SlideShare a Scribd company logo
1 of 18
Physical Security and Digital Security
© COPYRIGHT PLN9 SECURITY SERVICES PVT. LTD. ALL RIGHTS RESERVED
PLN9 Security Services Pvt. Ltd.
Complete Security Solution In Association With Tyco
Physical Security
Description
• Physical security : as the name implies, involves protecting your assets
and information from physical access by unauthorized personnel.
• In other words, you’re trying to protect those items that can be seen,
touched, and stolen.
Physical security
• Lock Door – one of the easiest way to prevent those intent to creating
problems physically entering your environment is to lock your doors and
keep them out.
• Securing physical documents/password/shredding – in high security and
government environment, sensitive papers should be either shredded or
burned.
Physical Security
• Biometrics – physical characteristic to identify the user.(fingerprint, palm,
hand scanner, retina scanner, and soon, possibly, DNA scanner)
• Badges – can be any of form of identification intended to differentiate the
holder from everyone else. e.g.: name badge or photo ID.
Physical security
• Key Fobs – are named after the chains that used to hold pocket watches to
clothes.
• RFID Badges – is a type of badge or card that give you access to resources,
including buildings, parking lots and computer.
Physical Security
• RSA token – are anything that user must have on them to access network
resources and are often associated with devices that enables the user to
generate one-time password authenticating their identity.
• Privacy Filters – either film or glass add-ons that are placed over a monitor
or laptop screen to prevent the data on the screen from being readable
when viewed from the sides.
Physical Security
Physical Security
• Retinal – one form of biometric device that can be used to identify user.
– Matches are made based upon identification of the blood vessel in an
individual retina.
– Rather expensive.
• Tailgating – refers being so close to someone when they enter a building
that you are able to come in right behind them without needing use a key,
a card, or any other security device.
Digital Security
Description
Focused on keeping harmful data and malware out as well
as on authorization and permissions.
Focused on:
• antivirus software
• Firewalls
• Antispyware
• User authentication/strong passwords
• Directory permissions
Digital Security
Anti-virus Software
 Operation:
 Run in the background at all time
 Update the virus definition to recognize new malicious software
 Signature-based detection involves searching for known patterns of
data within executable code
 Generic-based signature are being used to detect new virus by looking
for malicious code/slight variants of code in file and will be test in
sandbox to see if it performs any malicious actions.
Digital Security
FIREWALL
• Device that provides secure connectivity between networks
(internal/external; varying levels of trust)
• Used to implement and enforce a security policy for
communication between networks
• Separate local network from the Internet
Trusted hosts and
networks Firewall
Router
Intranet
DMZ Demilitarized Zone:
publicly accessible
servers and networks
Functions of Firewall
 Restrict incoming and outgoing traffic by IP address, ports, or users
 Block invalid packets
Digital Security
Antispyware
 Just as antivirus seeks out and stops viruses from entering and spreading
 Purpose of antispyware software
 The OS from Microsoft are the one most affected by spyware, and
Microsoft has released Windows Defender and Security Essentials
Digital Security
A strong password is a password that meets the following guidelines:
- Be seven or fourteen characters long, due to the way in which encryption
works. For obvious reasons, fourteen characters are preferable.
- Contain both uppercase and lowercase letters.
- Contain numbers.
- Contain a symbol in the second, third, fourth, fifth or sixth position (due
to the way in which encryption works).
- Not resemble any of your previous passwords.
- Not be your name, your friend's or family member's name, or your login.
- Not be a dictionary word or common name.
Digital Security
Directory permissions
 Can do to improve or change the security of the directory services
deployed.
 Can ensure that they don’t become a tool for an attacker bent on
compromising organization’s security
Thank you

More Related Content

What's hot

Security Presentation
Security PresentationSecurity Presentation
Security PresentationGerhard Peens
 
Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Securityleminhvuong
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control PresentationWajahat Rajab
 
2. access control
2. access control2. access control
2. access control7wounders
 
Security training module
Security training moduleSecurity training module
Security training modulepagare_c
 
What makes a good security guard?
What makes a good security guard?What makes a good security guard?
What makes a good security guard?Perk Security Ltd
 
