SlideShare a Scribd company logo
BY
K.LALITHAMBIGA
II –Msc (CS&IT )
Department of CS&IT
NS College of Arts and Science,
Theni.
 Classification of Assets
 Physical Vulnerability assessment
 Choosing site location for security
 Security Assets
 Physical intrusion Detection
 Authentication and Authorization Controls:
Authentication
Authorization
 Classification of assets is the process of identifying physical
assets and assigning criticality and value to them in order to
develop concise controls and procedures that protect them
effectively.
 The classification of corporate physical assets will generally
fall under the following categories:
 Computer equipment
 Communication equipment
 Technical equipment
 Storage media
 Furniture & fixtures
 Assets with direct monetary value
 A Physical security vulnerability assessment, much like its
information security counterpart, relies upon measurement of
exposure to an applicable risk.
 An asset must already be classified, and its value to an
organization quantified.
 Four main areas should be part of any Physical security
vulnerability assessment:
 Buildings
 Computing Devices and Peripherals
 Documents
 Records and Equipments
 There are many security consideration for choosing a secure
site location, only a few of which are:
Accessibility
 To the site
 From the site (in the event of evacuation)
Lighting
Proximity to other buildings
Proximity to law enforcement and emergency response
RF and Wireless transmission interception
Construction and excavation(past and present)
 There are many different considerations that must be taken
into account when securing your assets with physical security
devices. A few of them are
Locks
Door and file Cabinets
Laptops
Data Centers, Wiring Closets, Network Rooms
Entry Controls
Building and Employee IDs
Biometrics
Security Guards
Network Security: Physical security
Network Security: Physical security
Network Security: Physical security
 Physical Intrusion Detection, much like it’s information
counterpart, requires forethought, planning & tuning to obtain
optimal effectiveness. Some considerations for Physical
Security Detection are:
Closed-Circuit Television
Alarms
Mantraps
System Logs
 CCTV is in use just about everywhere. Placement should be
thought out with financial and operational limitations in mind.
 Some possible initial areas for device placement include:
 High-traffic areas,
 Critical function areas(such as parking structures, loading docks,
and research areas),
 Cash handling areas,
 Areas of transition(such as hallway leading from a
conference room to sensitive location )
 Alarms should be tested at least monthly, with a test log being
kept.
 Entry doors and exits should be fitted with intrusion alarms.
 A response plan should be in effect with everyone who will be
responding to an incident knowing exactly what their roles and
responsibilities are.
 Duress alarms should be also be taken into consideration for
areas that require them.
 A Mantraps is an area designed to allow only one authorized
individual entrance at any given time.
 These are typically used as an antitailgating mechanism and
are most commonly used in high-security areas, cash handling
areas, and data centers.
 System logs can be an indication that someone was physically
present at a system.
 Bear in mind that quite a few privilege escalation exploits
require a system restart in order to execute.
 Some things to look for in the system logs that might indicate
physical access to a system include:
 Short or incomplete logs
 Logs missing entirely
 Strange timestamps
 Logs with incorrect permission or ownership
 System reboots
 Services restarting
Network Security: Physical security
 Authentication
 Username and password
 Certificate-Based Authentication
 Extensible Authentication Protocol(EAP)
 Biometrics
 Additional Uses for Authentication
 Authorization
 User Rights
 Role-Based Authorization
 Access Control Lists(ACLs)
 Rule-Based Authorization
 Something you have
 Something you are
 Something you know
Network Security: Physical security
Network Security: Physical security
Network Security: Physical security
Network Security: Physical security
Network Security: Physical security
Network Security: Physical security
Network Security: Physical security
Network Security: Physical security
Network Security: Physical security
Network Security: Physical security
Network Security: Physical security

More Related Content

PPTX
Network security (vulnerabilities, threats, and attacks)
PDF
Web Application Penetration Testing
PDF
Ch 11: Hacking Wireless Networks
PPTX
Network security
PPTX
Data security
PPTX
Firewall in Network Security
PPTX
Incident response
PDF
Security testing presentation
Network security (vulnerabilities, threats, and attacks)
Web Application Penetration Testing
Ch 11: Hacking Wireless Networks
Network security
Data security
Firewall in Network Security
Incident response
Security testing presentation

What's hot (20)

