SlideShare a Scribd company logo
1 of 17
PHYSICAL ACCESS
CONTROLS
GENERAL SECURITY
SUBMITTED BY:
AHSIN YOUSAF: L4F15ASOC0028
03032548705
SUBMITTED TO :-
PROF JAHANZAIB MALHI
WHAT IS THE PHYSICAL ACCESS
 Physical access is a term in computer security that refers to the
ability of people to physically gain access to a computer system.
According to Gregory White, "Given physical access to an
office, the knowledgeable attacker will quickly be able to find
the information needed to gain access to the organization's
computer systems and network.
THREATS
 Internal Threats:
 Internal threats are from individuals that have legitimate access such as employees, students, and
contractors. Insiders can be extremely difficult to detect or to protect
 • access, process, and distribute pornography materials.
 • access unauthorized information (salary, secret trade).
 External Threats:
Outside intruders can be hackers/crackers, saboteurs and thieves. If the network is compromised,
Intruders can attack or misuse the system.
WHAT DO YOU NEED TO DO?
 Make sure that doors and windows are kept locked when the area is not in use.
 Return any keys when no longer required or when you leave the University.
 Report any lost keys to the issuer.
 Report any unauthorised access or any alerts (e.g. burglar alarms) to site security.
 Make sure that information on your screen cannot be seen by unauthorised individuals – use a privacy
screen if required.
CONTINUE
•Ensure that any area where restricted University information is stored or processed has controlled access
or a staffed reception desk.
•Keep a record of key holders.
•Ensure that equipment such as photocopiers, scanners and digital cameras is protected from unauthorised
access.
•Situate faxes so that unauthorised individuals cannot see information sent to the machine. If your fax is
used to send or receive confidential information, ensure you have appropriate procedures and protection in
place to secure the information.
•If you are responsible for a restricted IT space, such as a data centre, telecommunications room, wiring
centre or IT storeroom, make sure that appropriate authorisation processes for access and physical security
measures are in place.
SECURITY CONTROLS
 Security controls are safeguards or countermeasures to avoid, detect, counteract, or
minimize security risks to physical property, information, computer systems, or other assets.
 They can be classified by several criteria.
 Before the event, preventive controls are intended to prevent an incident from occurring e.g. by
locking out unauthorized intruders;
 During the event, detective controls are intended to identify and characterize an incident in progress
e.g. by sounding the intruder alarm and alerting the security guards or police;
 After the event, corrective controls are intended to limit the extent of any damage caused by the
incident e.g. by recovering the organization to normal working status as efficiently as possible
PHYSICAL SECURITY
 Physical security is the protection of
personnel, hardware, software, networks and data from physical actions and events that
could cause serious loss or damage to an enterprise, agency or institution. This includes
protection from fire, flood, natural disasters, burglary, theft, vandalism and terrorism.
WHAT ARE PHYSICAL ACCESS CONTROLS?
CONTROLS
 CCTV
 A Biometric device
 Metal detectors
 Locks
 Lighting.
 Portable device security
 Alarm systems
 Doors
 Windows
 Emergency procedure
 On-going employee checks
 Electrical power
CCTV & DEPLOYMENT
 A television transmission system that uses cameras to transmit pictures to connected monitors
 Detection: The ability to detect the presence of an object
 Recognition: The ability to determine the type of object (animal, blowing debris, crawling human)
 • Cameras high enough to avoid physical attack
 • Cameras distributed to include blind areas
 • Appropriate Lenses must be high definition
 • Pan, Tilt, Zoom (PTZ) as required
 • Ability to be recorded
 • Camera system tied to alarm system.
A BIOMETRIC DEVICE
 It is a security identification and authentication device. Such devices verifying the identity of a living
person based on a physiological or behavioral characteristic.
These characteristics include:
 Fingerprint scanners
 Face and voice recognition systems
 Iris and retinal scans
METAL DETECTORS
SECURITY GUARD
 A metal detector is an electronic instrument which detects the presence of metal nearby. Metal
detectors are useful for finding metal inclusions hidden within objects, or metal objects buried
underground.
 Security guards use the metal detector and check every in going and out going person. That they any
harmful things or not. If they have any kind of these things they investigate on it.
 Also check that in going people are authorized or unauthorized.
LIGHTING
 • Provides a deterrent to intruders
 • Makes detection likely if entry attempted
 • Should be used with other controls such as fences, patrols, alarm systems, CCTV.
Types of lighting
 • Continuous Lighting (Most Common)
 – Glare Projection
 – Flood Lighting
 Trip Lighting , Standby Lighting , Movable (Portable) , Emergency Lighting.
PORTABLE DEVICE SECURITY
 Laptops, PDAs, Etc.
 Protect the device
 Protect the data in the device
 Examples: –
 Locking the cables – Tracing software – Encryption software – PIN Protection for PDAs – Inventory
system
ALARM SYSTEMS
 • Local alarm systems
 – Alarm sounds locally and must be protected from tampering and audible for at least 400 feet
 • Central station units
 – Monitored 7x24 and signalled over leased lines
 – Usually within < 10 minutes travel time
 – Private security firms
 Proprietary systems
 – Similar to central but owned and operated by customer

