CISSP week 26


Published on

Published in: Education, Technology, Business
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • My salary means yearly my employer pays approximately $700 in workers comp for me. If I was in Jersey that’d be over $2000.
  • CISSP week 26

    1. 1. Physical Security Domain 10 CISSP Official CBK 3rd Edition Pages 1256-1362 Jem Jensen Tim Jensen StaridLabs
    2. 2. Physical Security Program: Purpose • Designed to prevent the interruption of operations and provide for the security of information, assets, and personnel. • Risks include: • • • • • Violence and crime International Terrorism Environmental Damage Energy Disruptions Pandemics
    3. 3. The Security Survey • The first step is to determine the protection objectives: • Threat Definition • Target Identification • Facility Characteristics. • Goal is to mitigate justified risks and not waste money on ineffective security.
    4. 4. Target Identification • The first step is to identify what assets need to be protected. • Set a prioritization for assets. • Assets can be personnel, property, equipment, or information. • Identify the impact and consequences of an asset loss.
    5. 5. Facility Characteristics • Several security professionals should be included in a facility walkthrough. The more eyes and the more experience the better. • Overnight security guards get bored and wander around all night, as such they are usually the best source for identifying weaknesses.
    6. 6. American Institute of Architects List of Key Security Concerns • Facility security control during and after hours of operation • Personnel and contract security policies and procedures • Personnel screening • Site and building access control • Video surveillance, assessment, and archiving. • Natural surveillance opportunities. • Protocols for responding to internal and external security incidents. • Degree of integration of security and other building systems. • Shipping and receiving security • • • • • • • • • • Property Identification and tracking Proprietary information security Computer network security Workplace violence prevention Mail screening operations, procedures, and recommendations Parking lot and site security Data center security Communications security Executive protection Business continuity planning and evacuation procedures
    7. 7. Vulnerability Assessment • The assessment should be done within the context of the defined threats and the value of the organization’s assets. • Each risk (front entrance, receptionist, etc) should have it’s own vulnerability level. (Very High, High, Medium High, Medium….) • The cost of your protective measures shouldn’t be more expensive than the assets your protecting.* • Caveats* • Laws/Regulations • Compliance • Single Loss vs Annul Rate of Occurrence (SLE/ARO)
    8. 8. Site Planning • Again, the goal of this whole process is the protection of life, property, and operations. • Countermeasures should be appropriate and effective to reduce the risk. • Must balance employee convenience and a secure facility. • Security shouldn’t be sacrificed for convenience, but a lot can be done to make the user’s life easier. • Security is always easier to setup from the beginning. Employees resist change and push back every time things are changed. As such security should be done right from the beginning, and only updated when necessary, not on a whim. • The movement of people and materials through a facility is determined by the design for access, delivery, and parking systems. • Systems should be designed to maximize efficiency while minimizing conflicts between entry and exit of vehicles and pedestrians.
    9. 9. Roadway Design • Normal street design is to minimize travel time and maximize safety. • For security, roadways can be designed to minimize vehicle velocity and to use the roadway as a protective measure. • Straight line approaches should not be used. This allows a vehicle the opportunity to gather the speed necessary to ram and penetrate the buildings. • Approaches should be parallel to the perimeter with a barrier between the road and building: earthen berms, high curbs, trees, etc. • Existing streets can be retrofitted with barriers, bollards, swing gates, etc. • Measures should be applied to keep vehicles from departing the roadway and bypassing the countermeasures.
    10. 10. Glasgow Airport
    11. 11. Car drives into Sears
    12. 12. Carbomb in Bagdad
    13. 13. Remember…build a better defense and the universe builds a better idiot…
    14. 14. Defenses
    15. 15. Less effective vehicle deterrents
    16. 16. Crime Prevention through Environmental Design (CPTED) • Provides direction to solve challenges of crime with organization (people), mechanical (technology and hardware), and natural design (architecture and circulation flow). • Protection can be provided through aesthetically pleasing features such as landforms, water, and vegetation. • Thick vegetation should not be directly adjacent to a building and thick ground cover over 4 inches tall could be a disadvantage. • Facility should be designed with a single point of entrance for guests/untrusted visitors. A receptionist should be available at this entrance.