PPTX
User authentication
 
PPTX
Network defenses
PPT
Introduction to Web Application Penetration Testing
PPTX
VAPT - Vulnerability Assessment & Penetration Testing
PPTX
Operating System Security
PPTX
Secure coding practices
PPTX
Memory forensics
PPTX
Password Policy and Account Lockout Policies
PDF
Cybersecurity Employee Training
PDF
Ceh v5 module 01 introduction to ethical hacking
PPTX
Lecture 10 intruders
PDF
Network Security Fundamentals
PPTX
Database security
PDF
Social engineering attacks
PPTX
Cybercrime and Security
PPTX
Operating system security
PDF
Types of Threat Actors and Attack Vectors
PPTX
Penetration testing reporting and methodology
PPT
Network Security Threats and Solutions
User authentication
 
Network defenses
Introduction to Web Application Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
Operating System Security
Secure coding practices
Memory forensics
Password Policy and Account Lockout Policies
Cybersecurity Employee Training
Ceh v5 module 01 introduction to ethical hacking
Lecture 10 intruders
Network Security Fundamentals
Database security
Social engineering attacks
Cybercrime and Security
Operating system security
Types of Threat Actors and Attack Vectors
Penetration testing reporting and methodology
Network Security Threats and Solutions
Ad

Similar to Network Security: Physical security (20)

PDF
Implementing Physical Security As An Access Control Plan
PDF
GSA calls out Cyber Hunt skills in final Cybersecurity Contract Orals
PPTX
PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY
PDF
Segregation of IT and OT Networks across organization
PDF
Monitoring your organization against threats - Critical System Control
PDF
Incident handling is a clearly defined set of procedures to manage and respon...
PDF
internet securityand cyber law Unit3 1
PPT
Information Security
PDF
THE THREE DIMENSION-BASED PHYSICAL ACCESS CONTROL DETECTION SYSTEM, THE NATUR...
DOCX
Operations SecurityWeek 5Incident Management, Investigatio.docx
DOCX
Final deliverable should be a comprehensive report that addresse
DOCX
Final deliverable should be a comprehensive report that addresses se
PPT
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
DOCX
Backtrack manual Part1
PPTX
Phi 235 social media security users guide presentation
PPTX
Heartlandpt3
PPTX
Security Operation Center Presentat.pptx
PDF
Alienvault how to build a security operations center (on a budget) (2017, a...
DOCX
AssignmentWhen a traffic camera is installed in a designated .docx
PPTX
L11 Transition And Key Roles and SAT ROB IRP.pptx
Implementing Physical Security As An Access Control Plan
GSA calls out Cyber Hunt skills in final Cybersecurity Contract Orals
PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY
Segregation of IT and OT Networks across organization
Monitoring your organization against threats - Critical System Control
Incident handling is a clearly defined set of procedures to manage and respon...
internet securityand cyber law Unit3 1
Information Security
THE THREE DIMENSION-BASED PHYSICAL ACCESS CONTROL DETECTION SYSTEM, THE NATUR...
Operations SecurityWeek 5Incident Management, Investigatio.docx
Final deliverable should be a comprehensive report that addresse
Final deliverable should be a comprehensive report that addresses se
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
Backtrack manual Part1
Phi 235 social media security users guide presentation
Heartlandpt3
Security Operation Center Presentat.pptx
Alienvault how to build a security operations center (on a budget) (2017, a...
AssignmentWhen a traffic camera is installed in a designated .docx
L11 Transition And Key Roles and SAT ROB IRP.pptx
Ad

More from lalithambiga kamaraj (20)

PPTX
Data Compression in Multimedia
PPTX
Data CompressionMultimedia
PPTX
Digital Audio in Multimedia
PPTX
Graphs in Data Structure
PPTX
Package in Java
PPTX
Exception Handling in Java
PPTX
Data structure
PPTX
Digital Image Processing
PPTX
Digital Image Processing
PPTX
Estimating Software Maintenance Costs
PPTX
PPTX
Digital Components
PPTX
Deadlocks in operating system
PPTX
Io management disk scheduling algorithm
PPTX
Recovery system
PPTX
File management
PPTX
Preprocessor
PPTX
PPTX
Managing console of I/o operations & working with files
PPTX
Pointers, virtual function and polymorphism
Data Compression in Multimedia
Data CompressionMultimedia
Digital Audio in Multimedia
Graphs in Data Structure
Package in Java
Exception Handling in Java
Data structure
Digital Image Processing
Digital Image Processing
Estimating Software Maintenance Costs
Digital Components
Deadlocks in operating system
Io management disk scheduling algorithm
Recovery system
File management
Preprocessor
Managing console of I/o operations & working with files
Pointers, virtual function and polymorphism