More Related Content

What's hot

INFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMINFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMANAND MURALI
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecuritylearnt
 
Physical Security Domain
Physical Security DomainPhysical Security Domain
Physical Security Domainamiable_indian
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control PresentationWajahat Rajab
 
The need for security
The need for securityThe need for security
The need for securityDhani Ahmad
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Insider Threats Webinar Final_Tyco
Insider Threats Webinar Final_TycoInsider Threats Webinar Final_Tyco
Insider Threats Webinar Final_TycoMatt Frowert
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss PreventionReza Kopaee
 
Information Security Principles - Access Control
Information Security  Principles -  Access ControlInformation Security  Principles -  Access Control
Information Security Principles - Access Controlidingolay
 
8. operations security
8. operations security8. operations security
8. operations security7wounders
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider ThreatPECB
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityDumindu Pahalawatta
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical SecurityJorge Sebastiao
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
 

What's hot (20)

Social engineering
Social engineering Social engineering
Social engineering
 
Physical Security
Physical SecurityPhysical Security
Physical Security
 
INFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMINFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEM
 
Physical security
Physical securityPhysical security
Physical security
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
Physical Security Domain
Physical Security DomainPhysical Security Domain
Physical Security Domain
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
The need for security
The need for securityThe need for security
The need for security
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Phishing
PhishingPhishing
Phishing
 
Insider Threats Webinar Final_Tyco
Insider Threats Webinar Final_TycoInsider Threats Webinar Final_Tyco
Insider Threats Webinar Final_Tyco
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Information Security Principles - Access Control
Information Security  Principles -  Access ControlInformation Security  Principles -  Access Control
Information Security Principles - Access Control
 
8. operations security
8. operations security8. operations security
8. operations security
 
Information security
Information securityInformation security
Information security
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Physical Security
Physical SecurityPhysical Security
Physical Security
 

Similar to Physical access control

Physical security.docx
Physical security.docxPhysical security.docx
Physical security.docxMVNVKUMAR
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issuesHaseeb Ahmed Awan
 
Physical security is a fundamental component of any secure infrastru.pdf
Physical security is a fundamental component of any secure infrastru.pdfPhysical security is a fundamental component of any secure infrastru.pdf
Physical security is a fundamental component of any secure infrastru.pdffeelinggift
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)Zara Nawaz
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lectureZara Nawaz
 
Basic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpageBasic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpagenakomuri
 
Secure physical infrastructure
Secure physical infrastructureSecure physical infrastructure
Secure physical infrastructurePallavi Agarwal
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & CyberPaul Andrews
 
Securing embedded systems
Securing embedded systemsSecuring embedded systems
Securing embedded systemsaissa benyahya
 
Intrusion Detection & Electronic Surveillance For Security
Intrusion Detection & Electronic Surveillance For SecurityIntrusion Detection & Electronic Surveillance For Security
Intrusion Detection & Electronic Surveillance For SecurityPLN9 Security Services Pvt. Ltd.
 
Physical Penetration Testing - RootedCON 2015
Physical Penetration Testing - RootedCON 2015Physical Penetration Testing - RootedCON 2015
Physical Penetration Testing - RootedCON 2015Hykeos
 
Physical Penetration Testing (RootedCON 2015)
Physical Penetration Testing (RootedCON 2015)Physical Penetration Testing (RootedCON 2015)
Physical Penetration Testing (RootedCON 2015)Eduardo Arriols Nuñez
 
TSCM Overview for Stakeholders
TSCM Overview for StakeholdersTSCM Overview for Stakeholders
TSCM Overview for Stakeholderskevinwetzel
 