    17. 17. Windows • Windows are vulnerable and common entry points. • Home windows shatter and cause hazardous conditions. (Note on window safety) • Buildings should be designed so that in the event of an explosion shattered glass is mitigated. (Bushes, walls, special types of glass, secure door frame, secure anchoring of frame to structure) • Windows should ideally not be directly adjacent to doors. This prevents a broken window allowing access to the door lock from the inside. • Laminated glass, grills, screens, mesh etc can protect windows. • Windows on ground level should not have the ability to be opened and should have bars and alarm systems.
    18. 18. Types of Glass • Annealed: Standard Glass • Tempered Glass: Impact Resistant • Wired glass: Wire mess imbedded in glass offering limited protection • Laminated glass: Very shatter resistant. Still breakable, but shards are held in place.
    19. 19. (video removed)
    20. 20. (video removed)
    21. 21. (video removed)
    22. 22. Glass Break Sensors • Sensors can be installed to detect glass breaking. • Types: • Acoustic (Listens for sound wave matching frequency of broken glass) • Crap • Shock (Identifies shock wave when glass is broken) • Also crap • Dual mode (Acoustic and Shock required for alarm) • Less crap
    23. 23. Garages • Primary risks: Crime and vehicles hitting pedestrians • Use signs to direct traffic and CCTV cameras to monitor for incidents. • Bright lights reduce both risks • 10-12 foot candle over parked cars • 15-20 foot candles in walking and driving aisles. • Exterior lights should be 12 feet above ground and should point downward. • Parking structure should be white to reflect light. • Elevators and walkways should empty into the lobby, not into the secure areas.
    24. 24. Location Threats Natural Disasters • Hurricane winds can exceed 155 MPH • Tornado winds can reach 300 MPH • Earthquakes shake things • Floods…flood things…
    25. 25. Man-made threats • FIRE! FIRE! • Fires cause damage due to heat, smoke, and water from suppression systems. • Fire systems should be protection water systems should be protected from single points of failure. • Incoming water line should be encased, buried, or located 50 feet from high risk areas.
    26. 26. Fire Extinguisher Classes
    27. 27. Utility Concerns: Electrical • Electric panels, conduits, and switchgear should be distributed throughout the building to avoid single points of failure. • Emergency generators should be located away from loading docks, entrances, and parking areas. Preferably on a roof, protected level, or protected interior area. • Generator fuel storage should be located away form loading docks, entrances, and parking areas. Access should be restricted and protected including locking caps and seals.
    28. 28. Communications • At least two phone lines on separate systems is good in case of emergency. • If using VOIP, run at least 1 telephone landline to the security guard desk as a backup. • Cell phones are relatively cheap and should be provided to critical personnel. • Maintain a phone list of critical employees. • Setup a base radio and add a portable radio to each floor for emergency internal communications.
    29. 29. Utilities • When possible protect utilities by placing them underground • Protect drinking water from contamination • Don’t provide signage saying “Critical power area” or “Single point of failure for all of our power, water, and heat. Don’t hit with car!” • Locate fuel storage tanks and operations buildings down slope and at least 100 feet from buildings. • Utility systems should be at least 50 feet from loading docks, front entrances, and parking areas.
    30. 30. Primary Purpose of Security! To protect personnel(people),assets(buildings, items), and information(10010101011101) from death, destruction, or harm.
    31. 31. Workers comp costs Insurance rate per $100 of payroll
    32. 32. Perimeter security • Perimeter security is made up of several zones. The more zones, the more defense-in-depth and the better your security. • Each zone can have different controls. • Security controls should be added with care, using risk, vulnerability, and threat assessment to balance security and risk.
    33. 33. Physical Security elements (Dodge, dip, dive, duck, and dodge) • Deter • Visible security will make adversaries reconsider. If you’re the secure bank with a sniper on the roof and a turret mounted machine gun operated by an annoyed robot, and the bank 2 blocks over (out of sniper sight) has an electric alarm from Radioshack and you both have equal assets that can be stolen…guess who’s going to be chosen. • Detect • Detection devices allow prompt notification that a break in has occurred. These can be cameras, motion sensors, infrared sensors, glass sensors, etc. • Delay • This is the key to physical security. Your protections and detection components are attempting to alert and delay adversaries so long as is necessary for police or security to arrive. Glass windows only need to last 15 minutes of pounding if a guard walks by every 15 minutes. Even that’s overkill since the guard would be able to hear several minutes before and after while he’s in the vicinity. A safe only has to last long enough for a response, etc. • Respond • A response force must be told that an unauthorized entry has been attempted. Police, security, mercenaries, the sniper, etc.
