SlideShare a Scribd company logo
1 of 11
P A P E R R E V I E W : I N F O R M A T I O N
S E C U R I T Y ; P H Y S I C A L A N D
E N V I R O N M E N T A L S E C U R I T Y
P R O C E D U R E
B y : L a m a A l - B a n y a n & I s r a a A l - N a m i
I D : 2 1 6 0 0 9 7 8 0 I D : 2 1 6 0 1 5 3 7 1
King Faisal University
School of Business
Administration Management of
Information System
Department
Information Systems
Security course. Fall 2019.
INTRODUCTION
• The paper that we reviewed listed the needed procedures to
be made to secure The Newcastle university’s information
system physically and environmentally. Through this
presentation we summarized the most important points for
you to know and follow to secure your own information
systems.
PHYSICAL AND ENVIRONMENTAL
SECURITY PROCEDURES
• Secure Areas
Objective: To prevent
unauthorized physical access,
damage and interference to the
university’s information and
assets.
• Equipment
Objective: To prevent loss,
damage, theft of compromise of
assets and interruption to the
university’s operations.
SECURE AREAS
• Physical Security Perimeter -
University information processing facilities must be protected by a physical security
perimeter. Intruder detection system must be installed.
• Physical Entry Controls -
Manned reception and appropriate entry and authentication controls are needed to
ensure only authorized personnel are allowed. While visitors must be escorted by
authorized personnel.
• Securing Offices, Rooms and Facilities -
Controls to ensure security of information and information systems located in
University offices, rooms and other facilities must be designed, applied and
documented.
SECURE AREAS
• Protecting Against External and Environmental Threats –
Information owners, managers, staff must incorporate physical security controls that
protect against damage from fire, flood, earthquake, explosion, civil unrest and other
forms of natural and man-made disasters.
• Physical protection against malicious attacks or accidents must be designed
and applied.
• Working in secure areas–
Information owners must inform the authorized personnel that:
- Sensitive information cannot be discussed in non-secure area.
- Sensitive information cannot be disclosed to unauthorized personnel.
- Any recording device of any type is not allowed inside the secure area.
SECURE AREAS
• Delivery and loading areas –
Access points such as reception, delivery and loading areas and other points where
unauthorized persons may enter the premises must be controlled and, if possible,
isolated from secure areas or offices to avoid unauthorized access.
EQUIPMENT
• Equipment siting and protection -
Equipment must be protected to reduce the risks from unauthorized access,
environmental threats and hazards.
• Supporting utilities -
Equipment must be protected from power supply interruption and other disruptions
caused by failures in supporting utilities. They should be regularly inspected and
to ensure their proper functioning and reduce the risk of malfunctioning or failure.
• Cabling security -
Power and telecommunications cabling carrying data or supporting information
services must be protected from interception or damage. Cables and equipment
be clearly marked to reduce handling errors.
EQUIPMENT
• Equipment maintenance -
Equipment must be correctly maintained to help ensure availability and integrity of
sensitive information and assets. Records must be kept of all suspected faults and all
preventive and corrective maintenance.
• Removal of assets -
Information owners must establish a formal authorization process for the removal of
assets for re-location, maintenance, disposal or any other purpose.
EQUIPMENT
• Security of equipment and assets off-premises –
Information Owners must ensure that equipment used or stored off-site is safeguarded
in accordance with the sensitivity of the information and the value of the assets. By
encrypting sensitive data or using a logical or physical control mechanisms to protect
against unauthorized access.
• Secure disposal or re-use of equipment –
Information owners must consider the sensitivity of information and the value of the
assets when determining whether or not hardware or media will be re- used or
destroyed.
1) Prior to re-use; The integrity of University records must be maintained by adhering to
the Records Management policy.
2) In case of disposal; Storage media that will no longer be used in the University must
be wiped by a method approved by the IT Security team, in compliance with the Asset
Management Procedure.
EQUIPMENT
• Unattended user equipment -
Users must ensure unattended equipment has appropriate protection by terminating
the active session when finished and locking it with a password or other approved
mechanism.
• Clear desk and clear screen policy -
Users must safeguard sensitive information from unauthorized access, loss, or
By locking hard copy sensitive information or portable storage devices in a locked
cabinet.
THANK YOU

More Related Content

Similar to Paper review: Information Security; Physical and Environmental Security Procedure

Similar to Paper review: Information Security; Physical and Environmental Security Procedure (20)