Data protection and security
Data protection and securityData protection and security
Data protection and securitynazar60
 
Introduction to Security
Introduction to SecurityIntroduction to Security
Introduction to SecurityNateBrown60
 

Similar to Physical access control (20)

Physical security.docx
Physical security.docxPhysical security.docx
Physical security.docx
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issues
 
Physical security is a fundamental component of any secure infrastru.pdf
Physical security is a fundamental component of any secure infrastru.pdfPhysical security is a fundamental component of any secure infrastru.pdf
Physical security is a fundamental component of any secure infrastru.pdf
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
Basic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpageBasic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpage
 
Secure physical infrastructure
Secure physical infrastructureSecure physical infrastructure
Secure physical infrastructure
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & Cyber
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & Cyber
 
Smart
SmartSmart
Smart
 
Securing embedded systems
Securing embedded systemsSecuring embedded systems
Securing embedded systems
 
Security Intrusion Detection & Electronic Surveillance
Security Intrusion Detection & Electronic SurveillanceSecurity Intrusion Detection & Electronic Surveillance
Security Intrusion Detection & Electronic Surveillance
 
Intrusion Detection & Electronic Surveillance For Security
Intrusion Detection & Electronic Surveillance For SecurityIntrusion Detection & Electronic Surveillance For Security
Intrusion Detection & Electronic Surveillance For Security
 
Physical Penetration Testing - RootedCON 2015
Physical Penetration Testing - RootedCON 2015Physical Penetration Testing - RootedCON 2015
Physical Penetration Testing - RootedCON 2015
 
Physical Penetration Testing (RootedCON 2015)
Physical Penetration Testing (RootedCON 2015)Physical Penetration Testing (RootedCON 2015)
Physical Penetration Testing (RootedCON 2015)
 
computer security .ppt
computer security .pptcomputer security .ppt
computer security .ppt
 
INTRODUCTION TO SECURITY
INTRODUCTION TO SECURITYINTRODUCTION TO SECURITY
INTRODUCTION TO SECURITY
 
TSCM Overview for Stakeholders
TSCM Overview for StakeholdersTSCM Overview for Stakeholders
TSCM Overview for Stakeholders
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
Introduction to Security
Introduction to SecurityIntroduction to Security
Introduction to Security
 

More from Ahsin Yousaf

Database Security Management
Database Security Management Database Security Management
Database Security Management Ahsin Yousaf
 
Corporate law in pakistan
Corporate law in pakistanCorporate law in pakistan
Corporate law in pakistanAhsin Yousaf
 
Register Dld project
Register Dld projectRegister Dld project
Register Dld projectAhsin Yousaf
 
Three step writing process bovee by ahsin yousaf
Three step writing process bovee by ahsin yousafThree step writing process bovee by ahsin yousaf
Three step writing process bovee by ahsin yousafAhsin Yousaf
 
Financial Accounting presentation
Financial Accounting presentationFinancial Accounting presentation
Financial Accounting presentationAhsin Yousaf
 
Global market place
Global market placeGlobal market place
Global market placeAhsin Yousaf
 

More from Ahsin Yousaf (7)

Database Security Management
Database Security Management Database Security Management
Database Security Management
 
Corporate law in pakistan
Corporate law in pakistanCorporate law in pakistan
Corporate law in pakistan
 
Register Dld project
Register Dld projectRegister Dld project
Register Dld project
 
Three step writing process bovee by ahsin yousaf
Three step writing process bovee by ahsin yousafThree step writing process bovee by ahsin yousaf
Three step writing process bovee by ahsin yousaf
 
Financial Accounting presentation
Financial Accounting presentationFinancial Accounting presentation
Financial Accounting presentation
 
Bcrw
BcrwBcrw
Bcrw
 
Global market place
Global market placeGlobal market place
Global market place
 

Recently uploaded

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Recently uploaded (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 