    34. 34. Critical components to protect • • • • • • • • • • Emergency generator: includes fuel systems, water supply, sprinklers, etc. Fuel storage Telephone and switchgear Fire pumps Building Control Centers UPS power supplies HVAC systems Elevator machinery Elevator, stair, and utility shafts Emergency power feeders.
    35. 35. Good fences make good neighbors • If using a perimeter fence, here’s the recommendations: • • • • • • • • Standard is 6 foot high fence with 2 inch mesh squares. 9 gauge vinyl or galvanized metal Posts should be every feet and anchored into cement Barbed wire angled out from the top of the fence at a 45 degree angle away from the protected area. Fence + barbed wire = 7 foot tall. Base of fence wire should have a post so fence can’t be pushed or crawled under. For high security, add a double fence with rolls of barbed wire between the fences. Fences are psychological deterrents and boundary markers and are easily penetrated.
    36. 36. Gates • Gates control access to vehicles and people entering/exiting the facility. • The higher security of the controlled area, the fewer gates should exist. • One is the optimal number for security, but not very practical with larger facilities. • Each gate requires authentication resources: • Automated system (cards, keycodes, etc) • Human guards
    37. 37. Walls • Walls are more expensive than fences but offer a softer view. • Effective walls should be 7 feet high with 3 or 4 strands of barbed wire on top. • The disadvantage of walls is view obstruction.
    38. 38. Perimeter Intrusion Detection
    39. 39. Infrared Sensors • Passive Infrared sensors are designed for human body detection. • Measures changes in heat in an area. • Active Infrared sensors send an IR signal to a receiver. If the signal is interrupted then an alarm triggers. • Laser tripwire basically.
    40. 40. Microwave Sensors • Send a controlled microwave pattern into protected area. Baseline is established and any variance is reported as an alarm. • Passes through concrete and steel and should be not be pointed adjacent to a roadway or adjacent buildings or false posivites will occur. • Bistatic • Uses separate devices for sensor and receiver. Sends microwave emission between sensor and receiver and looks for variance. • Monostatic • Has both sensor and receiver in the same unit. Generates a well controlled beam that can be adjusted to monitor a specific region.
    41. 41. Left to right: Passive, bistatic, multistatic(Radar)
    42. 42. Off Topic Tim: Through Wall Imaging Systems
    43. 43. Coaxial Strain-Sensitive Cable • Coaxial cable is woven through a fence. The cable transmits an electric field. If someone tries climbing or cutting the fence, the field fluctuates and is detected in the cable. When this occurs an alarm goes off. • Very tunable, susceptible to weather and climate. • Some are susceptible to EMI and RFI
    44. 44. Video Content Analysis and Motion Path Analysis • CCTV cameras can be piped to computers for software analysis. The software can identify pixel changes and filter out known events to identify suspicious events and raise alarms.
    45. 45. Lighting • Lighting deters intruders. • It also makes it easier to see. • Ideally lighting will allow security and employees to notice individuals at night at a distance of 75 feet or more. They should be able to identify a human face at 33 feet. • Ideally place lighting higher to allow it to disperse naturally and produce a better aesthetic.
    46. 46. Types of Lighting • Fluorescent Lights • Highly efficient and cost effective. • Temperature sensitive. Not effective for outdoor lighting. • Mercury Vapor Lights • • • • Preferred security light. Disperses strong white-bluish light. Extended lamp life. Take time to come to full light. Common at stadiums. • Sodium Vapor Light • Soft yellow light. • More efficient than mercury Vapor. • Used in foggy conditions. • Quartz Lamps • • • • Very bright white light Immediately on High wattage – 1500-2000 watts. Used on perimeters and troublesome areas for high visability and day light levels of light.
    47. 47. Infrared Lighting • Most black and white CCTV cameras can see Infrared (IR) • Infrared illuminators can be setup in areas to enhance camera visibility.
