical security
Physical securityPhysical security
Physical security
 
SECURITY AWARENESS
SECURITY AWARENESSSECURITY AWARENESS
SECURITY AWARENESS
 
Physical security
Physical securityPhysical security
Physical security
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
The Perimeter Protection Issues, Technique and Operation
The Perimeter Protection Issues, Technique and OperationThe Perimeter Protection Issues, Technique and Operation
The Perimeter Protection Issues, Technique and Operation
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
Raising information security awareness
Raising information security awarenessRaising information security awareness
Raising information security awareness
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
 
Security Awareness & Training
Security Awareness & TrainingSecurity Awareness & Training
Security Awareness & Training
 
Physical Security Domain
Physical Security DomainPhysical Security Domain
Physical Security Domain
 

Semelhante a Physical Security Assessment Concepts

SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterMichael Nickle
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of securityciso_insights
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security BackgroundNicholas Davis
 
Information security background
Information security backgroundInformation security background
Information security backgroundNicholas Davis
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber securityInderjeet Singh
 
RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™CPaschal
 
1. security management practices
1. security management practices1. security management practices
1. security management practices7wounders
 
Incident Response
Incident Response Incident Response
Incident Response InnoTech
 
Ca world 2007 SOC integration
Ca world 2007 SOC integrationCa world 2007 SOC integration
Ca world 2007 SOC integrationMichael Nickle
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...abhichowdary16
 
9142019 Originality Reporthttpsucumberlands.blackboar.docx
9142019 Originality Reporthttpsucumberlands.blackboar.docx9142019 Originality Reporthttpsucumberlands.blackboar.docx
9142019 Originality Reporthttpsucumberlands.blackboar.docxblondellchancy
 
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management IIzapp0
 
Dancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehDancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehAnne Starr
 
Enterprise incident response 2017
Enterprise incident response   2017Enterprise incident response   2017
Enterprise incident response 2017zapp0
 
ASSE Safety 2016: Ed Sattar Speaks about Operational Risk and Regulatory Chan...
ASSE Safety 2016: Ed Sattar Speaks about Operational Risk and Regulatory Chan...ASSE Safety 2016: Ed Sattar Speaks about Operational Risk and Regulatory Chan...
ASSE Safety 2016: Ed Sattar Speaks about Operational Risk and Regulatory Chan...Ed Sattar
 
MUSE 2015 Product Showcase v2
MUSE 2015 Product Showcase v2MUSE 2015 Product Showcase v2
MUSE 2015 Product Showcase v2Chris Baldwin
 

Semelhante a Physical Security Assessment Concepts (20)

Insider threat kill chain
Insider threat   kill chainInsider threat   kill chain
Insider threat kill chain
 
Testing
TestingTesting
Testing
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of security
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
 
Information security background
Information security backgroundInformation security background
Information security background
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber security
 
RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™
 
1. security management practices
1. security management practices1. security management practices
1. security management practices
 
Incident Response
Incident Response Incident Response
Incident Response
 
Ca world 2007 SOC integration
Ca world 2007 SOC integrationCa world 2007 SOC integration
Ca world 2007 SOC integration
 
Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 
9142019 Originality Reporthttpsucumberlands.blackboar.docx
9142019 Originality Reporthttpsucumberlands.blackboar.docx9142019 Originality Reporthttpsucumberlands.blackboar.docx
9142019 Originality Reporthttpsucumberlands.blackboar.docx
 
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management II
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
Dancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehDancyrityshy 1foundatioieh
Dancyrityshy 1foundatioieh
 
Enterprise incident response 2017
Enterprise incident response   2017Enterprise incident response   2017
Enterprise incident response 2017
 
ASSE Safety 2016: Ed Sattar Speaks about Operational Risk and Regulatory Chan...
ASSE Safety 2016: Ed Sattar Speaks about Operational Risk and Regulatory Chan...ASSE Safety 2016: Ed Sattar Speaks about Operational Risk and Regulatory Chan...
ASSE Safety 2016: Ed Sattar Speaks about Operational Risk and Regulatory Chan...
 
MUSE 2015 Product Showcase v2
MUSE 2015 Product Showcase v2MUSE 2015 Product Showcase v2
MUSE 2015 Product Showcase v2
 

Physical Security Assessment Concepts