Physical access control

  • 2. SUBMITTED BY: AHSIN YOUSAF: L4F15ASOC0028 03032548705 SUBMITTED TO :- PROF JAHANZAIB MALHI
  • 3. WHAT IS THE PHYSICAL ACCESS  Physical access is a term in computer security that refers to the ability of people to physically gain access to a computer system. According to Gregory White, "Given physical access to an office, the knowledgeable attacker will quickly be able to find the information needed to gain access to the organization's computer systems and network.
  • 4.
  • 5. THREATS  Internal Threats:  Internal threats are from individuals that have legitimate access such as employees, students, and contractors. Insiders can be extremely difficult to detect or to protect  • access, process, and distribute pornography materials.  • access unauthorized information (salary, secret trade).  External Threats: Outside intruders can be hackers/crackers, saboteurs and thieves. If the network is compromised, Intruders can attack or misuse the system.
  • 6. WHAT DO YOU NEED TO DO?  Make sure that doors and windows are kept locked when the area is not in use.  Return any keys when no longer required or when you leave the University.  Report any lost keys to the issuer.  Report any unauthorised access or any alerts (e.g. burglar alarms) to site security.  Make sure that information on your screen cannot be seen by unauthorised individuals – use a privacy screen if required.
  • 7. CONTINUE •Ensure that any area where restricted University information is stored or processed has controlled access or a staffed reception desk. •Keep a record of key holders. •Ensure that equipment such as photocopiers, scanners and digital cameras is protected from unauthorised access. •Situate faxes so that unauthorised individuals cannot see information sent to the machine. If your fax is used to send or receive confidential information, ensure you have appropriate procedures and protection in place to secure the information. •If you are responsible for a restricted IT space, such as a data centre, telecommunications room, wiring centre or IT storeroom, make sure that appropriate authorisation processes for access and physical security measures are in place.
  • 8. SECURITY CONTROLS  Security controls are safeguards or countermeasures to avoid, detect, counteract, or minimize security risks to physical property, information, computer systems, or other assets.  They can be classified by several criteria.  Before the event, preventive controls are intended to prevent an incident from occurring e.g. by locking out unauthorized intruders;  During the event, detective controls are intended to identify and characterize an incident in progress e.g. by sounding the intruder alarm and alerting the security guards or police;  After the event, corrective controls are intended to limit the extent of any damage caused by the incident e.g. by recovering the organization to normal working status as efficiently as possible
  • 9. PHYSICAL SECURITY  Physical security is the protection of personnel, hardware, software, networks and data from physical actions and events that could cause serious loss or damage to an enterprise, agency or institution. This includes protection from fire, flood, natural disasters, burglary, theft, vandalism and terrorism.
  • 10. WHAT ARE PHYSICAL ACCESS CONTROLS?
  • 11. CONTROLS  CCTV  A Biometric device  Metal detectors  Locks  Lighting.  Portable device security  Alarm systems  Doors  Windows  Emergency procedure  On-going employee checks  Electrical power
  • 12. CCTV & DEPLOYMENT  A television transmission system that uses cameras to transmit pictures to connected monitors  Detection: The ability to detect the presence of an object  Recognition: The ability to determine the type of object (animal, blowing debris, crawling human)  • Cameras high enough to avoid physical attack  • Cameras distributed to include blind areas  • Appropriate Lenses must be high definition  • Pan, Tilt, Zoom (PTZ) as required  • Ability to be recorded  • Camera system tied to alarm system.
  • 13. A BIOMETRIC DEVICE  It is a security identification and authentication device. Such devices verifying the identity of a living person based on a physiological or behavioral characteristic. These characteristics include:  Fingerprint scanners  Face and voice recognition systems  Iris and retinal scans
  • 14. METAL DETECTORS SECURITY GUARD  A metal detector is an electronic instrument which detects the presence of metal nearby. Metal detectors are useful for finding metal inclusions hidden within objects, or metal objects buried underground.  Security guards use the metal detector and check every in going and out going person. That they any harmful things or not. If they have any kind of these things they investigate on it.  Also check that in going people are authorized or unauthorized.
  • 15. LIGHTING  • Provides a deterrent to intruders  • Makes detection likely if entry attempted  • Should be used with other controls such as fences, patrols, alarm systems, CCTV. Types of lighting  • Continuous Lighting (Most Common)  – Glare Projection  – Flood Lighting  Trip Lighting , Standby Lighting , Movable (Portable) , Emergency Lighting.
  • 16. PORTABLE DEVICE SECURITY  Laptops, PDAs, Etc.  Protect the device  Protect the data in the device  Examples: –  Locking the cables – Tracing software – Encryption software – PIN Protection for PDAs – Inventory system
  • 17. ALARM SYSTEMS  • Local alarm systems  – Alarm sounds locally and must be protected from tampering and audible for at least 400 feet  • Central station units  – Monitored 7x24 and signalled over leased lines  – Usually within < 10 minutes travel time  – Private security firms  Proprietary systems  – Similar to central but owned and operated by customer