Top 10 Qualities Every Excellent Security Guard Should Have
Top 10 Qualities Every Excellent Security Guard Should HaveTop 10 Qualities Every Excellent Security Guard Should Have
Top 10 Qualities Every Excellent Security Guard Should HaveGrant Heanes
 
security Guards - Duties & Discipline
  security Guards - Duties & Discipline  security Guards - Duties & Discipline
security Guards - Duties & DisciplineVS E
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingDaniel P Wallace
 
Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security PresentationWajahat Rajab
 
The Role of a Static Security Guard
The Role of a Static Security GuardThe Role of a Static Security Guard
The Role of a Static Security GuardAmelia White
 
Security training manual
Security training manualSecurity training manual
Security training manualANILDEVADKAR
 
Perimeter security solutions
Perimeter security solutionsPerimeter security solutions
Perimeter security solutionsbappyni
 

What's hot (20)

Physical Security.ppt
Physical Security.pptPhysical Security.ppt
Physical Security.ppt
 
Security Presentation
Security PresentationSecurity Presentation
Security Presentation
 
Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Security
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
2.5 security officers
2.5 security officers2.5 security officers
2.5 security officers
 
Physical Security
Physical SecurityPhysical Security
Physical Security
 
Plan your security
Plan your securityPlan your security
Plan your security
 
2. access control
2. access control2. access control
2. access control
 
Security training module
Security training moduleSecurity training module
Security training module
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
What makes a good security guard?
What makes a good security guard?What makes a good security guard?
What makes a good security guard?
 
SOP of Security supervisor
SOP of Security supervisorSOP of Security supervisor
SOP of Security supervisor
 
Top 10 Qualities Every Excellent Security Guard Should Have
Top 10 Qualities Every Excellent Security Guard Should HaveTop 10 Qualities Every Excellent Security Guard Should Have
Top 10 Qualities Every Excellent Security Guard Should Have
 
Physical Security Management System
Physical Security Management SystemPhysical Security Management System
Physical Security Management System
 
security Guards - Duties & Discipline
  security Guards - Duties & Discipline  security Guards - Duties & Discipline
security Guards - Duties & Discipline
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security Presentation
 
The Role of a Static Security Guard
The Role of a Static Security GuardThe Role of a Static Security Guard
The Role of a Static Security Guard
 
Security training manual
Security training manualSecurity training manual
Security training manual
 
Perimeter security solutions
Perimeter security solutionsPerimeter security solutions
Perimeter security solutions
 

Viewers also liked (6)

Corporate Presentation (solar plants)
Corporate Presentation (solar plants)Corporate Presentation (solar plants)
Corporate Presentation (solar plants)
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Negotiation Skill
Negotiation SkillNegotiation Skill
Negotiation Skill
 
Patrolling
PatrollingPatrolling
Patrolling
 
Physical Security
Physical SecurityPhysical Security
Physical Security
 
Hotel Security PPT
Hotel Security PPTHotel Security PPT
Hotel Security PPT
 

Similar to Physical Security and Digital Security

Digital physical security[present]
Digital physical security[present]Digital physical security[present]
Digital physical security[present]Zawawi Mohamad
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptxKnownId
 
Data protection and security
Data protection and securityData protection and security
Data protection and securitynazar60
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYDEEPAK948083
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedBule Hora University
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)Zara Nawaz
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lectureZara Nawaz
 
Lecture 7---Security (1).pdf
Lecture 7---Security (1).pdfLecture 7---Security (1).pdf
Lecture 7---Security (1).pdfZeeshanMajeed15
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryrryrsyd
 
Basic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpageBasic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpagenakomuri
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructureKerry Cole
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecuritylearnt
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case studyashu6
 
Securing E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-CommerceSecuring E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-Commercehidivin652
 

Similar to Physical Security and Digital Security (20)

Digital physical security[present]
Digital physical security[present]Digital physical security[present]
Digital physical security[present]
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Computer security
Computer securityComputer security
Computer security
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
Data security
Data securityData security
Data security
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
Lecture 7---Security (1).pdf
Lecture 7---Security (1).pdfLecture 7---Security (1).pdf
Lecture 7---Security (1).pdf
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryr
 
Basic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpageBasic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpage
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructure
 
Cyber security
Cyber securityCyber security
Cyber security
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
Network Security
Network SecurityNetwork Security
Network Security
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case study
 
Securing Devices at Home
Securing Devices at HomeSecuring Devices at Home
Securing Devices at Home
 
Securing E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-CommerceSecuring E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-Commerce
 

More from PLN9 Security Services Pvt. Ltd.

