SlideShare a Scribd company logo
Principles of Information Security
Sixth Edition
Chapter 9
Physical Security
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Learning Objectives
• Upon completion of this material, you should be able to:
– Discuss the relationship between information security and
physical security
– Describe key physical security considerations, including
fire control and surveillance systems
– Identify critical physical environment considerations for
computing facilities, including uninterruptible power
supplies
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Introduction (1 of 3)
• Physical security involves the protection of physical
items, objects, or areas from unauthorized access and
misuse.
• Most technology-based controls can be circumvented if
an attacker gains physical access.
• Physical security is as important as logical security.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Introduction (2 of 3)
• Donn B. Parker’s seven major sources of physical loss:
– Extreme temperature: heat, cold
– Gases: war gases, commercial vapors, humid or dry air,
suspended particles
– Liquids: water, chemicals
– Living organisms: viruses, bacteria, people, animals,
insects
– Projectiles: tangible objects in motion, powered objects
– Movement: collapse, shearing, shaking, vibration,
liquefaction, flow waves, separation, slide
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Introduction (3 of 3)
– Energy anomalies: electrical surge or failure, magnetism,
static electricity, aging circuitry; radiation: sound, light,
radio, microwave, electromagnetic, atomic
• Community roles:
– General management: responsible for facility security
– IT management and professionals: responsible for
environmental and access security
– Information security management and professionals:
perform risk assessments and implementation reviews
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Physical Access Controls
• Secure facility: physical location with controls
implemented to minimize the risk of attacks from
physical threats.
• Secure facility can take advantage of natural terrain,
local traffic flow, and surrounding development and can
complement these with protection mechanisms (fences,
gates, walls, guards, alarms).
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Physical Security Controls (1 of 9)
• Walls, fencing, and gates
• Guards
• Dogs
• ID cards and badges
• Locks and keys
• Mantraps
• Electronic monitoring
• Alarms and alarm systems
• Computer rooms and wiring closets
• Interior walls and doors
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Physical Security Controls (2 of 9)
• Walls, fencing, and gates
– Some of the oldest and most reliable elements of physical
security; the essential starting point for perimeter control
• Guards
– Can evaluate each situation as it arises to make reasoned
responses; most have standard operating procedures
• Dogs
– Keen sense of smell and hearing can detect intrusions
that human guards cannot
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Physical Security Controls (3 of 9)
• ID cards and badges
– ID card is typically concealed and name badge is visible
– Serve as a simple form of biometrics (facial recognition)
– Should not be the only means of control as cards can be
easily duplicated, stolen, and modified
– Tailgating occurs when an authorized individual opens a
door and other people also enter
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Physical Security Controls (4 of 9)
• Locks and keys
– Two types of locks: mechanical and electromechanical
– Locks can also be divided into four categories: manual,
programmable, electronic, biometric
– Locks fail and alternative procedures for controlling
access must be put in place
– Locks fail in one of two ways:
 Fail-safe lock
 Fail-secure lock
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Physical Security Controls (5 of 9)
• Mantraps
– Small enclosure that has an entry point and a different
exit point.
– Individual enters mantrap, requests access, and, if
verified, is allowed to exit mantrap into facility.
– Individual denied entry is not allowed to exit until the
security official overrides automatic locks of the
enclosure.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Physical Security Controls (6 of 9)
• Electronic monitoring
– Equipment can record events in areas where other types
of physical controls are impractical
– May use cameras with video recorders; includes closed-
circuit television (CCT) systems
– Drawbacks
 Passive; does not prevent access or prohibited activity
 Recordings often are not monitored in real time; must be
reviewed to have any value
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Physical Security Controls (7 of 9)
• Alarms and alarm systems
– Alarm systems notify people/systems when an event
occurs
– Detect fire, intrusion, environmental disturbance, or an
interruption in services
– Rely on sensors that detect an event, for example, motion
detectors, thermal detectors, glass breakage detectors,
weight sensors, and contact sensors
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Physical Security Controls (8 of 9)
• Computer rooms and wiring closets
– Require special attention to ensure confidentiality,
integrity, and availability of information.
