This presentation talks about the physical security. Physical security is also useful in our today's lives especially when we are working at a corporate company.
1. Transform
ingL
ives. InventingtheF
uture. www.iit.edu
I E
LLINOIS T U
INS T
I T
OF TECHNOLOGY
ITM 578 1
Physical Security
I
f so m e o ne re ally wants to g e t at the info rm atio n, it is no t
difficult if the y can g ain physicalacce ss to the co m pute r o r
hard drive .
--Microsoft White Paper, July 1999
Ray Trygstad
ITM 478/578
Spring 2004
Information Technology & Management Degree Programs
CenterforProfessional Development
2. ITM 578 2
ILLINOIS INSTITUTE OF TECHNOLOGY
Learning Objectives:
ï”Upon completion of this lesson the
student should be able to:
â Describe the conceptual need for physical security
â Identify threats to information security that are
unique to physical security
â Describe the key physical security considerations
for selecting a facility site
â Identify physical security monitoring components
â Discuss the essential elements of access control
within the scope of facilities management
â Explain the criticality of fire safety programs to all
physical security programs
3. ITM 578 3
ILLINOIS INSTITUTE OF TECHNOLOGY
Learning Objectives
ï”Upon completion of this lesson the
student should be able to:
â Describe the components of fire detection and
response
â Discuss the impact of interruptions in the service
of supporting utilities
â Discuss the technical details of uninterruptible
power supplies and how they are used to increase
availability of information assets
â Discuss critical physical environment
considerations for computing facilities
â Discuss countermeasures to the physical theft of
computing devices
4. ITM 578 4
ILLINOIS INSTITUTE OF TECHNOLOGY
Introduction
ï” Physical security addresses design,
implementation, and maintenance of
countermeasures protecting the physical
resources of an organization
ï” Most technology-based controls discussed can
be circumvented if an attacker gains physical
access to devices being controlled
ï” Some computer systems are constructed in
such a way that it easy to steal the hard drive
and the information it contains
ï” As a result, physical security should receive
as much attention as logical security in the
security development life cycle
5. ITM 578 5
ILLINOIS INSTITUTE OF TECHNOLOGY
Seven Major Sources of Physical Loss
ï” Temperature extremes: heat, cold
ï” Gases: war gases, commercial vapors, humid or dry
air, suspended particles
ï” Liquids: water, chemicals
ï” Living organisms: viruses, bacteria, people,
animals, insects
ï” Projectiles: tangible objects in motion, powered
objects
ï” Movement: collapse, shearing, shaking, vibration,
liquefaction, flows waves, separation, slide
ï” Energy anomalies: electrical surge or failure,
magnetism, static electricity, aging circuitry;
radiation: sound, light, radio, microwave,
electromagnetic, atomic
6. ITM 578 6
ILLINOIS INSTITUTE OF TECHNOLOGY
Community Roles
ï”General management:
â responsible for the security of the facility
ï”IT management and professionals:
â responsible for environmental and access
security
ï”Information security management and
professionals:
â perform risk assessments and
implementation reviews
7. ITM 578 7
ILLINOIS INSTITUTE OF TECHNOLOGY
Access Controls
ï”A number of physical access controls
are uniquely suited to controlling the
physical entry/exit of people to and
from facilities, including
â biometrics
â smart cards
â wireless enabled keycards
8. ITM 578 8
ILLINOIS INSTITUTE OF TECHNOLOGY
Facilities Management
ï”Secure facility: a physical location
that has been engineered with controls
designed to minimize the risk of
attacks from physical threats
ï”Secure facilities can use natural
terrain; traffic flow, urban
development, and can complement
these features with protection
mechanisms such as fences, gates,
walls, guards, and alarms
9. ITM 578 9
ILLINOIS INSTITUTE OF TECHNOLOGY
Controls for Protecting the Secure Facility
ï” Walls, Fencing,
and Gates
ï” Guards
ï” Dogs, ID Cards,
and Badges
ï” Locks and Keys
ï” Mantraps
ï” Electronic Monitoring
ï” Alarms and Alarm
Systems
ï” Computer Rooms
ï” Walls and Doors
10. ITM 578 10
ILLINOIS INSTITUTE OF TECHNOLOGY
ID Cards and Badges
ï” Ties physical security to information access
with identification cards (ID) and/or name
badges
â ID card is typically concealed
â Name badge is visible
ï” These devices are actually biometric (facial
recognition)
ï” Should not be the only control as they can be
easily duplicated, stolen, and modified
ï” Tailgating occurs when unauthorized
individuals follow authorized users through
the control
11. ITM 578 11
ILLINOIS INSTITUTE OF TECHNOLOGY