Recently uploaded (20)

PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Insiders guide to clinical Medicine.pdf
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Basic Mud Logging Guide for educational purpose
PDF
Computing-Curriculum for Schools in Ghana
PPTX
Lesson notes of climatology university.
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
Cell Structure & Organelles in detailed.
PDF
Complications of Minimal Access Surgery at WLH
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Cell Types and Its function , kingdom of life
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
102 student loan defaulters named and shamed – Is someone you know on the list?
Insiders guide to clinical Medicine.pdf
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
TR - Agricultural Crops Production NC III.pdf
Anesthesia in Laparoscopic Surgery in India
Supply Chain Operations Speaking Notes -ICLT Program
Module 4: Burden of Disease Tutorial Slides S2 2025
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Basic Mud Logging Guide for educational purpose
Computing-Curriculum for Schools in Ghana
Lesson notes of climatology university.
01-Introduction-to-Information-Management.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Cell Structure & Organelles in detailed.
Complications of Minimal Access Surgery at WLH
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Cell Types and Its function , kingdom of life

Network Security: Physical security

  • 1. BY K.LALITHAMBIGA II –Msc (CS&IT ) Department of CS&IT NS College of Arts and Science, Theni.
  • 2.  Classification of Assets  Physical Vulnerability assessment  Choosing site location for security  Security Assets  Physical intrusion Detection  Authentication and Authorization Controls: Authentication Authorization
  • 3.  Classification of assets is the process of identifying physical assets and assigning criticality and value to them in order to develop concise controls and procedures that protect them effectively.  The classification of corporate physical assets will generally fall under the following categories:  Computer equipment  Communication equipment  Technical equipment  Storage media  Furniture & fixtures  Assets with direct monetary value
  • 4.  A Physical security vulnerability assessment, much like its information security counterpart, relies upon measurement of exposure to an applicable risk.  An asset must already be classified, and its value to an organization quantified.  Four main areas should be part of any Physical security vulnerability assessment:  Buildings  Computing Devices and Peripherals  Documents  Records and Equipments
  • 5.  There are many security consideration for choosing a secure site location, only a few of which are: Accessibility  To the site  From the site (in the event of evacuation) Lighting Proximity to other buildings Proximity to law enforcement and emergency response RF and Wireless transmission interception Construction and excavation(past and present)
  • 6.  There are many different considerations that must be taken into account when securing your assets with physical security devices. A few of them are Locks Door and file Cabinets Laptops Data Centers, Wiring Closets, Network Rooms Entry Controls Building and Employee IDs Biometrics Security Guards
  • 10.  Physical Intrusion Detection, much like it’s information counterpart, requires forethought, planning & tuning to obtain optimal effectiveness. Some considerations for Physical Security Detection are: Closed-Circuit Television Alarms Mantraps System Logs
  • 11.  CCTV is in use just about everywhere. Placement should be thought out with financial and operational limitations in mind.  Some possible initial areas for device placement include:  High-traffic areas,  Critical function areas(such as parking structures, loading docks, and research areas),  Cash handling areas,  Areas of transition(such as hallway leading from a conference room to sensitive location )
  • 12.  Alarms should be tested at least monthly, with a test log being kept.  Entry doors and exits should be fitted with intrusion alarms.  A response plan should be in effect with everyone who will be responding to an incident knowing exactly what their roles and responsibilities are.  Duress alarms should be also be taken into consideration for areas that require them.
  • 13.  A Mantraps is an area designed to allow only one authorized individual entrance at any given time.  These are typically used as an antitailgating mechanism and are most commonly used in high-security areas, cash handling areas, and data centers.
  • 14.  System logs can be an indication that someone was physically present at a system.  Bear in mind that quite a few privilege escalation exploits require a system restart in order to execute.  Some things to look for in the system logs that might indicate physical access to a system include:  Short or incomplete logs  Logs missing entirely  Strange timestamps  Logs with incorrect permission or ownership  System reboots  Services restarting
  • 16.  Authentication  Username and password  Certificate-Based Authentication  Extensible Authentication Protocol(EAP)  Biometrics  Additional Uses for Authentication  Authorization  User Rights  Role-Based Authorization  Access Control Lists(ACLs)  Rule-Based Authorization
  • 17.  Something you have  Something you are  Something you know