– Logical access controls are easily defeated if attacker
gains physical access to computing equipment.
– Custodial staff, often the least scrutinized people who
have access to offices, are given greatest degree of
unsupervised access.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Physical Security Controls (9 of 9)
• Interior walls and doors
– Information asset security is sometimes compromised by
improper construction of facility walls and doors.
– Facility walls are typically either standard interior or
firewall.
– High-security areas must have firewall-grade walls to
provide physical security against potential intruders and
fires.
– Doors allowing access to high-security rooms should be
evaluated.
– To secure doors, install push or crash bars on computer
rooms and closets.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Figure 9-1 Tailgating
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Figure 9-2 Locks
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Figure 9-3 Mantraps
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Fire Security and Safety
• Most serious threat to safety of people who work in an
organization is fire.
• Fires account for more property damage, personal
injury, and death than any other threat.
• It is imperative that physical security plans implement
strong measures to detect and respond to fires and fire
hazards.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Fire Detection and Response (1 of 4)
• Fire suppression systems: devices installed and
maintained to detect and respond to a fire, potential fire,
or combustion danger.
• Flame point: temperature of ignition.
• Deny an environment of temperature, fuel, or oxygen
– Water and water mist systems
– Carbon dioxide systems
– Soda acid systems
– Gas-based systems
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Fire Detection and Response (2 of 4)
• Fire detection
– Fire detection systems fall into two general categories:
manual and automatic
– To prevent an attacker slipping into offices during an
evacuation, programs often designate a person from each
office area to serve as a floor monitor
– There are three basic types of fire detection systems:
thermal detection, smoke detection, flame detection
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Fire Detection and Response (3 of 4)
• Fire suppression
– Systems can consist of portable, manual, or automatic
apparatus
– Portable extinguishers are rated by the type of fire: Class
A, Class B, Class C, Class D, Class K
– Installed systems apply suppressive agents, usually either
sprinkler or gaseous systems
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Fire Detection and Response (4 of 4)
• Gaseous emission systems
– Until recently, two types of systems: carbon dioxide and
Halon
– Carbon dioxide removes fire’s oxygen supply
– Halon is clean but has been classified as an ozone-
depleting substance; new installations are prohibited
– Alternative clean agents presented in Table 9-1 (found on
page 521 in the text) are reported to be less effective than
Halon
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Figure 9-4 Water sprinkler system
• When the ambient temperature reaches 140-150°F,
the liquid- filled glass tube trigger breaks, releasing the
stopper and allowing water to hit the diffuser, spaying
water throughout the area
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Figure 9-5 Gaseous fire suppression system
(1 of 2)
• System Components:
1. Discharge nozzles
2. Piping
3. Control panel
4. Discharge or warning alarms (s)
5. Hazard warning or caution signs
6. Automatic fire detection devices (s)
7. Manual discharge station (s)
8. Storage container (s) and extinguishing agent
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Figure 9-5 Gaseous fire suppression
system (2 of 2)
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Failure of Supporting Utilities and
Structural Collapse
• Supporting utilities (heating, ventilation, and air
conditioning; power; water) have significant impact on
continued safe operation of a facility.