Locks and Keys
ï” There are two main type of locks
â mechanical and electro-mechanical
ï” Mechanical locks rely on a key of carefully shaped
pieces of metal which turn tumblers to release
secured loops of steel, aluminum, or brass
ï” Electro-mechanical lock can accept a variety of
inputs including keys that are magnetic strips on ID
Cards, radio signals from name badges, PINs typed
into a keypad
ï” Locks can also be divided into four categories
â manual, programmable, electronic, and biometric
12. ITM 578 12
ILLINOIS INSTITUTE OF TECHNOLOGY
Locks and Keys
ï”Locks fail and facilities need
alternative procedures for access
ï”Locks fail in one of two ways:
â when the lock of a door fails and the door
becomes unlocked, that is a fail-safe lock
â when the lock of a door fails and the door
remains locked, this is a fail-secure lock
13. ITM 578 13
ILLINOIS INSTITUTE OF TECHNOLOGY
Locks
Electronic
Programmable/Mechanical
Biometric
http:/
/
www.securitybiometrics.com/
products.htm
FIGURE 9-1 Locks
14. ITM 578 14
ILLINOIS INSTITUTE OF TECHNOLOGY
Mantraps
ï”An enclosure that has an entry point
and a different exit point
ï”The individual enters the mantrap,
requests access, and if verified, is
allowed to exit the mantrap into the
facility
ï”If the individual is denied entry, they
are not allowed to exit until a security
official overrides the automatic locks
of the enclosure
15. ITM 578 15
ILLINOIS INSTITUTE OF TECHNOLOGY
Mantraps
Server room
Inner lock
Mantrap
Hallway
Outer lock
FIGURE 9-2 Mantraps
2 â Intruder attempts to
gain access and is denied
access through inner lock
1 â Intruder allowed in
through outer lock
3 â Intruder denied access to
exit from outer lock and held
until released by security
Security
Security
16. ITM 578 16
ILLINOIS INSTITUTE OF TECHNOLOGY
Electronic Monitoring
ï”Records events where other types of
physical controls are not practical
ï”May use cameras with video recorders
ï”Drawbacks:
â reactive and do not prevent access or
prohibited activity
â recordings often not monitored in real
time and must be reviewed to have any
value
17. ITM 578 17
ILLINOIS INSTITUTE OF TECHNOLOGY
Alarms and Alarm Systems
ï”Alarm systems notify when an event
occurs
ï”Used for fire, intrusion, environmental
disturbance, or an interruption in
services
ï”These systems rely on sensors that
detect the event: motion detectors,
smoke detectors, thermal detectors,
glass breakage detectors, weight
sensors, and contact sensors
18. ITM 578 18
ILLINOIS INSTITUTE OF TECHNOLOGY
Computer Rooms and Wiring Closets
ï”Computer rooms and wiring and
communications closets require
special attention
ï”Logical controls are easily defeated, if
an attacker gains physical access to
the computing equipment
ï”Custodial staff are often the least
scrutinized of those who have access
to offices and are given the greatest
degree of unsupervised access
19. ITM 578 19
ILLINOIS INSTITUTE OF TECHNOLOGY
Interior Walls and Doors
ï” The walls in a facility are typically either:
â standard interior
â firewall
ï” All high-security areas must have firewall
grade walls to provide physical security from
potential intruders and improve facility's
resistance to fires
ï” Doors that allow access into secured rooms
should also be evaluated
ï” Computer rooms and wiring closets can have
push or crash bars installed to meet building
codes and provide much higher levels of
security than the standard door pull handle
20. ITM 578 20
ILLINOIS INSTITUTE OF TECHNOLOGY
Fire Safety
ï”The most serious threat to the safety of
the people who work in the
organization is the possibility of fire
ï”Fires account for more property
damage, personal injury, and death
than any other threat
ï”It is imperative that physical security
plans examine and implement strong
measures to detect and respond to fires
and fire hazards
21. ITM 578 21
ILLINOIS INSTITUTE OF TECHNOLOGY
Fire Detection and Response
ï” Fire suppression systems are devices installed and
maintained to detect and respond to a fire
ï” They deny an environment one of the three
requirements for a fire to burn: heat, fuel, & oxygen
â Water and water mist systems reduce the temperature and
saturate some fuels to prevent ignition
â Carbon dioxide systems rob fire of its oxygen
â Soda acid systems deny fire its fuel, preventing spreading
â Gas-based systems disrupt the fireâs chemical reaction but
leave enough oxygen for people to survive for a short time
âą Caution: this is not the case for all gas-based systems; older
Halon-based systems may deny sufficient oxygen for breathing
âą This is why many server rooms have separate glass-enclosed
âcontrol roomsâ
22. ITM 578 22
ILLINOIS INSTITUTE OF TECHNOLOGY
