SlideShare a Scribd company logo
Physical Security
Protecting what matters most…
Manasdeep
(manasdeeps@gmail.com)
#whoami
• Information Security Consultant
• Interested in Compliance and Penetration Testing
• Have a flair in writing for Information Security
• Like to learn and demonstrate latest security attack
vectors and technologies
Agenda
• Physical Security and its need
• Protecting what matters most
• Things to watch out for – Threats and Vulnerabilities
• Methodology - How to protect what matters
• Demo – Do you walk the talk??
Physical Security – Where is it?
Physical Security – What is at stake?
• Nothing should impede “life safety goals.”
• Safety:
• Deals with the protection of life and assets against fire, natural
disasters, and devastating accidents.
• Security:
• Addresses vandalism, theft, and attacks by individuals.
• Physical security, should be based on a layered defense model.
• Layers must be implemented at the perimeter and moving towards
an asset.
• Layers include: Deterrence, Delaying, Detection, Assessment,
Response
Physical Security – How to Plan?
• Careful and proper design of a physical environment can reduce
crime by directly affecting human behavior
• Natural Access Control : Guidance at entry and exit points
• Natural Surveillance : Maximizing visibility
• Territorial Reinforcement : Physical designs that highlight ownership
• Facility Selection
• Visibility (terrain, population)
• External factors (crime rate, first responder locations)
• Accessibility (road access, traffic, proximity to transportation services)
• Probability of Natural Disasters (floods, earthquakes)
• Safeguards:
• Mantraps to disallow piggybacking
• Fail safe design
• Fail secure design
Physical Security – Its all in the design
Methodology – How to protect what matters
Defense in Depth
Methodology – Control Flow
Physical Security – Threats
How much to invest?
Do you walk the talk??
DEMO
THANK YOU !!
- Manasdeephttp://reflect-infosec.blogspot.in/
https://twitter.com/manasdeep
https://in.linkedin.com/in/manasdeep

More Related Content

PPSX
Asset, Threat, Vulnerability, Risk
PPT
Lecture1 intro to cs
PDF
Radicalization in the Workplace
PPT
7. physical sec
PDF
Nagios Conference 2014 - Jorge Higueros - SNAPS
PPTX
3Es of Ransomware
PPTX
Http2 Security Perspective
PDF
Buffer overflow null
Asset, Threat, Vulnerability, Risk
Lecture1 intro to cs
Radicalization in the Workplace
7. physical sec
Nagios Conference 2014 - Jorge Higueros - SNAPS
3Es of Ransomware
Http2 Security Perspective
Buffer overflow null

Viewers also liked (20)

PPTX
Security certifications
ODP
Web Application Firewall
ODP
Secure coding in C#
PDF
PPTX
Metasploit For Beginners
PPT
Transmission modes & medias networking
PPTX
Rafał Korszuń: Security in Design of Cloud Applications
PDF
ITFT_Transmission modes
PPT
Network Security
PPSX
Networking Devices and Networking Topologies
PPTX
Networking devices
PPSX
Transmission modes
PPTX
Communication & network devices
PPTX
Modem presentation
PPT
PDF
Network discovery - Inside out by Aakash Goel
PPTX
Memory organisation
PDF
Memory organization
PPTX
E governance
PPT
Network Security
Security certifications
Web Application Firewall
Secure coding in C#
Metasploit For Beginners
Transmission modes & medias networking
Rafał Korszuń: Security in Design of Cloud Applications
ITFT_Transmission modes
Network Security
Networking Devices and Networking Topologies
Networking devices
Transmission modes
Communication & network devices
Modem presentation
Network discovery - Inside out by Aakash Goel
Memory organisation
Memory organization
E governance
Network Security
Ad

Similar to Beginner talk physical security - manasdeep (20)