• Each utility must be properly managed to prevent
potential damage to information and information
systems.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Heating, Ventilation, and Air Conditioning (1
of 5)
• Areas within heating, ventilation, and air conditioning
(HVAC) systems that can cause damage to information
systems include:
– Temperature
– Filtration
– Humidity
– Static electricity
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Heating, Ventilation, and Air Conditioning
(2 of 5)
• Ventilation shafts
– While ductwork is small in residential buildings, in large
commercial buildings, it can be large enough for an
individual to climb through
– If ducts are large, security can install wire mesh grids at
various points to compartmentalize the runs
• Power management and conditioning
– Power systems used by information-processing
equipment must be properly installed and correctly
grounded
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Heating, Ventilation, and Air Conditioning
(3 of 5)
– Noise that interferes with the normal 60-Hertz cycle can
result in inaccurate time clocks or unreliable internal
clocks inside the CPU
• Grounding and amperage
– Grounding ensures that the returning flow of current is
properly discharged to ground
– Ground fault circuit interruption (GFIC) capable of quickly
identifying and interrupting a ground fault
– Overloading a circuit can create a load exceeding
electrical cable’s rating, increasing the risk of overheating
and fire
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Heating, Ventilation, and Air
Conditioning (4 of 5)
• Uninterruptible power supply (UPS)
– In case of power outage, UPS is the backup power
source for major computing systems
– Basic UPS configurations:
 Standby
 Line-interactive
 Standby online hybrid
 Standby ferroresonant
 Double conversion online
 Data conversion online
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Heating, Ventilation, and Air Conditioning
(5 of 5)
• Emergency shutoff
– Important aspect of power management is the ability to
stop power immediately if the current represents a risk to
human or machine safety
– Most computer rooms and wiring closets are equipped
with an emergency power shutoff
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Table 9-1 Static Charge Damage in
Computers
Voltage Possible Damage
40
High probability of damage to sensitive
circuits and transistors
1.000 Scrambles monitor display
1,500 Can cause disk drive data loss
2,000 High probability of system shutdown
4000 May jam printers
17,000
Causes certain and permanent damage
to almost all microcircuitry
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Figure 9-6 Types of uninterruptible power
supplies
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Water Problems
• Lack of water poses problem to systems, including fire
suppression and air-conditioning systems.
• Surplus of water, or water pressure, poses a real threat
(flooding, leaks).
• Very important to integrate water detection systems into
alarm systems that regulate overall facility operations.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Structural Collapse
• Unavoidable environmental factors/forces can cause
failures in structures that house an organization.
• Structures are designed and constructed with specific
load limits; overloading these limits results in structural
failure and potential injury or loss of life.
• Periodic inspections by qualified civil engineers assist in
identifying potentially dangerous structural conditions.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Maintenance of Facility Systems
• Physical security must be constantly documented,
evaluated, and tested.
• Documentation of facility’s configuration, operation, and
function should be integrated into disaster recovery
plans and standard operating procedures.
• Testing helps improve the facility’s physical security and
identify weak points.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Interception of Data
• Three methods of data interception:
– Direct observation
– Interception of data transmission
– Electromagnetic interception
• U.S. government developed TEMPEST program to
reduce the risk of electromagnetic radiation (EMR)
monitoring.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Securing Mobile and Portable
Systems (1 of 2)
• Mobile computing requires more security than typical
computing infrastructures on the organization’s
premises.
• Many mobile computing systems
– Have corporate information stored within them.
– Are configured to facilitate user’s access into
organization’s secure computing facilities.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Securing Mobile and Portable Systems
(2 of 2)
• Controls support security and retrieval of lost or stolen
laptops
– CompuTrace software, stored on laptop; reports to a
central monitoring center
– Burglar alarms are made up of a PC card that contains a
motion detector
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Figure 9-7 Laptop recovery
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Remote Computing Security
• Remote site computing involves variety of computing
sites outside the organization’s main facility.
• Telecommuting: off-site computing using Internet, dial-
up, or leased point-to-point links.
• Employees may need to access networks on business
trips; telecommuters need access from home systems
or satellite offices.
• Telecommuter’s computers must be made more secure
than organization’s systems.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Special Considerations for Physical
Security Threats
• Develop physical security in-house or outsource?
– Many qualified and professional agencies
– Benefit of outsourcing includes gaining experience
and knowledge of agencies
– Downside includes high expense, loss of control over
individual components, and level of trust that must be
placed in another company
• Social engineering: use of people skills to obtain
information from employees that should not be released
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Inventory Management
• Computing equipment should be inventoried and
inspected on a regular basis.
• Classified information should also be inventoried and
managed.
• Physical security of computing equipment, data storage
media, and classified documents varies for each
organization.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website
for classroom use.
