SlideShare a Scribd company logo
1 of 18
Physical Security
By: Christian Hudson
Overview
 Definition and importance
 Components
 Layers
 Physical Security Briefs
 Zones
 Implementation
Definition
 Physical security is the protection of
personnel, hardware, programs,
networks, and data from physical
circumstances and events that could
cause serious losses or damage to an
enterprise, agency, or institution. This
includes protection from fire, theft,
vandalism, natural disasters, and
terrorism.
Is physical security important?
 Significance is underestimated
 Breaches in action require no technical
background
 Accidents and natural disasters are
inevitable so preparation is necessary
Components
 Accidental and environmental
disasters
 Placing obstacles
 Idea is to confuse attacker,
delay serious ones, and
attempt to avoid the
inevitable
 Monitoring and notification
systems
 Security mechanisms to
monitor and detect potential
harm or violations
 Alarms, security lighting,
security guards or closed-
circuit television cameras
(CCTV)
Components (cont.)
 Recovery mechanisms
 To repel, catch or frustrate attackers
when an attack is detected
 Intrusion handling
Layers
 Environment Design
 First layer of physical
protection
 Consists of external
design void off
intruders
 May include objects like
barbed wire, warning
signs, fencing, metal
barriers, and site
lighting
Layers (cont.)
 Mechanical and
electronic access
control
 Prevents intruders
or unauthorized
users to direct
access to physical
components
 Includes gates,
doors and locks
Layers (cont.)
Layers (cont.)
 Monitoring system
 Less of a
preventative
measure
 Used more for
incident verification
and analysis
 Most common
mechanism is
CCTVs
Layers (cont.)
 Intrusion Detection
 Monitors for attacks
 Less of a preventative measure
 More of an response mechanism
 Alarms/Notification
Physical Security Briefs
 Security site brief
 Security policies used for the framework of
preventing the access to a physical setting
 Security design brief
 Security policies used for the layout or design for
a physical entity (may be coding, layout for
servers, access control, etc)
Zoning
 Public Zone
 Public has access to this area of a facility and its
surrounding
 Examples are facility grounds, elevator lobbies,
etc
 Reception Zone
 Zone which entail the transition from a public
zone to a restricted-access area of control
 Typically means where the contact of visitors
and a department is initiated
Zones (cont.)
 Operations Zone
 An area where access is limited to personnel
who work at facility and to escorted visitors
 Production floors and open office areas
 Security Zone
 An area to which access is limited to authorized
personnel and to authorized and escorted
visitors
 Area where secret information is
processed/stored
Layers (cont.)
 High Security Zone
 An area where access is limited to
authorized, appropriately screened
personnel and authorized and properly
escorted visitors
 A general example would be an area
where high-value assets are handled by
selected personnel
Implementation
 State the plan’s purpose
 Define the areas, buildings, and other
structures considered critical and
establish priorities for their protection
 Define and establish restrictions on
access and movement of critical areas
 Categorize restrictions
Questions?
References and Resources
 Bishop, Matt. Introduction to Computer Security.
Massachusetts: Pearson Education, Inc., 2005.
 http://64.233.167.104/search?q=cache:0xtkul7lJOgJ:www.tess
-
llc.com/Physical%2520Security%2520PolicyV4.pdf+physical+
security+policy&hl=en&ct=clnk&cd=1&gl=us
 http://en.wikipedia.org/wiki/Physical_Security
 http://www.rcmp-grc.gc.ca/tsb/pubs/phys_sec/g1-026_e.pdf
 http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci11
50976,00.html
 http://tldp.org/HOWTO/Security-HOWTO/physical-
security.html

More Related Content

What's hot

Security in Cyber-Physical Systems
Security in Cyber-Physical SystemsSecurity in Cyber-Physical Systems
Security in Cyber-Physical SystemsBob Marcus
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security VulnerabilitiesSiemplify
 
Physical Security Domain
Physical Security DomainPhysical Security Domain
Physical Security Domainamiable_indian
 
Cybersecurity
CybersecurityCybersecurity
CybersecurityA. Shamel
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentGary Bahadur
 
Security operation center
Security operation centerSecurity operation center
Security operation centerMuthuKumaran267
 
Security Automation and Machine Learning
Security Automation and Machine LearningSecurity Automation and Machine Learning
Security Automation and Machine LearningSiemplify
 
Insider threats and countermeasures
Insider threats and countermeasuresInsider threats and countermeasures
Insider threats and countermeasuresKAMRAN KHALID
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Managementasherad
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Sqrrl
 
7. physical sec
7. physical sec7. physical sec
7. physical sec7wounders
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...Edureka!
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehReZa AdineH
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for businessDaniel Thomas
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityjayashri kolekar
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligenceMarlabs
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationJoshua Prince
 