Fire Detection
ï”Before a fire can be suppressed, it
must be detected
ï”Fire detection systems fall into two
general categories:
â manual and automatic
ï”Part of a complete fire safety program
includes individuals that monitor
chaos of a fire evacuation to prevent an
attacker accessing offices
23. ITM 578 23
ILLINOIS INSTITUTE OF TECHNOLOGY
Fire Detection: System Types
ï”There are three basic types of fire
detection systems
â Thermal detection
â Flame detection
â Smoke detection
âąSmoke detectors operate in one of three
ways
â Photoelectric
â Ionization
â Air-aspirating
24. ITM 578 24
ILLINOIS INSTITUTE OF TECHNOLOGY
Fire Suppression
ï” Can be portable, manual, or automatic
ï” Portable extinguishers are rated by the type
of fire:
â Class A: fires of ordinary combustible fuels
â Class B: fires fueled by combustible liquids or
gases
â Class C: fires with energized electrical equipment
â Class D: fires fueled by combustible metals
25. ITM 578 25
ILLINOIS INSTITUTE OF TECHNOLOGY
Fire Suppression
ï” Installed systems apply suppressive agents,
either sprinkler or gaseous systems
â Sprinkler systems are designed to apply liquid,
usually water
â In sprinkler systems, the organization can
implement wet-pipe, dry-pipe, or pre-action
systems
â Water mist sprinklers are the newest form of
sprinkler systems and rely on microfine mists
26. ITM 578 26
ILLINOIS INSTITUTE OF TECHNOLOGY
Water Sprinkler System
When the ambient temperature reaches 140-150 degrees F,
the plastic pin melts, releasing the âstopperâ allowing water
to hit the diffuser spraying water throughout the area
FIGURE 9-3 Water Sprinkler System
27. ITM 578 27
ILLINOIS INSTITUTE OF TECHNOLOGY
Gaseous Emission Systems
ï” Until recently there were only two types of systems
â Carbon dioxide and Halon
ï” Carbon dioxide robs a fire of its oxygen supply
ï” Halon is a clean agent but has been classified as an
ozone-depleting substance, and new installations are
prohibited
ï” Alternative clean agents include the following:
â FM-200
â Inergen
â Carbon dioxide
â FE-13 (trifluromethane)
29. ITM 578 29
ILLINOIS INSTITUTE OF TECHNOLOGY
Failure of Supporting Utilities & Structural Collapse
ï” Supporting utilities, such as heating,
ventilation and air conditioning, power,
water, and other utilities, have a significant
impact on the continued safe operation of a
facility
ï” Extreme temperatures and humidity levels,
electrical fluctuations and the interruption
of water, sewage, and garbage services can
create conditions that inject vulnerabilities
in systems designed to protect information
30. ITM 578 30
ILLINOIS INSTITUTE OF TECHNOLOGY
Heating, Ventilation, and Air Conditioning
ï” HVAC system areas that can cause damage
to information systems:
â Temperature
âą Computer systems are subject to damage from extreme
temperature
âą The optimal temperature for a computing environment
(and people) is between 70 and 74 degrees Fahrenheit
â Filtration
â Humidity
â Static
âą One of the leading causes of damage to sensitive circuitry is
electrostatic discharge (ESD)
âą A person can generate up to 12,000 volts of static current by
walking across a carpet
31. ITM 578 31
ILLINOIS INSTITUTE OF TECHNOLOGY
Heating, Ventilation, and Air Conditioning
ï” HVAC system areas that can cause damage
to information systems:
â Temperature
âą Computer systems are subject to damage from extreme
temperature
âą The optimal temperature for a computing environment
(and people) is between 70 and 74 degrees Fahrenheit
â Filtration
â Humidity
â Static
âą One of the leading causes of damage to sensitive circuitry is
electrostatic discharge (ESD)
âą A person can generate up to 12,000 volts of static current by
walking across a carpet
32. ITM 578 32
ILLINOIS INSTITUTE OF TECHNOLOGY
Ventilation Shafts
ï”Security of the ventilation system air
ductwork:
â While in residential buildings the
ductwork is quite small, in large
commercial buildings it can be large
enough for an individual to climb through
â If the vents are large, security can install
wire mesh grids at various points to
compartmentalize the runs
33. ITM 578 33
ILLINOIS INSTITUTE OF TECHNOLOGY
Power Management & Conditioning
ï”Electrical quantity (voltage level and
amperage rating) is a concern, as is the
quality of the power (cleanliness and
proper installation)
ï”Noise that interferes with the normal
60 Hertz cycle can result in inaccurate
time clocks or unreliable internal
clocks inside the CPU
34. ITM 578 34
ILLINOIS INSTITUTE OF TECHNOLOGY
Power Management & Conditioning
ï”Grounding
â Grounding ensures returning flow of
current is properly discharged
â If not properly installed it could cause
damage to equipment and injury or
death to the person