More from PLN9 Security Services Pvt. Ltd. (20)

Port security
Port securityPort security
Port security
 
Types of Security Services
Types of Security ServicesTypes of Security Services
Types of Security Services
 
Smms corporate presentation ppt
Smms corporate presentation pptSmms corporate presentation ppt
Smms corporate presentation ppt
 
Security Awareness
Security AwarenessSecurity Awareness
Security Awareness
 
Motivational Skills
Motivational SkillsMotivational Skills
Motivational Skills
 
Types of Soft Skills
Types of Soft Skills Types of Soft Skills
Types of Soft Skills
 
Physical Security and Digital Security
Physical Security and Digital SecurityPhysical Security and Digital Security
Physical Security and Digital Security
 
How to Teach Soft Skills
How to Teach Soft SkillsHow to Teach Soft Skills
How to Teach Soft Skills
 
Campus Security
Campus SecurityCampus Security
Campus Security
 
Managing Conflicts @ Workplace
Managing Conflicts @ WorkplaceManaging Conflicts @ Workplace
Managing Conflicts @ Workplace
 
ATM Security Tips
ATM Security TipsATM Security Tips
ATM Security Tips
 
Powerful Presentation Skills
Powerful Presentation SkillsPowerful Presentation Skills
Powerful Presentation Skills
 
Personality Development
Personality DevelopmentPersonality Development
Personality Development
 
'Leadership & Executive Coaching'
'Leadership & Executive Coaching''Leadership & Executive Coaching'
'Leadership & Executive Coaching'
 
Soft Skills Modules
Soft Skills ModulesSoft Skills Modules
Soft Skills Modules
 
Patrolling
PatrollingPatrolling
Patrolling
 
Successful Sales
Successful SalesSuccessful Sales
Successful Sales
 
High-Tech Security at Public Events
High-Tech Security at Public EventsHigh-Tech Security at Public Events
High-Tech Security at Public Events
 
Security Audit Information – Physical
Security Audit Information – PhysicalSecurity Audit Information – Physical
Security Audit Information – Physical
 
Secure Solutions
Secure SolutionsSecure Solutions
Secure Solutions
 

Recently uploaded

kreativan technology is a best IT company
kreativan technology is a best IT companykreativan technology is a best IT company
kreativan technology is a best IT companyKreativan Technologies
 
Book Call Girls In Gurgaon Sector 29 Call 8800357707 Escorts Service
Book Call Girls In Gurgaon Sector 29 Call 8800357707 Escorts ServiceBook Call Girls In Gurgaon Sector 29 Call 8800357707 Escorts Service
Book Call Girls In Gurgaon Sector 29 Call 8800357707 Escorts Servicemonikaservice1
 
Online Dating Precautions How Background Checks Can Safeguard You
Online Dating Precautions How Background Checks Can Safeguard YouOnline Dating Precautions How Background Checks Can Safeguard You
Online Dating Precautions How Background Checks Can Safeguard Youaffordablebackgroundchecks
 
Buy Facebook Marketing Services in Delhi - IndianLikes.com
Buy Facebook Marketing Services in Delhi - IndianLikes.comBuy Facebook Marketing Services in Delhi - IndianLikes.com
Buy Facebook Marketing Services in Delhi - IndianLikes.comSagar Sinha
 
cloudstudioアプローチ別営業資料202403_en (1) (2).pptx
cloudstudioアプローチ別営業資料202403_en (1) (2).pptxcloudstudioアプローチ別営業資料202403_en (1) (2).pptx
cloudstudioアプローチ別営業資料202403_en (1) (2).pptxcomworks
 
No-1 Call Girls In North Goa Panaji 98998 VIP 855202 Escort service In North Goa
No-1 Call Girls In North Goa Panaji 98998 VIP 855202 Escort service In North GoaNo-1 Call Girls In North Goa Panaji 98998 VIP 855202 Escort service In North Goa
No-1 Call Girls In North Goa Panaji 98998 VIP 855202 Escort service In North Goadelhincr993
 
KREATIVAN TECHNOLOGY IS THE BEST DIGITAL COMPANY IN CHANDIGARH
KREATIVAN TECHNOLOGY IS THE BEST DIGITAL COMPANY IN CHANDIGARHKREATIVAN TECHNOLOGY IS THE BEST DIGITAL COMPANY IN CHANDIGARH
KREATIVAN TECHNOLOGY IS THE BEST DIGITAL COMPANY IN CHANDIGARHKreativan Technologies
 