What's hot (20)

Security in Cyber-Physical Systems
Security in Cyber-Physical SystemsSecurity in Cyber-Physical Systems
Security in Cyber-Physical Systems
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
Physical Security Domain
Physical Security DomainPhysical Security Domain
Physical Security Domain
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Cyber security training
Cyber security trainingCyber security training
Cyber security training
 
Physical Security
Physical SecurityPhysical Security
Physical Security
 
Security operation center
Security operation centerSecurity operation center
Security operation center
 
Security Automation and Machine Learning
Security Automation and Machine LearningSecurity Automation and Machine Learning
Security Automation and Machine Learning
 
6 Physical Security
6 Physical Security6 Physical Security
6 Physical Security
 
Insider threats and countermeasures
Insider threats and countermeasuresInsider threats and countermeasures
Insider threats and countermeasures
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
7. physical sec
7. physical sec7. physical sec
7. physical sec
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 

Similar to Physical Security.ppt

Jupiter physical security ppt 2016
Jupiter physical security ppt 2016Jupiter physical security ppt 2016
Jupiter physical security ppt 2016Maxpromotion
 
Jupiter physical security ppt 2016 1
Jupiter physical security ppt 2016 1Jupiter physical security ppt 2016 1
Jupiter physical security ppt 2016 1Maxpromotion
 
Physical security.docx
Physical security.docxPhysical security.docx
Physical security.docxMVNVKUMAR
 
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newJupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newMaxpromotion
 
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newJupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newMaxpromotion
 
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newJupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newMaxpromotion
 
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newJupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newMaxpromotion
 
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental ControlsPACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental ControlsPace IT at Edmonds Community College
 
Types of Security in Industrial Security
Types of Security in Industrial SecurityTypes of Security in Industrial Security
Types of Security in Industrial SecurityRJCubillo
 
Secure physical infrastructure
Secure physical infrastructureSecure physical infrastructure
Secure physical infrastructurePallavi Agarwal
 
Concept of physical protection and its principals
Concept of physical protection and its principalsConcept of physical protection and its principals
Concept of physical protection and its principalsRasheed Abbasi
 
Network Security: Physical security
Network Security: Physical security Network Security: Physical security
Network Security: Physical security lalithambiga kamaraj
 
Physical security is a fundamental component of any secure infrastru.pdf
Physical security is a fundamental component of any secure infrastru.pdfPhysical security is a fundamental component of any secure infrastru.pdf
Physical security is a fundamental component of any secure infrastru.pdffeelinggift
 
4. Define communication security, information security, network secu.pdf
4. Define communication security, information security, network secu.pdf4. Define communication security, information security, network secu.pdf
4. Define communication security, information security, network secu.pdfarvindarora20042013
 
Supplier security assessment questionnaire
Supplier security assessment questionnaireSupplier security assessment questionnaire
Supplier security assessment questionnairePriyanka Aash
 
ICT-security-Lesson-4.pdf
ICT-security-Lesson-4.pdfICT-security-Lesson-4.pdf
ICT-security-Lesson-4.pdfasdfg hjkl
 
When  a traffic camera is installed in a designated community, d.docx
When  a traffic camera is installed in a designated community, d.docxWhen  a traffic camera is installed in a designated community, d.docx
When  a traffic camera is installed in a designated community, d.docxjolleybendicty
 

Similar to Physical Security.ppt (20)

Jupiter physical security ppt 2016
Jupiter physical security ppt 2016Jupiter physical security ppt 2016
Jupiter physical security ppt 2016
 
Jupiter physical security ppt 2016 1
Jupiter physical security ppt 2016 1Jupiter physical security ppt 2016 1
Jupiter physical security ppt 2016 1
 
Physical security.docx
Physical security.docxPhysical security.docx
Physical security.docx
 
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newJupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 new
 
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newJupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 new
 
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newJupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 new
 
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newJupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 new
 
Chapter008
Chapter008Chapter008
Chapter008
 
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental ControlsPACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
 
Types of Security in Industrial Security
Types of Security in Industrial SecurityTypes of Security in Industrial Security
Types of Security in Industrial Security
 
Secure physical infrastructure
Secure physical infrastructureSecure physical infrastructure
Secure physical infrastructure
 
Concept of physical protection and its principals
Concept of physical protection and its principalsConcept of physical protection and its principals
Concept of physical protection and its principals
 
Network Security: Physical security
Network Security: Physical security Network Security: Physical security
Network Security: Physical security
 
SECURITY PLANNING DESIGN (SESSION 3).ppt
SECURITY PLANNING  DESIGN (SESSION 3).pptSECURITY PLANNING  DESIGN (SESSION 3).ppt
SECURITY PLANNING DESIGN (SESSION 3).ppt
 