Summary
• Threats to information security that are unique to
physical security
• Key physical security considerations in a facility site
• Physical security monitoring components
• Essential elements of access control
• Fire safety, fire detection, and response
• Importance of supporting utilities, especially use of
uninterruptible power supplies
• Countermeasures to physical theft of computing devices

More Related Content

PPTX
Whitman_Ch06.pptx
PPTX
Introduction to Information Security.pptx
PPTX
Information Security_Ch06_02.1.2024.pptx
PPTX
ITT450 Chapter 1.pptx
PPTX
Whitman_Ch01.pptx
PPTX
Chapter #5(Information: Risk Management.pptx
PPTX
BSAD 372 SPRING 2017 CH 10
PPTX
Whitman_Ch02.pptx
Whitman_Ch06.pptx
Introduction to Information Security.pptx
Information Security_Ch06_02.1.2024.pptx
ITT450 Chapter 1.pptx
Whitman_Ch01.pptx
Chapter #5(Information: Risk Management.pptx
BSAD 372 SPRING 2017 CH 10
Whitman_Ch02.pptx

Similar to Whitman_Ch09.pdf information security slide (20)

PPTX
Chapter 2 Slide ::The need of security.
PPTX
Whitman_Ch05.pptx
PDF
Chapter 1 slides for the 2018 version of Whitman
PPT
Cyber security awareness training by cyber security infotech(csi)
PPTX
9780840024220 ppt ch01
PDF
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
PPTX
Technology-protection
PPTX
guide to computer forensics and investigation
PPTX
Guide to Computer Forencis and investigations
PPT
Net essentials6e ch10
PPTX
ch09-update.pptxaaaaaaaaaaaaaaaaaaaaaaaa
PPTX
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PPTX
Digital Forensics_Lecture.pptx
PPTX
Whitman_Ch10.pptx
PPTX
security and system mainatance
PDF
AmeriTech_Healthcare Technology Guide
PPTX
ISSP on Fair Use of Organizational Technology for CGT
PPTX
Coud discovery chap 5
PPTX
9780840024220 ppt ch09
PPTX
9780840024220 ppt ch05
Chapter 2 Slide ::The need of security.
Whitman_Ch05.pptx
Chapter 1 slides for the 2018 version of Whitman
Cyber security awareness training by cyber security infotech(csi)
9780840024220 ppt ch01
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Technology-protection
guide to computer forensics and investigation
Guide to Computer Forencis and investigations
Net essentials6e ch10
ch09-update.pptxaaaaaaaaaaaaaaaaaaaaaaaa
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
Digital Forensics_Lecture.pptx
Whitman_Ch10.pptx
security and system mainatance
AmeriTech_Healthcare Technology Guide
ISSP on Fair Use of Organizational Technology for CGT
Coud discovery chap 5
9780840024220 ppt ch09
9780840024220 ppt ch05
Ad

Recently uploaded (20)

PPTX
Cell Structure & Organelles in detailed.
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Computing-Curriculum for Schools in Ghana
PPTX
GDM (1) (1).pptx small presentation for students
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
01-Introduction-to-Information-Management.pdf
PDF
Pre independence Education in Inndia.pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Institutional Correction lecture only . . .
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Basic Mud Logging Guide for educational purpose
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Cell Structure & Organelles in detailed.
Renaissance Architecture: A Journey from Faith to Humanism
Computing-Curriculum for Schools in Ghana
GDM (1) (1).pptx small presentation for students
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
01-Introduction-to-Information-Management.pdf
Pre independence Education in Inndia.pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Institutional Correction lecture only . . .
human mycosis Human fungal infections are called human mycosis..pptx
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Basic Mud Logging Guide for educational purpose
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Module 4: Burden of Disease Tutorial Slides S2 2025
O7-L3 Supply Chain Operations - ICLT Program
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Ad

Whitman_Ch09.pdf information security slide

  • 1. Principles of Information Security Sixth Edition Chapter 9 Physical Security Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 2. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Learning Objectives • Upon completion of this material, you should be able to: – Discuss the relationship between information security and physical security – Describe key physical security considerations, including fire control and surveillance systems – Identify critical physical environment considerations for computing facilities, including uninterruptible power supplies
  • 3. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Introduction (1 of 3) • Physical security involves the protection of physical items, objects, or areas from unauthorized access and misuse. • Most technology-based controls can be circumvented if an attacker gains physical access. • Physical security is as important as logical security.