ï”Overloading a circuit not only causes
problems with the circuit tripping
but can also overload the power load
on an electrical cable, creating the
risk of fire
35. ITM 578 35
ILLINOIS INSTITUTE OF TECHNOLOGY
Uninterruptible Power Supplies (UPSs)
ï”In case of power outage, a UPS is a
backup power source for major
computer systems
ï”There are four basic configurations of
UPS:
â the standby
â ferroresonant standby
â line-interactive
â the true online
36. ITM 578 36
ILLINOIS INSTITUTE OF TECHNOLOGY
Uninterruptible Power Supplies (UPSs)
ï”A standby or offline UPS is an offline
battery backup that detects the
interruption of power to the power
equipment
ï”A ferroresonant standby UPS is still
an offline UPS
â the ferroresonant transformer reduces
power problems
37. ITM 578 37
ILLINOIS INSTITUTE OF TECHNOLOGY
Uninterruptible Power Supplies (UPSs)
ï” The line-interactive UPS is always
connected to the output, so has a much
faster response time and incorporates power
conditioning and line filtering
ï” The true online UPS works in the opposite
fashion to a standby UPS since the primary
power source is the battery, with the power
feed from the utility constantly recharging
the batteries
â this model allows constant feed to the system,
while completely eliminating power quality
problems
38. ITM 578 38
ILLINOIS INSTITUTE OF TECHNOLOGY
Emergency Shutoff
ï” One important aspect of power management
in any environment is the need to be able to
stop power immediately should the current
represent a risk to human or machine safety
ï” Many computer rooms and wiring closets are
equipped with an emergency power shutoff,
usually a large red button, prominently
placed to facilitate access, with an accident-
proof cover to prevent unintentional use
39. ITM 578 39
ILLINOIS INSTITUTE OF TECHNOLOGY
Electrical Power Influences
ï” Fault: momentary interruption in power
ï” Blackout: prolonged interruption in power
ï” Sag: momentary drop in power voltage
levels
ï” Brownout: prolonged drop in power voltage
levels
ï” Spike: momentary increase in power
voltage levels
ï” Surge: prolonged increase in power voltage
levels
40. ITM 578 40
ILLINOIS INSTITUTE OF TECHNOLOGY
Water Problems
ï” Lack of water poses problems to systems,
including the functionality of fire
suppression systems, and the ability of
water chillers to provide air-conditioning
ï” On the other hand, a surplus of water, or
water pressure, poses a real threat
ï” It is therefore important to integrate water
detection systems into the alarm systems
that regulate overall facilities operations
41. ITM 578 41
ILLINOIS INSTITUTE OF TECHNOLOGY
Structural Collapse
ï” Unavoidable forces can cause failures of
structures that house the organization
ï” Structures are designed and constructed
with specific load limits, and overloading
these design limits, intentionally or
unintentionally, inevitably results in
structural failure and potentially loss of life
or injury
ï” Periodic inspections by qualified civil
engineers assists in identifying potentially
dangerous structural conditions well before
failure
42. ITM 578 42
ILLINOIS INSTITUTE OF TECHNOLOGY
Testing Facility Systems
ï” Physical security of the facility must be
constantly documented, evaluated, and
tested
ï” Documentation of the facilityâs configuration,
operation, and function is integrated into
disaster recovery plans and standing
operating procedures
ï” Testing provides information necessary to
improve the physical security in the facility
and identifies weak points
43. ITM 578 43
ILLINOIS INSTITUTE OF TECHNOLOGY
Interception of Data
ï” There are three methods of data interception:
â Direct observation
â Data transmission
â Eavesdropping on signals
ï” For direct observation, observer must be close
enough to information to breach
confidentiality
â Physical security mechanisms can restrict the
possibility someone directly observing information
ï” If attackers can access the transmission
media, using the Internet or tapping the LAN,
they need not be anywhere near the source of
information
44. ITM 578 44
ILLINOIS INSTITUTE OF TECHNOLOGY
Interception of Data
ï” TEMPEST is a technology that involves the
control of devices that emit electromagnetic
radiation (EMR) in such a manner that the
data cannot be reconstructed
ï” TEMPEST monitoring involves
â Ensuring computers are placed as far as possible
from outside perimeters
â Installing special shielding inside the CPU case
â Implementing a host of other restrictions,
including maintaining distances from plumbing
and other infrastructure components that carry
radio waves
45. ITM 578 45
ILLINOIS INSTITUTE OF TECHNOLOGY
Mobile and Portable Systems
ï” With the increased threat to overall