Protecting your business: staying compliant with NFPA codes
Protecting your business: staying compliant with NFPA codesProtecting your business: staying compliant with NFPA codes
Protecting your business: staying compliant with NFPA codesStartech Engineering
 
Call Girls In Noida Sector 15 Metro꧁❤ 8800357707 ❤꧂Escorts Service
Call Girls In Noida Sector 15 Metro꧁❤ 8800357707 ❤꧂Escorts ServiceCall Girls In Noida Sector 15 Metro꧁❤ 8800357707 ❤꧂Escorts Service
Call Girls In Noida Sector 15 Metro꧁❤ 8800357707 ❤꧂Escorts Servicemonikaservice1
 
Tibetan Call Girls In Majnu Ka Tilla Delhi 9911107661
Tibetan Call Girls In Majnu Ka Tilla Delhi 9911107661Tibetan Call Girls In Majnu Ka Tilla Delhi 9911107661
Tibetan Call Girls In Majnu Ka Tilla Delhi 9911107661safdarjungdelhi1
 
Balancing Sexual Desires for a Happier Relationship_ An Astrological Perspect...
Balancing Sexual Desires for a Happier Relationship_ An Astrological Perspect...Balancing Sexual Desires for a Happier Relationship_ An Astrological Perspect...
Balancing Sexual Desires for a Happier Relationship_ An Astrological Perspect...shubhamaapkikismat
 
High Class Escort Service in Marina +971509430017 Marina Escorts Service
High Class Escort Service in Marina +971509430017 Marina Escorts ServiceHigh Class Escort Service in Marina +971509430017 Marina Escorts Service
High Class Escort Service in Marina +971509430017 Marina Escorts Servicetajaga2345
 
Justdial Call Girls In Moolchand Metro Delhi 9911191017 Escorts Service
Justdial Call Girls In Moolchand Metro Delhi 9911191017 Escorts ServiceJustdial Call Girls In Moolchand Metro Delhi 9911191017 Escorts Service
Justdial Call Girls In Moolchand Metro Delhi 9911191017 Escorts Servicesafdarjungdelhi1
 
Pros and Cons of Being a Fashion Designer.pdf
Pros and Cons of Being a Fashion Designer.pdfPros and Cons of Being a Fashion Designer.pdf
Pros and Cons of Being a Fashion Designer.pdfEdumystic Institiute
 
What are the major challenges while integrating Salesforce
What are the major challenges while integrating SalesforceWhat are the major challenges while integrating Salesforce
What are the major challenges while integrating SalesforceNaresh Gupta
 
_Al Afnan Steel Industrial Company _LLC_
_Al Afnan Steel Industrial Company _LLC__Al Afnan Steel Industrial Company _LLC_
_Al Afnan Steel Industrial Company _LLC_alafnanmetals
 
Gateway to International Hospitality Internships for Students- Udaaan Managem...
Gateway to International Hospitality Internships for Students- Udaaan Managem...Gateway to International Hospitality Internships for Students- Udaaan Managem...
Gateway to International Hospitality Internships for Students- Udaaan Managem...digital190136
 
EDITAL DE PROCESSO SELETIVO 001-2024.pdf
EDITAL DE PROCESSO SELETIVO 001-2024.pdfEDITAL DE PROCESSO SELETIVO 001-2024.pdf
EDITAL DE PROCESSO SELETIVO 001-2024.pdfJessicaRosso2
 
Essential Website Design Trends, April 2024.pptx
Essential Website Design Trends, April 2024.pptxEssential Website Design Trends, April 2024.pptx
Essential Website Design Trends, April 2024.pptxThe Digital Department
 

Recently uploaded (20)

kreativan technology is a best IT company
kreativan technology is a best IT companykreativan technology is a best IT company
kreativan technology is a best IT company
 
Book Call Girls In Gurgaon Sector 29 Call 8800357707 Escorts Service
Book Call Girls In Gurgaon Sector 29 Call 8800357707 Escorts ServiceBook Call Girls In Gurgaon Sector 29 Call 8800357707 Escorts Service
Book Call Girls In Gurgaon Sector 29 Call 8800357707 Escorts Service
 
