Submit Search
Physical security how to secure physically
Download as PPT, PDF
0 likes
5 views
K
KenR10
Physical security how to secure physically
Data & Analytics
Read more
1 of 24
Download now
Download to read offline
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
More Related Content
PPT
Informationsecurity management lecture.ppt
OmerMohamed64
PPTX
Moving to the Cloud: A Security and Hosting Introduction
Blackbaud
PPSX
The 5 ws of Cyber Security
Misha Hanin
PPTX
Cryptography and Network Security # Lecture 2
Kabul Education University
PPT
bh-win-04-conacher.ppt
Rakesh Kumar
PPTX
Introduction to information security
KATHEESKUMAR S
PPT
Top schools in noida
Edhole.com
PPTX
IT Security Essentials
Skoda Minotti
Informationsecurity management lecture.ppt
OmerMohamed64
Moving to the Cloud: A Security and Hosting Introduction
Blackbaud
The 5 ws of Cyber Security
Misha Hanin
Cryptography and Network Security # Lecture 2
Kabul Education University
bh-win-04-conacher.ppt
Rakesh Kumar
Introduction to information security
KATHEESKUMAR S
Top schools in noida
Edhole.com
IT Security Essentials
Skoda Minotti
Similar to Physical security how to secure physically
(20)
PDF
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Nicholas Van Exan
PDF
Cyber security for manufacturers umuc cadf-ron mcfarland
Highervista
PDF
2010 State Of Enterprise Security
Symantec
PPT
Network Security for Computer science and Engineering.ppt
AkfeteAssefa
PPTX
Cyber Security - ASGFOA
Peter Henley
PDF
Current & Emerging Cyber Security Threats
NCC Group
PPTX
Final Presentation
Mackenzie Starcevich
PDF
Ch1-Modern Network Security Threats - CCNA SEC.pdf
OhmRon
PPTX
Leveraging Your Security System to Impact Your Bottom line
guidepostsolutions
PPTX
Info securitty and physical issues .pptx
sufyanriazahmad912
PPT
Ebi temaline 4.6-customer-presentation-v1g
J Krishna Teja
PDF
Cyber Security in Manufacturing
CentraComm
PPTX
Cyber security: A roadmap to secure solutions
Schneider Electric
PPT
Commercial And Government Cyberwarfare
Nicholas Davis
PPT
Commercial and government cyberwarfare
Nicholas Davis
PDF
Cyber Liability Insurance And Protecting SMEs
E Radar
PPT
CCNA_Security_01.ppt
veracru1
PPTX
Security challenges in 2017
Etienne Liebetrau
PPT
Chapter 1 overview
ali raza
PPT
Safety Hazards Part 2
Drake International
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Nicholas Van Exan
Cyber security for manufacturers umuc cadf-ron mcfarland
Highervista
2010 State Of Enterprise Security
Symantec
Network Security for Computer science and Engineering.ppt
AkfeteAssefa
Cyber Security - ASGFOA
Peter Henley
Current & Emerging Cyber Security Threats
NCC Group
Final Presentation
Mackenzie Starcevich
Ch1-Modern Network Security Threats - CCNA SEC.pdf
OhmRon
Leveraging Your Security System to Impact Your Bottom line
guidepostsolutions
Info securitty and physical issues .pptx
sufyanriazahmad912
Ebi temaline 4.6-customer-presentation-v1g
J Krishna Teja
Cyber Security in Manufacturing
CentraComm
Cyber security: A roadmap to secure solutions
Schneider Electric
Commercial And Government Cyberwarfare
Nicholas Davis
Commercial and government cyberwarfare
Nicholas Davis
Cyber Liability Insurance And Protecting SMEs
E Radar
CCNA_Security_01.ppt
veracru1
Security challenges in 2017
Etienne Liebetrau
Chapter 1 overview
ali raza
Safety Hazards Part 2
Drake International
Ad
Recently uploaded
(20)
PPTX
Qualitative Qantitative and Mixed Methods.pptx
AhmaduMohammed
PPTX
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
Mahesh Reddy
PPTX
Data_Analytics_and_PowerBI_Presentation.pptx
ZubyrAhmed
PPTX
oil_refinery_comprehensive_20250804084928 (1).pptx
TusharPrajapati65
PPT
Reliability_Chapter_ presentation 1221.5784
abobaker13
PDF
Fluorescence-microscope_Botany_detailed content
dollydoll12
PDF
Galatica Smart Energy Infrastructure Startup Pitch Deck
Shahzaib Ajmal
PDF
"Python Programming for Geospatial Data Science." ...
institute of Geoinformatics and Earth Observation at PMAS ARID Agriculture University of Rawalpindi
PPTX
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
AceAquino4
PPTX
DISORDERS OF THE LIVER, GALLBLADDER AND PANCREASE (1).pptx
chepkoitcheruiyot
PDF
Mega Projects Data Mega Projects Data
saidsalah8181
PPTX
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
chepkoitcheruiyot
PPTX
AI Strategy room jwfjksfksfjsjsjsjsjfsjfsj
ankitpratapsingh28
PPTX
Market Analysis -202507- Wind-Solar+Hybrid+Street+Lights+for+the+North+Amer...
