SlideShare a Scribd company logo
2
Most read
4
Most read
7
Most read
Security Program and
Policies
Principles and Practices
by Sari Stern Greene
Chapter 7: Physical & Environmental Security
Copyright 2014 Pearson Education, Inc. 2
Objectives
❑ Define the concept of physical security and how it relates to
information security
❑ Evaluate the security requirements of facilities, offices, and
equipment
❑ Understand the environmental risks posed to physical structures,
areas within those structures, and equipment
❑ Enumerate the vulnerabilities related to reusing and disposing of
equipment
❑ Recognize the risk posed by the loss or theft of mobile devices
and media
❑ Develop policies designed to ensure the physical environmental
security of information, information systems, and information
processing and storage facilities
Understanding the Secure Facility
Layered Defense Model
■ If an intruder bypasses one layer of controls,
the next layer should provide additional
defense and detection capabilities
■ Both physical and psychological
❑ The appearance of security is deterrent
Copyright 2014 Pearson Education, Inc. 3
Copyright 2014 Pearson Education, Inc. 4
How to Secure the Site
■ All implemented controls to physically protect
information are dictated first by a thorough analysis
of the company’s risks and vulnerabilities, along with
the value of the information that requires protection
■ From what are we protecting information assets?
❑ Theft
❑ Malicious destruction
❑ Accidental damage
❑ Damage that results from natural disasters
How to Secure the Site cont.
■ The design of a secure site starts with the
location
■ Location-based threats
❑ Political stability
❑ Susceptibility to terrorism
❑ Crime rate in the area
❑ Roadways and flight paths
❑ Utility stability
❑ Vulnerability to natural disasters
■ Critical information processing facilities should
be inconspicuous and unremarkable
Copyright 2014 Pearson Education, Inc. 5
Copyright 2014 Pearson Education, Inc. 6
How to Secure the Site Cont.
❑ The physical perimeter can be protected using:
■ Berms
■ Fences
■ Gates
■ Bollards
■ Man traps
■ Illuminated entrances, exits, pathways, and parking areas
■ Manned reception desk
■ Cameras, closed-circuit TV, alarms, motion sensors
■ Security guards
Copyright 2014 Pearson Education, Inc. 7
How Is Physical Access
Controlled?
❑ Physical entry controls:
■ Access control rules should be designed for:
❑ Employees
❑ Third-party contractors/partners/vendors
❑ Visitors
■ Visitors should be required to wear identification that can
be evaluated from a distance, such as a badge
■ Identification should start as soon as a person attempts
to gain entry
Copyright 2014 Pearson Education, Inc. 8
How Is Physical Access
Controlled? Cont.
❑ Physical entry controls:
■ Authorized users should be authorized prior to gaining
access to protected area
■ Visitors should be identified, labeled, and authorized
prior to gaining access to protected area
■ An audit trail should be created
Copyright 2014 Pearson Education, Inc. 9
Securing Offices, Rooms, and Facilities
❑ The outer physical perimeter is not the only focus
of the physical security policy
❑ Workspaces should be classified based on the
level of protection required
❑ Some internal rooms and offices must be
protected differently
❑ Parts of individual rooms may also require
different levels of protection, such as cabinets and
closets
Copyright 2014 Pearson Education, Inc. 10
Working in Secure Areas
❑ Goal: Define behavioral and physical controls for the most
sensitive workspaces within information processing facilities
❑ Policy controls are in addition to – and not in place of – existing
physical controls, unless they supersede them
❑ Policy should include devices not allowed on premises, such as
cameras, smartphones, tablets, and USB drives
❑ Sensitive documents should be secured from viewing by
unauthorized personnel while not in use
❑ Copiers, scanners, and fax machines should be located in
nonpublic areas and require use codes
Copyright 2014 Pearson Education, Inc. 11
Protecting Equipment
❑ Both company and employee-owned equipment
should be protected
❑ Hardware assets must be protected from:
■ Theft
■ Power spikes
■ Power loss
❑ One way to reduce power consumption is to
purchase Energy Star certified devices
Copyright 2014 Pearson Education, Inc. 12
Protecting Equipment Cont.
❑ Potential power problems include:
■ Brownout: Period of low voltage
■ Power surge: Increase in voltage
■ Blackout: Interruption or loss of power
❑ Power equipment that can be used:
■ Uninterruptible Power Supply
■ Back-up power supplies
■ Power conditioners
■ Voltage regulators
■ Isolation transformers
■ Line filters
■ Surge protection equipment
How Dangerous Is Fire?
■ Three elements to fire protection
❑ Fire prevention controls
■ Active
■ Passive
❑ Fire detection
❑ Fire containment and suppression
■ Involves responding to the fire
■ Specific to file classification
❑ Class A
❑ Class B
❑ Class C
❑ Class D
Copyright 2014 Pearson Education, Inc. 13
Copyright 2014 Pearson Education, Inc. 14
What About Disposal?
❑ Formatting a hard drive or deleting files does not
mean that the data located on that drive cannot
be retrieved
❑ All computers that are discarded must be
sanitized prior to being disposed of
❑ Policy should be crafted to disallow access to
information through improper disposal or reuse of
equipment
■ Disk wiping
■ Degaussing
■ Destruction
Copyright 2014 Pearson Education, Inc. 15
Summary
■ The physical perimeter of the company must be
secured.
■ Some internal rooms and offices must be identified
as needing more security controls than others.
These controls must be deployed.
■ Environment threats such as power loss must be
taken into account and the proper hardware must be
deployed.
■ A clean screen and desk policy is important to
protect the confidentiality of company-owned data.