Online Dating Precautions How Background Checks Can Safeguard You
Online Dating Precautions How Background Checks Can Safeguard YouOnline Dating Precautions How Background Checks Can Safeguard You
Online Dating Precautions How Background Checks Can Safeguard You
 
Buy Facebook Marketing Services in Delhi - IndianLikes.com
Buy Facebook Marketing Services in Delhi - IndianLikes.comBuy Facebook Marketing Services in Delhi - IndianLikes.com
Buy Facebook Marketing Services in Delhi - IndianLikes.com
 
cloudstudioアプローチ別営業資料202403_en (1) (2).pptx
cloudstudioアプローチ別営業資料202403_en (1) (2).pptxcloudstudioアプローチ別営業資料202403_en (1) (2).pptx
cloudstudioアプローチ別営業資料202403_en (1) (2).pptx
 
No-1 Call Girls In North Goa Panaji 98998 VIP 855202 Escort service In North Goa
No-1 Call Girls In North Goa Panaji 98998 VIP 855202 Escort service In North GoaNo-1 Call Girls In North Goa Panaji 98998 VIP 855202 Escort service In North Goa
No-1 Call Girls In North Goa Panaji 98998 VIP 855202 Escort service In North Goa
 
KREATIVAN TECHNOLOGY IS THE BEST DIGITAL COMPANY IN CHANDIGARH
KREATIVAN TECHNOLOGY IS THE BEST DIGITAL COMPANY IN CHANDIGARHKREATIVAN TECHNOLOGY IS THE BEST DIGITAL COMPANY IN CHANDIGARH
KREATIVAN TECHNOLOGY IS THE BEST DIGITAL COMPANY IN CHANDIGARH
 
Protecting your business: staying compliant with NFPA codes
Protecting your business: staying compliant with NFPA codesProtecting your business: staying compliant with NFPA codes
Protecting your business: staying compliant with NFPA codes
 
Call Girls In Noida Sector 15 Metro꧁❤ 8800357707 ❤꧂Escorts Service
Call Girls In Noida Sector 15 Metro꧁❤ 8800357707 ❤꧂Escorts ServiceCall Girls In Noida Sector 15 Metro꧁❤ 8800357707 ❤꧂Escorts Service
Call Girls In Noida Sector 15 Metro꧁❤ 8800357707 ❤꧂Escorts Service
 
Tibetan Call Girls In Majnu Ka Tilla Delhi 9911107661
Tibetan Call Girls In Majnu Ka Tilla Delhi 9911107661Tibetan Call Girls In Majnu Ka Tilla Delhi 9911107661
Tibetan Call Girls In Majnu Ka Tilla Delhi 9911107661
 
Balancing Sexual Desires for a Happier Relationship_ An Astrological Perspect...
Balancing Sexual Desires for a Happier Relationship_ An Astrological Perspect...Balancing Sexual Desires for a Happier Relationship_ An Astrological Perspect...
Balancing Sexual Desires for a Happier Relationship_ An Astrological Perspect...
 
High Class Escort Service in Marina +971509430017 Marina Escorts Service
High Class Escort Service in Marina +971509430017 Marina Escorts ServiceHigh Class Escort Service in Marina +971509430017 Marina Escorts Service
High Class Escort Service in Marina +971509430017 Marina Escorts Service
 
Justdial Call Girls In Moolchand Metro Delhi 9911191017 Escorts Service
Justdial Call Girls In Moolchand Metro Delhi 9911191017 Escorts ServiceJustdial Call Girls In Moolchand Metro Delhi 9911191017 Escorts Service
Justdial Call Girls In Moolchand Metro Delhi 9911191017 Escorts Service
 
Pros and Cons of Being a Fashion Designer.pdf
Pros and Cons of Being a Fashion Designer.pdfPros and Cons of Being a Fashion Designer.pdf
Pros and Cons of Being a Fashion Designer.pdf
 
What are the major challenges while integrating Salesforce
What are the major challenges while integrating SalesforceWhat are the major challenges while integrating Salesforce
What are the major challenges while integrating Salesforce
 
How to Get into the NUS MBA Program? Explore
How to Get into the NUS MBA Program? ExploreHow to Get into the NUS MBA Program? Explore
How to Get into the NUS MBA Program? Explore
 
_Al Afnan Steel Industrial Company _LLC_
_Al Afnan Steel Industrial Company _LLC__Al Afnan Steel Industrial Company _LLC_
_Al Afnan Steel Industrial Company _LLC_
 
Gateway to International Hospitality Internships for Students- Udaaan Managem...
Gateway to International Hospitality Internships for Students- Udaaan Managem...Gateway to International Hospitality Internships for Students- Udaaan Managem...
Gateway to International Hospitality Internships for Students- Udaaan Managem...
 