LEDLUXX Smart Lite TEC
PPTX
STUDY DESIGN details- Lt Col Maksud (21).pptx
AyeshaAsha11
PPT
Quality review (1)_presentation of this 21
abobaker13
PPTX
Database Infoormation System (DBIS).pptx
TefferiMekonnen2
PDF
Introduction to the R Programming Language
Suraj Patil
PPTX
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
thirishadevan81
PDF
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
ngaviet5
Qualitative Qantitative and Mixed Methods.pptx
AhmaduMohammed
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
Mahesh Reddy
Data_Analytics_and_PowerBI_Presentation.pptx
ZubyrAhmed
oil_refinery_comprehensive_20250804084928 (1).pptx
TusharPrajapati65
Reliability_Chapter_ presentation 1221.5784
abobaker13
Fluorescence-microscope_Botany_detailed content
dollydoll12
Galatica Smart Energy Infrastructure Startup Pitch Deck
Shahzaib Ajmal
"Python Programming for Geospatial Data Science." ...
institute of Geoinformatics and Earth Observation at PMAS ARID Agriculture University of Rawalpindi
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
AceAquino4
DISORDERS OF THE LIVER, GALLBLADDER AND PANCREASE (1).pptx
chepkoitcheruiyot
Mega Projects Data Mega Projects Data
saidsalah8181
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
chepkoitcheruiyot
AI Strategy room jwfjksfksfjsjsjsjsjfsjfsj
ankitpratapsingh28
Market Analysis -202507- Wind-Solar+Hybrid+Street+Lights+for+the+North+Amer...
LEDLUXX Smart Lite TEC
STUDY DESIGN details- Lt Col Maksud (21).pptx
AyeshaAsha11
Quality review (1)_presentation of this 21
abobaker13
Database Infoormation System (DBIS).pptx
TefferiMekonnen2
Introduction to the R Programming Language
Suraj Patil
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
thirishadevan81
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
ngaviet5
Ad
Physical security how to secure physically
1.
© 2006 Carnegie
Mellon University 95752-2:1 Physical Security
2.
© 2006 Carnegie
Mellon University 95752-2:2 Three Security Disciplines • Physical – Most common security discipline – Protect facilities and contents • Plants, labs, stores, parking areas, loading areas, warehouses, offices, equipment, machines, tools, vehicles, products, materials • Personnel – Protect employees, customers, guests • Information – The rest of this course
3.
© 2006 Carnegie
Mellon University 95752-2:3 Information Revolution • Information Revolution as pervasive at the Industrial Revolution • Impact is Political, Economic, and Social as well as Technical • Information has an increasing intrinsic value • Protection of critical information now a critical concern in Government, Business, Academia
4.
© 2006 Carnegie
Mellon University 95752-2:4 Politics and Technology • The end of the Cold War resulted in a greater political complexity • Information critical to all aspects of government • Military • Commerce • Politics – Information is Power – Protection of information more important than ever
5.
© 2006 Carnegie
Mellon University 95752-2:5 Business and Technology • Information has become a product on its own • Information technologies critical • Protection of information essential • Business now dependent on the Net • Who controls the ON/OFF Switch?
6.
© 2006 Carnegie
Mellon University 95752-2:6 The New World • The Internet allows global connectivity • Cyber-space has no borders • Anonymity easy to accomplish • New breed of threat • Technically smart • Determined, knowledgeable • Physical Security often overlooked in the new threat environment
7.
© 2006 Carnegie
Mellon University 95752-2:7 Nature of the Threat • Threat environment changes • Nation-state threat – Countries see computers as equalizers – New balance of power through information control • Non-state actors – New levels of potential threat – “Strategic Guns for Hire” – Terrorism remains physical act • Physical attacks against information sources requires minimal effort for maximum effect - Gums up the Gears!!!!
8.
© 2006 Carnegie
Mellon University 95752-2:8 How Has It Changed? • Physical Events Have Cyber Consequences •Cyber Events Have Physical Consequences
9.