information security for laptops, handhelds,
and PDAs, mobile computing requires even
more security than the average in-house
system
ï” Many of these mobile computing systems
not only have corporate information stored
within them, many are configured to
facilitate the userâs access into the
organizationâs secure computing facilities
46. ITM 578 46
ILLINOIS INSTITUTE OF TECHNOLOGY
Stopping Laptop Losses
ï” Controls support the security and retrieval
of lost or stolen laptops
â CompuTrace is stored on a laptopâs hardware and
reports to a central monitoring center
â Burglar alarms made up of a PC card that
contains a motion detector
âą If the alarm in the laptop is armed, and the laptop is
moved beyond a configured distance, the alarm triggers
an audible alarm
âą The system also shuts down the computer and includes
an encryption option to completely render the
information unusable
47. ITM 578 47
ILLINOIS INSTITUTE OF TECHNOLOGY
Laptop Theft Deterrence
FIGURE 9-6 Laptop Theft Deterrence
Laptop loaded with
trace software
Laptop periodically
reports connection and
electronic serial number
Central monitoring
station verifies
ownership
Stolen computer
information passed
to law enforcement
48. ITM 578 48
ILLINOIS INSTITUTE OF TECHNOLOGY
Remote Computing Security
ï”Remote site computing - distant from
the organizational facility
ï”Telecommuting - computing using
telecommunications including
Internet, dial-up, or leased
point-to-point links
ï”Employees may need to access
networks on business trips
49. ITM 578 49
ILLINOIS INSTITUTE OF TECHNOLOGY
Remote Computing Security
ï”Telecommuters need access from home
systems or satellite offices
ï”To provide a secure extension of the
organizationâs internal networks, all
external connections and systems
must be secured
ï”Individuals telecommuting from home
deserve special attention
â As more individuals consider telecommuting,
risk to organizational information through these
often unsecured connections is substantial
50. ITM 578 50
ILLINOIS INSTITUTE OF TECHNOLOGY
Remote Computing Security
ï” Few organizations provide employees with
secure connections to office networks, and
even fewer provide secure systems, should
the employeeâs home computer be
compromised
ï” To provide a secure extension of the
organizationâs internal networks, all external
connections and systems must be secured.
ï” Although it is possible to secure remote sites,
organizations cannot assume the employees
will invest their own funds for security
51. ITM 578 51
ILLINOIS INSTITUTE OF TECHNOLOGY
Special Considerations For Physical Security Threats
ï” Develop physical security in-house or
outsource it?
â Many qualified professional agencies provide
consulting and services in the physical security
area
â The benefit of outsourcing physical security
includes gaining the experience and knowledge of
these agencies, many of which have been in the
field for decades
ï” Downside includes the high expense of
outsourcing physical security, the loss of
control over the individual components of the
physical security solution, and the level of
trust that must be placed in another company
52. ITM 578 52
ILLINOIS INSTITUTE OF TECHNOLOGY
Special Considerations For Physical Security Threats
ï” Another concern of physical security is social
engineering
â Social engineering is the use of people skills to
obtain information from employees without their
knowing it
ï” While most social engineers prefer to use the
telephone and computer to make their
contacts and solicit information, some
brazenly access information more directly
ï” Require all individuals entering the facility
display appropriate visitorâs badges and be
escorted by a security individual when in
restricted areas
53. ITM 578 53
ILLINOIS INSTITUTE OF TECHNOLOGY
Who Does Physical Security?
ï” In a large enterprise, there will be a full
security department and responsibility for
physical security will be clear
ï” In smaller enterprises, the principal concern
for physical security may be with IT
ï” Due to this, the CISO may be the logical
choice to be the Security Officer for the
enterprise
(This would be a good research paper topicâŠ)
54. ITM 578 54
ILLINOIS INSTITUTE OF TECHNOLOGY
Inventory Management
ï” Computing equipment should be inventoried
and inspected on a regular basis
â Asset management as a security element
ï” Classified information should also be
inventoried and managed
â Whenever a classified document is reproduced, a
stamp should be placed on the original before it is
copied
â This stamp states the documentâs classification
level and document number for tracking
â Each classified copy is issued to its receiver, who
signs for the document