EDITAL DE PROCESSO SELETIVO 001-2024.pdf
EDITAL DE PROCESSO SELETIVO 001-2024.pdfEDITAL DE PROCESSO SELETIVO 001-2024.pdf
EDITAL DE PROCESSO SELETIVO 001-2024.pdf
 
Essential Website Design Trends, April 2024.pptx
Essential Website Design Trends, April 2024.pptxEssential Website Design Trends, April 2024.pptx
Essential Website Design Trends, April 2024.pptx
 

Physical Security and Digital Security

  • 1. Physical Security and Digital Security © COPYRIGHT PLN9 SECURITY SERVICES PVT. LTD. ALL RIGHTS RESERVED PLN9 Security Services Pvt. Ltd. Complete Security Solution In Association With Tyco
  • 3. Description • Physical security : as the name implies, involves protecting your assets and information from physical access by unauthorized personnel. • In other words, you’re trying to protect those items that can be seen, touched, and stolen.
  • 4. Physical security • Lock Door – one of the easiest way to prevent those intent to creating problems physically entering your environment is to lock your doors and keep them out. • Securing physical documents/password/shredding – in high security and government environment, sensitive papers should be either shredded or burned.
  • 5. Physical Security • Biometrics – physical characteristic to identify the user.(fingerprint, palm, hand scanner, retina scanner, and soon, possibly, DNA scanner) • Badges – can be any of form of identification intended to differentiate the holder from everyone else. e.g.: name badge or photo ID.
  • 6. Physical security • Key Fobs – are named after the chains that used to hold pocket watches to clothes. • RFID Badges – is a type of badge or card that give you access to resources, including buildings, parking lots and computer.
  • 7. Physical Security • RSA token – are anything that user must have on them to access network resources and are often associated with devices that enables the user to generate one-time password authenticating their identity. • Privacy Filters – either film or glass add-ons that are placed over a monitor or laptop screen to prevent the data on the screen from being readable when viewed from the sides.
  • 9. Physical Security • Retinal – one form of biometric device that can be used to identify user. – Matches are made based upon identification of the blood vessel in an individual retina. – Rather expensive. • Tailgating – refers being so close to someone when they enter a building that you are able to come in right behind them without needing use a key, a card, or any other security device.
  • 11. Description Focused on keeping harmful data and malware out as well as on authorization and permissions. Focused on: • antivirus software • Firewalls • Antispyware • User authentication/strong passwords • Directory permissions
  • 12. Digital Security Anti-virus Software  Operation:  Run in the background at all time  Update the virus definition to recognize new malicious software  Signature-based detection involves searching for known patterns of data within executable code  Generic-based signature are being used to detect new virus by looking for malicious code/slight variants of code in file and will be test in sandbox to see if it performs any malicious actions.
  • 13. Digital Security FIREWALL • Device that provides secure connectivity between networks (internal/external; varying levels of trust) • Used to implement and enforce a security policy for communication between networks • Separate local network from the Internet Trusted hosts and networks Firewall Router Intranet DMZ Demilitarized Zone: publicly accessible servers and networks
  • 14. Functions of Firewall  Restrict incoming and outgoing traffic by IP address, ports, or users  Block invalid packets
  • 15. Digital Security Antispyware  Just as antivirus seeks out and stops viruses from entering and spreading  Purpose of antispyware software  The OS from Microsoft are the one most affected by spyware, and Microsoft has released Windows Defender and Security Essentials
  • 16. Digital Security A strong password is a password that meets the following guidelines: - Be seven or fourteen characters long, due to the way in which encryption works. For obvious reasons, fourteen characters are preferable. - Contain both uppercase and lowercase letters. - Contain numbers. - Contain a symbol in the second, third, fourth, fifth or sixth position (due to the way in which encryption works). - Not resemble any of your previous passwords. - Not be your name, your friend's or family member's name, or your login. - Not be a dictionary word or common name.
  • 17. Digital Security Directory permissions  Can do to improve or change the security of the directory services deployed.  Can ensure that they don’t become a tool for an attacker bent on compromising organization’s security