    48. 48. Access Control Badge Systems • Card Types: • Magnetic Stripe • • • • Old technology Can be physically damaged by use Data can be affected by magnetic fields Easily duplicated • Proximity Card (Prox Cards) • Use embedded antenna wires connected to a chip within the card. • Chip is encoded with unique card identification. • Read distance varies by manufacturer and installation. • Smart Cards • Credential cards with a microchip embedded in them. • Can store access transactions, licenses held by individuals, qualifications, safety training, security access levels, and biometric templates. • Card can double as an access card for doors and be used as an authenticator for a computer.
    49. 49. Additional Security measures • Along with a magstripe, prox, or smart card you can add additional measures to an authentication transaction: • PIN in keypad • Biometric reader
    50. 50. Fun with access Control Systems (ACS) • When new users are enrolled, they are stored to a central authentication repository. • This repository is mirrored to all readers on a consistent bases. • If the reader looses access to the central repository, it’s still able to authenticate known users, just not new additions.
    51. 51. More fun with ACS systems… • Many prox and smart cards have “slots”. These slots hold things such as PKI certificates or biometric data. • Biometric data such as your thumb print. • So in the event the proxy reader can’t communicate with the central computer, it can still authenticate you based on the card prox number and the thumb print scan on the badge.
    52. 52. CCTV Cameras Purposes • Surveillance • Viewer is able to view multiple locations from a centralized area. • Assessment • Viewer is able to assess the situation from a safe distance before choosing an appropriate action. • Deterrence • May deter unsophisticated burglars, vandals, and intruders • Evidentiary Archives • Archived images/video may be helpful for identification and prosecution of trespassers, vandals, and intruders.
    53. 53. Camera specs • Color cameras provide more details like color of clothes or color of car. • Black and white cameras are better in low light conditions. • Cameras must have auto-white balance to adjust to changing color temperatures of daylight and artificial light. • Color cameras require more illumination levels. • High quality color cameras work down to 1.5 foot-candle (fc) illumination. Black and white work to .5 fc
    54. 54. Outdoor cameras • • • • • • • • • Outdoor cameras are more expensive than indoor. Lighting changes depending on time of day and weather. Shrubs, trees, and vegetation can obstruct views. In cold weather, a heater blower should be added to the camera housing. Auto-iris lenses should be used since they automatically adjust to light. Strong sunlight can damage a camera without this feature. Set the focus in low light with an auto-iris. The focus will stay with more light, but not if reversed. “Neutral density (ND)” filters can be added to reduce lighting without changing the color of the image. Try to avoid direct sunlight in an image. Try to avoid sky view in the camera, this will impair the contrast.
    55. 55. Mounts • Fixed position Camera • • • • • Cannot rotate or pan. Good for motion detection. Lower cost Allows for “pre-alarm” where you can view images from before an alarm. Unable to follow an dynamic event. • Pan/Tilt/Zoom (PTZ) Cameras • Cameras allow rotation, panning, tilting, and zooming. • Due to extra electronics these usually cost 4 times more than a standard camera. • Not suited for pre-alarm assessment since the alarm area can change at all times. • Dome Cameras • Cheaper than PTZ • Hardened plastic lower dome, usually smoke colored to conceal camera. • Better protected in harsh conditions
    56. 56. IP Cameras • IP cameras capture digital video. • The camera is connected to a LAN network and video is sent over the network. • Least secure system. • Cost more than CCTV cameras. • Not normally suitable for high-risk projects
    57. 57. Security Guards • Deter unauthorized entry into a facility • Response force to alarm activations • Guards are required to conduct foot patrols of building interiors, exteriors, and parking areas. • Some guards will be stationary at entrances or security offices. • Required to respond to fire, security, and medical emergencies. And to renter assistance when needed. • Must be able to submit written and verbal reports regarding significant events.
    58. 58. Security Guard Affiliations • Proprietary (Company Employees) • • • • • • Increased quality of personnel Control of security program Employee loyalty Prestige for both employee and company Disadvantage: cost, administration, staffing, impartiality, expertise Largest disadvantage is time to create an effective security program. • Contract • • • • • Easily adapts to staffing levels Total cost is rolled into single hourly billable rate: salary, insurance, admin cost, uniforms, benefits. Contract security is generally impartial. Guards are easy to replace. Contract guards usually cost less than proprietary since they’re just a head. • Hybrid • It’s possible to use some proprietary and some contract security to provide better control over your security program while making the program cost effective.