© 2006 Carnegie
Mellon University 95752-2:9 • Physical Attacks require little resources • Insider threat very real • Disgruntled employee • Agent for hire • Tactics well known and hard to stop • World Trade Center • Aldrich Aimes • Financial network facilities viable target • Target information readily available Threat and Physical Security
10.
© 2006 Carnegie
Mellon University 95752-2:10 Why Physical Security? • Not all threats are “cyber threats” • Information one commodity that can be stolen without being “taken” • Physically barring access is first line of defense • Forces those concerned to prioritize! • Physical Security can be a deterrent • Security reviews force insights into value of what is being protected
11.
© 2006 Carnegie
Mellon University 95752-2:11 Layered Security • Physical Barriers • Fences • Alarms • Restricted Access Technology • Physical Restrictions • Air Gapping • Removable Media • Remote Storage • Personnel Security Practices • Limited Access • Training • Consequences/Deterrence
12.
© 2006 Carnegie
Mellon University 95752-2:12 Physical Barriers • Hardened Facilities • Fences • Guards • Alarms • Locks • Restricted Access Technologies – Biometrics – Coded Entry – Badging • Signal Blocking (Faraday Cages)
13.
© 2006 Carnegie
Mellon University 95752-2:13 Outer Protective Layers • Structure – Fencing, gates, other barriers • Environment – Lighting, signs, alarms • Purpose – Define property line and discourage trespassing – Provide distance from threats
14.
© 2006 Carnegie
Mellon University 95752-2:14 Middle Protective Layers • Structure – Door controls, window controls – Ceiling penetration – Ventilation ducts – Elevator Penthouses • Environment – Within defined perimeter, positive controls • Purpose – Alert threat, segment protection zones
15.
© 2006 Carnegie
Mellon University 95752-2:15 Inner Protective Layers • Several layers • Structure – Door controls, biometrics – Signs, alarms, cctv – Safes, vaults • Environment – Authorized personnel only • Purpose – Establish controlled areas and rooms
16.
© 2006 Carnegie
Mellon University 95752-2:16 Example System: SEI • Building Structure: – 6 exterior doors – Windows secured – Exterior Lit • Middle Layers: – Guard desk – Proximity card system – CCTV • Inner Layers: Intellectual Property Protection
17.
© 2006 Carnegie
Mellon University 95752-2:17 Other Barrier Issues • Handling of trash or scrap • Fire: – Temperature – Smoke • Pollution: – CO – Radon • Flood • Earthquake
18.
© 2006 Carnegie
Mellon University 95752-2:18 Physical Restrictions • Air Gapping Data • Limits access to various security levels • Requires conscious effort to violate • Protects against inadvertent transmission • Removable Media • Removable Hard Drives • Floppy Disks/CDs/ZIP Disks • Remote Storage of Data • Physically separate storage facility • Use of Storage Media or Stand Alone computers • Updating of Stored Data and regular inventory
19.
© 2006 Carnegie
Mellon University 95752-2:19 Personnel Security Practices • Insider Threat the most serious • Disgruntled employee • Former employee • Agent for hire • Personnel Training • Critical Element • Most often overlooked • Background checks • Critical when access to information required • Must be updated • CIA/FBI embarrassed
20.
© 2006 Carnegie
Mellon University 95752-2:20 People • Disgruntled employee / former employee • Moonlighter • Marketing, sales representatives, etc. • Purchasing agents, buyers, subcontract administrators • Consultants • Vendor/Subcontractor • Clerical • Applicants, Visitors, Customers
21.
© 2006 Carnegie
Mellon University 95752-2:21 Activities or Events • Publications, public releases, etc. • Seminars, conventions or trade shows • Survey or questionnaire • Plant tours, “open house”, family visits • Governmental actions: certification, investigation • Construction and Repair
22.
© 2006 Carnegie
Mellon University 95752-2:22 Technical Security • Alarms • Loud and Noisy • Silent • Integrated into barrier methods • Video/Audio • Deterrent factor • Difficult to archive • Bio-Metrics • Identification • Reliability questions
23.
© 2006 Carnegie
Mellon University 95752-2:23 NISPOM National Industrial Security Operating Manual • Prescribes requirements, restrictions and other safeguards that are necessary to prevent unauthorized disclosure of information • Protections for special classes of information: Restricted Information, Special Access Program Information, Sensitive Compartmented Information • National Security Council provides overall policy direction • Governs oversight and compliance for 20 government agencies
24.
© 2006 Carnegie
Mellon University 95752-2:24 The Place of Physical Security • Physical Security is part of integrated security plan • Often overlooked when considering Information Security • No information security plan is complete without it!
Download