  • 4. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Introduction (2 of 3) • Donn B. Parker’s seven major sources of physical loss: – Extreme temperature: heat, cold – Gases: war gases, commercial vapors, humid or dry air, suspended particles – Liquids: water, chemicals – Living organisms: viruses, bacteria, people, animals, insects – Projectiles: tangible objects in motion, powered objects – Movement: collapse, shearing, shaking, vibration, liquefaction, flow waves, separation, slide
  • 5. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Introduction (3 of 3) – Energy anomalies: electrical surge or failure, magnetism, static electricity, aging circuitry; radiation: sound, light, radio, microwave, electromagnetic, atomic • Community roles: – General management: responsible for facility security – IT management and professionals: responsible for environmental and access security – Information security management and professionals: perform risk assessments and implementation reviews
  • 6. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Physical Access Controls • Secure facility: physical location with controls implemented to minimize the risk of attacks from physical threats. • Secure facility can take advantage of natural terrain, local traffic flow, and surrounding development and can complement these with protection mechanisms (fences, gates, walls, guards, alarms).
  • 7. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Physical Security Controls (1 of 9) • Walls, fencing, and gates • Guards • Dogs • ID cards and badges • Locks and keys • Mantraps • Electronic monitoring • Alarms and alarm systems • Computer rooms and wiring closets • Interior walls and doors
  • 8. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Physical Security Controls (2 of 9) • Walls, fencing, and gates – Some of the oldest and most reliable elements of physical security; the essential starting point for perimeter control • Guards – Can evaluate each situation as it arises to make reasoned responses; most have standard operating procedures • Dogs – Keen sense of smell and hearing can detect intrusions that human guards cannot
  • 9. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Physical Security Controls (3 of 9) • ID cards and badges – ID card is typically concealed and name badge is visible – Serve as a simple form of biometrics (facial recognition) – Should not be the only means of control as cards can be easily duplicated, stolen, and modified – Tailgating occurs when an authorized individual opens a door and other people also enter
  • 10. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Physical Security Controls (4 of 9) • Locks and keys – Two types of locks: mechanical and electromechanical – Locks can also be divided into four categories: manual, programmable, electronic, biometric – Locks fail and alternative procedures for controlling access must be put in place – Locks fail in one of two ways:  Fail-safe lock  Fail-secure lock
  • 11. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Physical Security Controls (5 of 9) • Mantraps – Small enclosure that has an entry point and a different exit point. – Individual enters mantrap, requests access, and, if verified, is allowed to exit mantrap into facility. – Individual denied entry is not allowed to exit until the security official overrides automatic locks of the enclosure.
  • 12. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Physical Security Controls (6 of 9) • Electronic monitoring – Equipment can record events in areas where other types of physical controls are impractical – May use cameras with video recorders; includes closed- circuit television (CCT) systems – Drawbacks  Passive; does not prevent access or prohibited activity  Recordings often are not monitored in real time; must be reviewed to have any value
  • 13. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Physical Security Controls (7 of 9) • Alarms and alarm systems – Alarm systems notify people/systems when an event occurs – Detect fire, intrusion, environmental disturbance, or an interruption in services – Rely on sensors that detect an event, for example, motion detectors, thermal detectors, glass breakage detectors, weight sensors, and contact sensors
  • 14. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Physical Security Controls (8 of 9) • Computer rooms and wiring closets – Require special attention to ensure confidentiality, integrity, and availability of information. – Logical access controls are easily defeated if attacker gains physical access to computing equipment. – Custodial staff, often the least scrutinized people who have access to offices, are given greatest degree of unsupervised access.