Physical security is a fundamental component of any secure infrastru.pdf
Physical security is a fundamental component of any secure infrastru.pdfPhysical security is a fundamental component of any secure infrastru.pdf
Physical security is a fundamental component of any secure infrastru.pdf
 
4. Define communication security, information security, network secu.pdf
4. Define communication security, information security, network secu.pdf4. Define communication security, information security, network secu.pdf
4. Define communication security, information security, network secu.pdf
 
Supplier security assessment questionnaire
Supplier security assessment questionnaireSupplier security assessment questionnaire
Supplier security assessment questionnaire
 
ICT-security-Lesson-4.pdf
ICT-security-Lesson-4.pdfICT-security-Lesson-4.pdf
ICT-security-Lesson-4.pdf
 
When  a traffic camera is installed in a designated community, d.docx
When  a traffic camera is installed in a designated community, d.docxWhen  a traffic camera is installed in a designated community, d.docx
When  a traffic camera is installed in a designated community, d.docx
 
Wastewater Workshop Presentation 2007[2 R]
Wastewater  Workshop  Presentation 2007[2 R]Wastewater  Workshop  Presentation 2007[2 R]
Wastewater Workshop Presentation 2007[2 R]
 

Recently uploaded

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 

Physical Security.ppt

  • 2. Overview  Definition and importance  Components  Layers  Physical Security Briefs  Zones  Implementation
  • 3. Definition  Physical security is the protection of personnel, hardware, programs, networks, and data from physical circumstances and events that could cause serious losses or damage to an enterprise, agency, or institution. This includes protection from fire, theft, vandalism, natural disasters, and terrorism.
  • 4. Is physical security important?  Significance is underestimated  Breaches in action require no technical background  Accidents and natural disasters are inevitable so preparation is necessary
  • 5. Components  Accidental and environmental disasters  Placing obstacles  Idea is to confuse attacker, delay serious ones, and attempt to avoid the inevitable  Monitoring and notification systems  Security mechanisms to monitor and detect potential harm or violations  Alarms, security lighting, security guards or closed- circuit television cameras (CCTV)
  • 6. Components (cont.)  Recovery mechanisms  To repel, catch or frustrate attackers when an attack is detected  Intrusion handling
  • 7. Layers  Environment Design  First layer of physical protection  Consists of external design void off intruders  May include objects like barbed wire, warning signs, fencing, metal barriers, and site lighting
  • 8. Layers (cont.)  Mechanical and electronic access control  Prevents intruders or unauthorized users to direct access to physical components  Includes gates, doors and locks
  • 10. Layers (cont.)  Monitoring system  Less of a preventative measure  Used more for incident verification and analysis  Most common mechanism is CCTVs
  • 11. Layers (cont.)  Intrusion Detection  Monitors for attacks  Less of a preventative measure  More of an response mechanism  Alarms/Notification
  • 12. Physical Security Briefs  Security site brief  Security policies used for the framework of preventing the access to a physical setting  Security design brief  Security policies used for the layout or design for a physical entity (may be coding, layout for servers, access control, etc)
  • 13. Zoning  Public Zone  Public has access to this area of a facility and its surrounding  Examples are facility grounds, elevator lobbies, etc  Reception Zone  Zone which entail the transition from a public zone to a restricted-access area of control  Typically means where the contact of visitors and a department is initiated
  • 14. Zones (cont.)  Operations Zone  An area where access is limited to personnel who work at facility and to escorted visitors  Production floors and open office areas  Security Zone  An area to which access is limited to authorized personnel and to authorized and escorted visitors  Area where secret information is processed/stored
  • 15. Layers (cont.)  High Security Zone  An area where access is limited to authorized, appropriately screened personnel and authorized and properly escorted visitors  A general example would be an area where high-value assets are handled by selected personnel
  • 16. Implementation  State the plan’s purpose  Define the areas, buildings, and other structures considered critical and establish priorities for their protection  Define and establish restrictions on access and movement of critical areas  Categorize restrictions
  • 18. References and Resources  Bishop, Matt. Introduction to Computer Security. Massachusetts: Pearson Education, Inc., 2005.  http://64.233.167.104/search?q=cache:0xtkul7lJOgJ:www.tess - llc.com/Physical%2520Security%2520PolicyV4.pdf+physical+ security+policy&hl=en&ct=clnk&cd=1&gl=us  http://en.wikipedia.org/wiki/Physical_Security  http://www.rcmp-grc.gc.ca/tsb/pubs/phys_sec/g1-026_e.pdf  http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci11 50976,00.html  http://tldp.org/HOWTO/Security-HOWTO/physical- security.html