    59. 59. Alarm Monitoring • For secure facilities, generally two guards are on at all times, 24/7. • Guard 1 is stationed in a security console center and monitors cameras, intrusion systems, and fire systems. • Guard 2 does walkthroughs and assigned tasks. • Many organizations use UL 1981 Standard for high security facilities to designate staffing levels. • Requires staffing to be such that all alarm signals can be acknowledged and appropriate dispatch and verification action can be initiated not more than a defined period after the monitoring facility receiver acknowledges. • The Security Control Center should be located on the main floor or the basement as long as the area is not below ground level (flood protection) • Entry must be controlled and only authorized personnel allowed in. • A sign in sheet should be hung up to document any non-authorized personnel being escorted in (police, temporary staff, executives, etc) • Must have primary and secondary power sources. Secondary power should last for at least 24 hours.
    60. 60. Visitor Access • Visitors should be required to sign in and sign out, and document their purpose of visit. • A visitor badge should be given to identify them as a non-employee. • This badge should not be an access card • The badge should state if they require an escort or not. If an escort is required, the badge should have the name of the escort to make that person personally responsible. • Some visitor systems can read government issued ID’s by swiping them and identify if the ID is properly formatted or is falsified. The data is populated into a database as a record.
    61. 61. Doors (Again) • Door assemblies include the door, its frame, and the anchorage to the building. • Exterior doors should be designed to fit snugly in the doorframe, preventing gaps. • Perimeter doors should be hollow steel doors or steel clad doors with steel frames. • Latch and frame anchor should match the strength of the door and frame. • Hinges should be on the interior of restricted areas. • Doors housing sensitive areas should have an automatic door closing device.
    62. 62. Why Hinges should be inside….
    63. 63. Electronic Locks • Actuates the door bolt • Some retract the lock without user intervention • Some offer request-to-exit switches • Expensive • Often requires new door for retrofit • Requires special door hinge to accommodate wiring harness • Can be configured in fail-safe or fail-secure modes.
    64. 64. Electric Strikes • Strike is removed (vs bolt being removed) • Can be configured in fail-safe or fail-secure modes. • Unrestricted exit access is allowed. • Can easily be retrofitted to old doors.
    65. 65. Magnetic Locks • Easy retrofit • Mounted on door and doorframe • Continuous electric current is provided to hold the door closed. • Locks are fail-safe (fail open) on power loss. • US Life safety Codes require magnetic lock doors have a manual override device and an automated senor or Request To Exit device. • Locks are controlled by a card reader.
    66. 66. Mag Locks
    67. 67. Anti-Passback • Requires user to badge in and out when entering and leaving. • Easy for accountability • Some systems only allow single entry. To enter again the user must have left. This stops people from dropping badges out windows or cloning them to get multiple people inside.
    68. 68. Turnstiles • Prevents piggybacking or tailgating • Assists guards in verifying that all users badge in individually
    69. 69. Mantraps
    70. 70. Real Mantraps • Room where you must enter, allow the door to close behind you, and then enter another door which will allow unlock only once you are locked in the room. • This allows employees to know if someone is piggybacking. • A footstep detecting floor can be added to identify the amount of people in the room.
    71. 71. Safes • Last line of defense. • You should have spent more on guards, doors, and sensors. • Different categories. • Tool Resist • Rating of TL-15 means it’s tool resistant for 15 minutes. • To be TL-15 it must weight at least 750 pounds or have anchors. • Have a metal body that is solid or fabricated of at least 1 inch thick with tensile strength of 50,000 PSI and is fastened to the floor with ¼ inch steel. • No hole on the safe can be larger than ¼ inch when closed. • Must have a relocking device if the lock is destroyed.