  • 15. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Physical Security Controls (9 of 9) • Interior walls and doors – Information asset security is sometimes compromised by improper construction of facility walls and doors. – Facility walls are typically either standard interior or firewall. – High-security areas must have firewall-grade walls to provide physical security against potential intruders and fires. – Doors allowing access to high-security rooms should be evaluated. – To secure doors, install push or crash bars on computer rooms and closets.
  • 16. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Figure 9-1 Tailgating
  • 17. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Figure 9-2 Locks
  • 18. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Figure 9-3 Mantraps
  • 19. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Fire Security and Safety • Most serious threat to safety of people who work in an organization is fire. • Fires account for more property damage, personal injury, and death than any other threat. • It is imperative that physical security plans implement strong measures to detect and respond to fires and fire hazards.
  • 20. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Fire Detection and Response (1 of 4) • Fire suppression systems: devices installed and maintained to detect and respond to a fire, potential fire, or combustion danger. • Flame point: temperature of ignition. • Deny an environment of temperature, fuel, or oxygen – Water and water mist systems – Carbon dioxide systems – Soda acid systems – Gas-based systems
  • 21. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Fire Detection and Response (2 of 4) • Fire detection – Fire detection systems fall into two general categories: manual and automatic – To prevent an attacker slipping into offices during an evacuation, programs often designate a person from each office area to serve as a floor monitor – There are three basic types of fire detection systems: thermal detection, smoke detection, flame detection
  • 22. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Fire Detection and Response (3 of 4) • Fire suppression – Systems can consist of portable, manual, or automatic apparatus – Portable extinguishers are rated by the type of fire: Class A, Class B, Class C, Class D, Class K – Installed systems apply suppressive agents, usually either sprinkler or gaseous systems
  • 23. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Fire Detection and Response (4 of 4) • Gaseous emission systems – Until recently, two types of systems: carbon dioxide and Halon – Carbon dioxide removes fire’s oxygen supply – Halon is clean but has been classified as an ozone- depleting substance; new installations are prohibited – Alternative clean agents presented in Table 9-1 (found on page 521 in the text) are reported to be less effective than Halon
  • 24. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Figure 9-4 Water sprinkler system • When the ambient temperature reaches 140-150°F, the liquid- filled glass tube trigger breaks, releasing the stopper and allowing water to hit the diffuser, spaying water throughout the area
  • 25. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Figure 9-5 Gaseous fire suppression system (1 of 2) • System Components: 1. Discharge nozzles 2. Piping 3. Control panel 4. Discharge or warning alarms (s) 5. Hazard warning or caution signs 6. Automatic fire detection devices (s) 7. Manual discharge station (s) 8. Storage container (s) and extinguishing agent
  • 26. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Figure 9-5 Gaseous fire suppression system (2 of 2)
  • 27. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Failure of Supporting Utilities and Structural Collapse • Supporting utilities (heating, ventilation, and air conditioning; power; water) have significant impact on continued safe operation of a facility. • Each utility must be properly managed to prevent potential damage to information and information systems.