PDF
Step Into Security Webinar - Threat Assessments in Schools
PPTX
basic of Information Security for beginner .pptx
DOCX
Undertake the Risk Analysis Policy
PPTX
InformationSecurityPresentationABCD.pptx
PPT
Isys20261 lecture 01
PPTX
CapTech Talks Webinar April 2023 Joshua Sinai.pptx
PPT
Information security introduction
PDF
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
PPTX
Ns lecture5: Introduction to Computer, Information, and Network Security.
PPTX
Digital literacy lecture 2 data security.pptx
PDF
Human Factors_Management & Organization.pdf
PPT
ISM Chapter 1.ppt
PDF
ISACA UAE - Importance of Human-Centric Approaches to Cyber Security
PDF
Evaluating and ImprovingBomb Threat Planning Process.pdf
PPTX
Jonas hallberg. securit
PDF
2015 Global APT Summit - Understanding APT threat agent characteristics is ke...
PDF
2015 Global APT Summit Matthew Rosenquist
PDF
information security introduction for campus students.pdf
PPT
INFORMATION SECURITY STUDY GUIDE for STUDENTS
PPT
ch01.ppt
Step Into Security Webinar - Threat Assessments in Schools
basic of Information Security for beginner .pptx
Undertake the Risk Analysis Policy
InformationSecurityPresentationABCD.pptx
Isys20261 lecture 01
CapTech Talks Webinar April 2023 Joshua Sinai.pptx
Information security introduction
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Ns lecture5: Introduction to Computer, Information, and Network Security.
Digital literacy lecture 2 data security.pptx
Human Factors_Management & Organization.pdf
ISM Chapter 1.ppt
ISACA UAE - Importance of Human-Centric Approaches to Cyber Security
Evaluating and ImprovingBomb Threat Planning Process.pdf
Jonas hallberg. securit
2015 Global APT Summit - Understanding APT threat agent characteristics is ke...
2015 Global APT Summit Matthew Rosenquist
information security introduction for campus students.pdf
INFORMATION SECURITY STUDY GUIDE for STUDENTS
ch01.ppt
Ad

Recently uploaded (20)

PDF
1_English_Language_Set_2.pdf probationary
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
Empowerment Technology for Senior High School Guide
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
Trump Administration's workforce development strategy
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
PPTX
Cell Types and Its function , kingdom of life
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PPTX
Introduction to Building Materials
PDF
Computing-Curriculum for Schools in Ghana
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
PDF
A systematic review of self-coping strategies used by university students to ...
1_English_Language_Set_2.pdf probationary
Final Presentation General Medicine 03-08-2024.pptx
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Empowerment Technology for Senior High School Guide
Supply Chain Operations Speaking Notes -ICLT Program
History, Philosophy and sociology of education (1).pptx
Trump Administration's workforce development strategy
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
Chinmaya Tiranga quiz Grand Finale.pdf
202450812 BayCHI UCSC-SV 20250812 v17.pptx
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
Cell Types and Its function , kingdom of life
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Introduction to Building Materials
Computing-Curriculum for Schools in Ghana
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
A systematic review of self-coping strategies used by university students to ...

Beginner talk physical security - manasdeep

  • 1. Physical Security Protecting what matters most… Manasdeep (manasdeeps@gmail.com)
  • 2. #whoami • Information Security Consultant • Interested in Compliance and Penetration Testing • Have a flair in writing for Information Security • Like to learn and demonstrate latest security attack vectors and technologies
  • 3. Agenda • Physical Security and its need • Protecting what matters most • Things to watch out for – Threats and Vulnerabilities • Methodology - How to protect what matters • Demo – Do you walk the talk??
  • 4. Physical Security – Where is it?
  • 5. Physical Security – What is at stake? • Nothing should impede “life safety goals.” • Safety: • Deals with the protection of life and assets against fire, natural disasters, and devastating accidents. • Security: • Addresses vandalism, theft, and attacks by individuals. • Physical security, should be based on a layered defense model. • Layers must be implemented at the perimeter and moving towards an asset. • Layers include: Deterrence, Delaying, Detection, Assessment, Response
  • 6. Physical Security – How to Plan? • Careful and proper design of a physical environment can reduce crime by directly affecting human behavior • Natural Access Control : Guidance at entry and exit points • Natural Surveillance : Maximizing visibility • Territorial Reinforcement : Physical designs that highlight ownership • Facility Selection • Visibility (terrain, population) • External factors (crime rate, first responder locations) • Accessibility (road access, traffic, proximity to transportation services) • Probability of Natural Disasters (floods, earthquakes) • Safeguards: • Mantraps to disallow piggybacking • Fail safe design • Fail secure design
  • 7. Physical Security – Its all in the design
  • 8. Methodology – How to protect what matters Defense in Depth
  • 11. How much to invest?
  • 12. Do you walk the talk?? DEMO
  • 13. THANK YOU !! - Manasdeephttp://reflect-infosec.blogspot.in/ https://twitter.com/manasdeep https://in.linkedin.com/in/manasdeep