    72. 72. Vault • Different Categories: • • • • Class M – ¼ hour Class 1 – ½ hour Class 2 – 1 hour Class 3 – 2 hour
    73. 73. Biometrics • Measure biological characteristics • Fingerprints, hand geometry, voice print, iris pattern, etc • Common failures • False acceptance (Type I error) – erroneously allows access by confusing one user with another or falsely recognizing an imposter • False rejection (Type II error) – fails to recognize a legitimate user • Most biometrics can be tuned to adjust the false acceptance rate (FAR) and false rejection rate (FRR) • The spot where FAR and FRR meet is called the Crossover Error Rate (CER) • CER can be used to compare accuracy between different devices
    74. 74. Biometrics
    75. 75. Biometrics • Fingerprint • Compares pattern on fingers to a stored template • Some require multiple fingers for either: • More accuracy – harder to forge multiple fingerprints • More flexibility – injury to one finger doesn’t bar access • Modern scanners detect temperature and pulse • Facial image • Compates facial features to stored image • Eye width, mouth width, nose height – general proportions
    76. 76. Biometrics • Hand geometry • • • • Uses distance between knuckle joints, finger lengths Generally faster than other biometrics Reasonably accurate Higher false acceptance rates • Voice recognition • Less expensive • Require isolation from background noise • Often paired with another access check like a PIN
    77. 77. Biometrics • Iris patterns • Iris is less susceptible to theft or injury than fingers • Slower – typically about 2 seconds per check • Some people don’t like having their eyes scanned • Retina scanning • • • • • Scans blood vessels at the back of the eye Very high security but lots of hurdles to implementing Slow - Typically 10 seconds per check Intrusive – have to take off glasses, hold very still Some people think it will damage their eyes
    78. 78. Biometrics • Signature dynamics • Compares stored signature style • Speed of writing, direction, as well as finished signature • Easy for signers – don’t need to learn anything new • Vascular patterns • Maps veins in hands or fingers • Difficult to forge • Contact-less – hygiene benefits
    79. 79. Biometrics • Keystroke dynamics • Analyses the way a person types • Keystroke rhythm template • Dwell time – how long the key is pressed • Flight time – time between key presses
    80. 80. Communications and Server Rooms • Lightning protection • Ground Potential Rise (GPR) • Lightning strike to a grounding system • Causes surge that can damage equipment, personnel • Equipment damage may not manifest itself immediately • Mean time before failure (MTBF) – average life expectancy of equipment • Latent damage – shortens MTBF • Avoidance • Can use fiber instead to avoid the issue • Or isolate the circuits using optical isolators or isolation transformers • Mounted in a non-conducting cabinet • Called a High voltage interface (HVI)
    81. 81. Communications and Server Rooms • Server room • No windows • Only one controlled entry • Physical access to a system = game over • So don’t let it happen! • Metal conduits for cabling leading from/to (ideally everywhere)
    82. 82. Communications and Server Rooms • Rack security … no.
    83. 83. Communications and Server Rooms • Rack security • Don’t stop at access control for the server room – lock server racks • Doubtful that everyone with server room access needs access to every rack • Do electricians need to get into the racks? Probably not • Manageable rack locks • Can be remotely configures for more advanced access control than classic keys • Only allow unlocking during certain times or day • Require manager approval • Monitor temperature, power consumption
    84. 84. Work Area Security • Server rooms, closets probably not the best place to put workspaces • High security personnel behind more secured areas • Outside of secured rooms • Security containers – locking cabinets • Clean desk approach – clean/lock everything up at the end of the day • Maintain strong password protection on workstations • Point screens away from windows • Use privacy filters or screen protectors • Shredding policy to destroy paper copies of sensitive information
    85. 85. Restricted Work Areas • Sensitive Compartmented Information Facility (SCIF) • • • • • • • • • Prevent & detect visual, acoustic, technical, physical access 3 layers of 5/8 inch drywall, true floor to true ceiling One door with X-09 combination lock Door frame affixed to surrounding wall & strong enough to prevent distortion Automatic door closer Door alarms Noisemaking device over doors, pointed at windows HVAC requirements restricting size or requiring bars on ducts Intrusion detection that response force can respond to within 15 minutes
    86. 86. Utilities and Power • UPS – battery backup for short term power outages • Generator • Activate automatically in power outage • Typically diesel fueled • HVAC • Heating, ventilation, air conditioning • Keeps system temperature in range to avoid damage or outages
    87. 87. Fire Detection • Detectors – sound alarm to give people a chance to escape • Types • Smoke • Categories • Photoelectric • Physical process (ionization) • Flame • UV • Heat • Sudden temperature changes • High temps
    88. 88. Fire Suppression • Water • • • • Wet system – filled with water that sprays until water supply is shut off Dry system – valve fills system with water when triggered Pre-action system – water held back until detectors are activated Deluge system – like pre-action but sprinkler heads are left open • Gas • Halon – outdated, leaves residue, can injure personnel • Aero-K • FM-200
    89. 89. The End!