  • 28. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Heating, Ventilation, and Air Conditioning (1 of 5) • Areas within heating, ventilation, and air conditioning (HVAC) systems that can cause damage to information systems include: – Temperature – Filtration – Humidity – Static electricity
  • 29. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Heating, Ventilation, and Air Conditioning (2 of 5) • Ventilation shafts – While ductwork is small in residential buildings, in large commercial buildings, it can be large enough for an individual to climb through – If ducts are large, security can install wire mesh grids at various points to compartmentalize the runs • Power management and conditioning – Power systems used by information-processing equipment must be properly installed and correctly grounded
  • 30. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Heating, Ventilation, and Air Conditioning (3 of 5) – Noise that interferes with the normal 60-Hertz cycle can result in inaccurate time clocks or unreliable internal clocks inside the CPU • Grounding and amperage – Grounding ensures that the returning flow of current is properly discharged to ground – Ground fault circuit interruption (GFIC) capable of quickly identifying and interrupting a ground fault – Overloading a circuit can create a load exceeding electrical cable’s rating, increasing the risk of overheating and fire
  • 31. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Heating, Ventilation, and Air Conditioning (4 of 5) • Uninterruptible power supply (UPS) – In case of power outage, UPS is the backup power source for major computing systems – Basic UPS configurations:  Standby  Line-interactive  Standby online hybrid  Standby ferroresonant  Double conversion online  Data conversion online
  • 32. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Heating, Ventilation, and Air Conditioning (5 of 5) • Emergency shutoff – Important aspect of power management is the ability to stop power immediately if the current represents a risk to human or machine safety – Most computer rooms and wiring closets are equipped with an emergency power shutoff
  • 33. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Table 9-1 Static Charge Damage in Computers Voltage Possible Damage 40 High probability of damage to sensitive circuits and transistors 1.000 Scrambles monitor display 1,500 Can cause disk drive data loss 2,000 High probability of system shutdown 4000 May jam printers 17,000 Causes certain and permanent damage to almost all microcircuitry
  • 34. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Figure 9-6 Types of uninterruptible power supplies
  • 35. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Water Problems • Lack of water poses problem to systems, including fire suppression and air-conditioning systems. • Surplus of water, or water pressure, poses a real threat (flooding, leaks). • Very important to integrate water detection systems into alarm systems that regulate overall facility operations.
  • 36. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Structural Collapse • Unavoidable environmental factors/forces can cause failures in structures that house an organization. • Structures are designed and constructed with specific load limits; overloading these limits results in structural failure and potential injury or loss of life. • Periodic inspections by qualified civil engineers assist in identifying potentially dangerous structural conditions.
  • 37. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Maintenance of Facility Systems • Physical security must be constantly documented, evaluated, and tested. • Documentation of facility’s configuration, operation, and function should be integrated into disaster recovery plans and standard operating procedures. • Testing helps improve the facility’s physical security and identify weak points.
  • 38. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Interception of Data • Three methods of data interception: – Direct observation – Interception of data transmission – Electromagnetic interception • U.S. government developed TEMPEST program to reduce the risk of electromagnetic radiation (EMR) monitoring.
  • 39. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Securing Mobile and Portable Systems (1 of 2) • Mobile computing requires more security than typical computing infrastructures on the organization’s premises. • Many mobile computing systems – Have corporate information stored within them. – Are configured to facilitate user’s access into organization’s secure computing facilities.
  • 40. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Securing Mobile and Portable Systems (2 of 2) • Controls support security and retrieval of lost or stolen laptops – CompuTrace software, stored on laptop; reports to a central monitoring center – Burglar alarms are made up of a PC card that contains a motion detector
  • 41. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Figure 9-7 Laptop recovery
  • 42. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Remote Computing Security • Remote site computing involves variety of computing sites outside the organization’s main facility. • Telecommuting: off-site computing using Internet, dial- up, or leased point-to-point links. • Employees may need to access networks on business trips; telecommuters need access from home systems or satellite offices. • Telecommuter’s computers must be made more secure than organization’s systems.
  • 43. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Special Considerations for Physical Security Threats • Develop physical security in-house or outsource? – Many qualified and professional agencies – Benefit of outsourcing includes gaining experience and knowledge of agencies – Downside includes high expense, loss of control over individual components, and level of trust that must be placed in another company • Social engineering: use of people skills to obtain information from employees that should not be released
  • 44. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Inventory Management • Computing equipment should be inventoried and inspected on a regular basis. • Classified information should also be inventoried and managed. • Physical security of computing equipment, data storage media, and classified documents varies for each organization.
  • 45. Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Summary • Threats to information security that are unique to physical security • Key physical security considerations in a facility site • Physical security monitoring components • Essential elements of access control • Fire safety, fire detection, and response • Importance of supporting utilities, especially use of uninterruptible power supplies • Countermeasures to physical theft of computing devices