More Related Content

PPTX
Chapter 5: Asset Management
PPT
Chapter 3: Information Security Framework
PPTX
Physical security
PPTX
Network security
PPT
Module 10 Physical Security
PPT
Physical Security
PPT
Perimeter security solutions
PPT
IT Security Awareness-v1.7.ppt
Chapter 5: Asset Management
Chapter 3: Information Security Framework
Physical security
Network security
Module 10 Physical Security
Physical Security
Perimeter security solutions
IT Security Awareness-v1.7.ppt

What's hot (20)

PPTX
Information security management system
PPTX
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PPTX
Basic Security Training for End Users
PPTX
Chapter 10: Information Systems Acquisition, Development, and Maintenance
PPTX
Awareness Training on Information Security
PPT
Asset, Vulnerability, Threat, Risk & Control
PPTX
CyberSecurity
PPTX
Cyber security
PDF
End-User Security Awareness
PDF
Cybersecurity Awareness Training Presentation v2024.03
PDF
14 tips to increase cybersecurity awareness
PDF
Customer information security awareness training
PPTX
Physical access control
PDF
Data Privacy Compliance
PPTX
Chapter 11: Information Security Incident Management
PPT
Physical Security Assessments
PPTX
Hyphenet Security Awareness Training
PPT
Physical Security Assessment
PPT
Basic Security Chapter 1
PPTX
Chapter 9: Access Control Management
Information security management system
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
Basic Security Training for End Users
Chapter 10: Information Systems Acquisition, Development, and Maintenance
Awareness Training on Information Security
Asset, Vulnerability, Threat, Risk & Control
CyberSecurity
Cyber security
End-User Security Awareness
Cybersecurity Awareness Training Presentation v2024.03
14 tips to increase cybersecurity awareness
Customer information security awareness training
Physical access control
Data Privacy Compliance
Chapter 11: Information Security Incident Management
Physical Security Assessments
Hyphenet Security Awareness Training
Physical Security Assessment
Basic Security Chapter 1
Chapter 9: Access Control Management
Ad

Viewers also liked (20)

PPTX
Chapter 13: Regulatory Compliance for Financial Institutions
PPTX
Chapter 14: Regulatory Compliance for the Healthcare Sector
PPTX
Chapter 15: PCI Compliance for Merchants
PPTX
Chapter 8: Communications and Operations Security
PPTX
Chapter 6: Human Resources Security
PPTX
Chapter 1: Understanding Policy
PPTX
Chapter 2: Policy Elements and style
PPTX
Chapter 12: Business Continuity Management
PPTX
Chapter 4: Governance and Risk Management
PPT
83341 ch14 jacobsen
PPTX
83341 ch09 jacobsen
PPTX
83341 ch06 jacobsen
PPTX
83341 ch13 jacobsen
PPTX
83341 ch11 jacobsen
PPTX
83341 ch10 jacobsen
PPTX
83341 ch07 jacobsen
PPTX
83341 ch08 jacobsen
PPTX
83341 ch12 jacobsen
PPT
Chapter 12
PDF
INTRODUCTION TO HEALTHCARE RESEARCH METHODS: Correlational Studies, Case Seri...
Chapter 13: Regulatory Compliance for Financial Institutions
Chapter 14: Regulatory Compliance for the Healthcare Sector
Chapter 15: PCI Compliance for Merchants
Chapter 8: Communications and Operations Security
Chapter 6: Human Resources Security
Chapter 1: Understanding Policy
Chapter 2: Policy Elements and style
Chapter 12: Business Continuity Management
Chapter 4: Governance and Risk Management
83341 ch14 jacobsen
83341 ch09 jacobsen
83341 ch06 jacobsen
83341 ch13 jacobsen
83341 ch11 jacobsen
83341 ch10 jacobsen
83341 ch07 jacobsen
83341 ch08 jacobsen
83341 ch12 jacobsen
Chapter 12
INTRODUCTION TO HEALTHCARE RESEARCH METHODS: Correlational Studies, Case Seri...
Ad

Similar to Chapter 7: Physical & Environmental Security (20)

PDF
Information Security Incident Management.pdf
DOCX
Security Program and PoliciesPrinciples and Practicesby Sari.docx
PPTX
Paper review: Information Security; Physical and Environmental Security Proce...
PPTX
Safety Management Ppt on Management Subject
PPTX
Secure physical infrastructure
PPT
Occupational Accidents & PERSONAL PE 22.ppt
PPTX
Operations Security
PPTX
PCO - LEC1 - Plan and prepare for task to be undertaken.pptx
PPT
Information Assurance And Security - Chapter 1 - Lesson 4
PPTX
EM - Incident Response - Module 5 Powerpoint Presentation
ODP
Jupiter physical security ppt 2016 new
ODP
Jupiter physical security ppt 2016 new
ODP
Jupiter physical security ppt 2016 new
ODP
Jupiter physical security ppt 2016 new
PDF
Endpoint Protection in Ontario_ Safeguarding Your Digital Environment.pdf
PPTX
Importance of workplace Security.pptx
PPTX
CSS Lesson 4 Quarter 4 - OHS Standards.pptx
PPTX
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
PPTX
Element 9. WORK EQUIPMENT in industries hazard.pptx
PPTX
Security Policy
Information Security Incident Management.pdf
Security Program and PoliciesPrinciples and Practicesby Sari.docx
Paper review: Information Security; Physical and Environmental Security Proce...
Safety Management Ppt on Management Subject
Secure physical infrastructure
Occupational Accidents & PERSONAL PE 22.ppt
Operations Security
PCO - LEC1 - Plan and prepare for task to be undertaken.pptx
Information Assurance And Security - Chapter 1 - Lesson 4
EM - Incident Response - Module 5 Powerpoint Presentation
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 new
Endpoint Protection in Ontario_ Safeguarding Your Digital Environment.pdf
Importance of workplace Security.pptx
CSS Lesson 4 Quarter 4 - OHS Standards.pptx
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
Element 9. WORK EQUIPMENT in industries hazard.pptx
Security Policy

More from Nada G.Youssef (15)

PPTX
مجلة 1
PPTX
Chapter Tewlve
PPTX
Chapter Eleven
PPTX
Chapter Ten
PPTX
Chapter Nine
PPTX
Chapter Eight
PPTX
Chapter Seven
PPTX
Chapter Six
PPTX
Chapter Five
PPTX
Chapter Four
PPTX
Chapter Three
PPTX
Chapter Two
PPTX
Chapter one
PPTX
Preparatory Year of Saudi Electronic University
PPTX
Chapter 11
مجلة 1
Chapter Tewlve
Chapter Eleven
Chapter Ten
Chapter Nine
Chapter Eight
Chapter Seven
Chapter Six
Chapter Five
Chapter Four
Chapter Three
Chapter Two
Chapter one
Preparatory Year of Saudi Electronic University
Chapter 11

Recently uploaded (20)

PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
Cell Structure & Organelles in detailed.
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PPTX
master seminar digital applications in india
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
RMMM.pdf make it easy to upload and study
PDF
Complications of Minimal Access Surgery at WLH
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Business Ethics Teaching Materials for college
PDF
Insiders guide to clinical Medicine.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
102 student loan defaulters named and shamed – Is someone you know on the list?
Cell Structure & Organelles in detailed.
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
master seminar digital applications in india
human mycosis Human fungal infections are called human mycosis..pptx
O5-L3 Freight Transport Ops (International) V1.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Microbial disease of the cardiovascular and lymphatic systems
Renaissance Architecture: A Journey from Faith to Humanism
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
RMMM.pdf make it easy to upload and study
Complications of Minimal Access Surgery at WLH
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Business Ethics Teaching Materials for college
Insiders guide to clinical Medicine.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx

Chapter 7: Physical & Environmental Security

  • 1. Security Program and Policies Principles and Practices by Sari Stern Greene Chapter 7: Physical & Environmental Security
  • 2. Copyright 2014 Pearson Education, Inc. 2 Objectives ❑ Define the concept of physical security and how it relates to information security ❑ Evaluate the security requirements of facilities, offices, and equipment ❑ Understand the environmental risks posed to physical structures, areas within those structures, and equipment ❑ Enumerate the vulnerabilities related to reusing and disposing of equipment ❑ Recognize the risk posed by the loss or theft of mobile devices and media ❑ Develop policies designed to ensure the physical environmental security of information, information systems, and information processing and storage facilities
  • 3. Understanding the Secure Facility Layered Defense Model ■ If an intruder bypasses one layer of controls, the next layer should provide additional defense and detection capabilities ■ Both physical and psychological ❑ The appearance of security is deterrent Copyright 2014 Pearson Education, Inc. 3
  • 4. Copyright 2014 Pearson Education, Inc. 4 How to Secure the Site ■ All implemented controls to physically protect information are dictated first by a thorough analysis of the company’s risks and vulnerabilities, along with the value of the information that requires protection ■ From what are we protecting information assets? ❑ Theft ❑ Malicious destruction ❑ Accidental damage ❑ Damage that results from natural disasters
  • 5. How to Secure the Site cont. ■ The design of a secure site starts with the location ■ Location-based threats ❑ Political stability ❑ Susceptibility to terrorism ❑ Crime rate in the area ❑ Roadways and flight paths ❑ Utility stability ❑ Vulnerability to natural disasters ■ Critical information processing facilities should be inconspicuous and unremarkable Copyright 2014 Pearson Education, Inc. 5
  • 6. Copyright 2014 Pearson Education, Inc. 6 How to Secure the Site Cont. ❑ The physical perimeter can be protected using: ■ Berms ■ Fences ■ Gates ■ Bollards ■ Man traps ■ Illuminated entrances, exits, pathways, and parking areas ■ Manned reception desk ■ Cameras, closed-circuit TV, alarms, motion sensors ■ Security guards
  • 7. Copyright 2014 Pearson Education, Inc. 7 How Is Physical Access Controlled? ❑ Physical entry controls: ■ Access control rules should be designed for: ❑ Employees ❑ Third-party contractors/partners/vendors ❑ Visitors ■ Visitors should be required to wear identification that can be evaluated from a distance, such as a badge ■ Identification should start as soon as a person attempts to gain entry
  • 8. Copyright 2014 Pearson Education, Inc. 8 How Is Physical Access Controlled? Cont. ❑ Physical entry controls: ■ Authorized users should be authorized prior to gaining access to protected area ■ Visitors should be identified, labeled, and authorized prior to gaining access to protected area ■ An audit trail should be created
  • 9. Copyright 2014 Pearson Education, Inc. 9 Securing Offices, Rooms, and Facilities ❑ The outer physical perimeter is not the only focus of the physical security policy ❑ Workspaces should be classified based on the level of protection required ❑ Some internal rooms and offices must be protected differently ❑ Parts of individual rooms may also require different levels of protection, such as cabinets and closets
  • 10. Copyright 2014 Pearson Education, Inc. 10 Working in Secure Areas ❑ Goal: Define behavioral and physical controls for the most sensitive workspaces within information processing facilities ❑ Policy controls are in addition to – and not in place of – existing physical controls, unless they supersede them ❑ Policy should include devices not allowed on premises, such as cameras, smartphones, tablets, and USB drives ❑ Sensitive documents should be secured from viewing by unauthorized personnel while not in use ❑ Copiers, scanners, and fax machines should be located in nonpublic areas and require use codes
  • 11. Copyright 2014 Pearson Education, Inc. 11 Protecting Equipment ❑ Both company and employee-owned equipment should be protected ❑ Hardware assets must be protected from: ■ Theft ■ Power spikes ■ Power loss ❑ One way to reduce power consumption is to purchase Energy Star certified devices
  • 12. Copyright 2014 Pearson Education, Inc. 12 Protecting Equipment Cont. ❑ Potential power problems include: ■ Brownout: Period of low voltage ■ Power surge: Increase in voltage ■ Blackout: Interruption or loss of power ❑ Power equipment that can be used: ■ Uninterruptible Power Supply ■ Back-up power supplies ■ Power conditioners ■ Voltage regulators ■ Isolation transformers ■ Line filters ■ Surge protection equipment
  • 13. How Dangerous Is Fire? ■ Three elements to fire protection ❑ Fire prevention controls ■ Active ■ Passive ❑ Fire detection ❑ Fire containment and suppression ■ Involves responding to the fire ■ Specific to file classification ❑ Class A ❑ Class B ❑ Class C ❑ Class D Copyright 2014 Pearson Education, Inc. 13
  • 14. Copyright 2014 Pearson Education, Inc. 14 What About Disposal? ❑ Formatting a hard drive or deleting files does not mean that the data located on that drive cannot be retrieved ❑ All computers that are discarded must be sanitized prior to being disposed of ❑ Policy should be crafted to disallow access to information through improper disposal or reuse of equipment ■ Disk wiping ■ Degaussing ■ Destruction
  • 15. Copyright 2014 Pearson Education, Inc. 15 Summary ■ The physical perimeter of the company must be secured. ■ Some internal rooms and offices must be identified as needing more security controls than others. These controls must be deployed. ■ Environment threats such as power loss must be taken into account and the proper hardware must be deployed. ■ A clean screen and desk policy is important to protect the confidentiality of company-owned data.