Importance of workplace Security.pptx
Importance of workplace Security.pptxImportance of workplace Security.pptx
Importance of workplace Security.pptx
 
Health information secuirty session 5 best practise in information security
Health information secuirty session 5 best practise in information securityHealth information secuirty session 5 best practise in information security
Health information secuirty session 5 best practise in information security
 
CV 2 anwar
CV 2 anwarCV 2 anwar
CV 2 anwar
 
14 she
14   she14   she
14 she
 
Dive into anything.pdf
Dive into anything.pdfDive into anything.pdf
Dive into anything.pdf
 
The Perimeter Protection Issues, Technique and Operation
The Perimeter Protection Issues, Technique and OperationThe Perimeter Protection Issues, Technique and Operation
The Perimeter Protection Issues, Technique and Operation
 
murad c v
murad c vmurad c v
murad c v
 
Chapter 1 Introduction to Safety, Security and First Aid (FASS)
Chapter 1 Introduction to Safety, Security and First Aid (FASS)Chapter 1 Introduction to Safety, Security and First Aid (FASS)
Chapter 1 Introduction to Safety, Security and First Aid (FASS)
 
HEMANT (EX-IAF) 2016.
HEMANT (EX-IAF) 2016.HEMANT (EX-IAF) 2016.
HEMANT (EX-IAF) 2016.
 
Control of Hazardous Energy
Control of Hazardous EnergyControl of Hazardous Energy
Control of Hazardous Energy
 
Human Factors_MODULE_2.pptx
Human Factors_MODULE_2.pptxHuman Factors_MODULE_2.pptx
Human Factors_MODULE_2.pptx
 
General Safety Protocols on Manufacturing Plant
General Safety Protocols on Manufacturing PlantGeneral Safety Protocols on Manufacturing Plant
General Safety Protocols on Manufacturing Plant
 
Introduction to Health Informatics Ch11 power point
Introduction to Health Informatics Ch11 power pointIntroduction to Health Informatics Ch11 power point
Introduction to Health Informatics Ch11 power point
 
Group 10 - PDPA II.pptx
Group 10 - PDPA II.pptxGroup 10 - PDPA II.pptx
Group 10 - PDPA II.pptx
 
Security Policy
Security PolicySecurity Policy
Security Policy
 
SECURITY AWARENESS
SECURITY AWARENESSSECURITY AWARENESS
SECURITY AWARENESS
 
Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdf
 
Chapter 7: Physical & Environmental Security
Chapter 7: Physical & Environmental Security Chapter 7: Physical & Environmental Security
Chapter 7: Physical & Environmental Security
 
Integrated Security management final.ppt
Integrated Security management final.pptIntegrated Security management final.ppt
Integrated Security management final.ppt
 
Health and safety responsibilities
Health and safety responsibilitiesHealth and safety responsibilities
Health and safety responsibilities
 

Recently uploaded

Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
gajnagarg
 
Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...
Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...
Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...
HyderabadDolls
 
Top profile Call Girls In Nandurbar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Nandurbar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Nandurbar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Nandurbar [ 7014168258 ] Call Me For Genuine Models...
gajnagarg
 
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
gajnagarg
 
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
gajnagarg
 
Belur $ Female Escorts Service in Kolkata (Adult Only) 8005736733 Escort Serv...
Belur $ Female Escorts Service in Kolkata (Adult Only) 8005736733 Escort Serv...Belur $ Female Escorts Service in Kolkata (Adult Only) 8005736733 Escort Serv...
Belur $ Female Escorts Service in Kolkata (Adult Only) 8005736733 Escort Serv...
HyderabadDolls
 
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
gajnagarg
 
Abortion pills in Doha {{ QATAR }} +966572737505) Get Cytotec
Abortion pills in Doha {{ QATAR }} +966572737505) Get CytotecAbortion pills in Doha {{ QATAR }} +966572737505) Get Cytotec
Abortion pills in Doha {{ QATAR }} +966572737505) Get Cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Klinik kandungan
 
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
nirzagarg
 
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
gajnagarg
 

Recently uploaded (20)

TrafficWave Generator Will Instantly drive targeted and engaging traffic back...
TrafficWave Generator Will Instantly drive targeted and engaging traffic back...TrafficWave Generator Will Instantly drive targeted and engaging traffic back...
TrafficWave Generator Will Instantly drive targeted and engaging traffic back...
 
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
 
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
 
Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...
Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...
Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...
 
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book now
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book nowVadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book now
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book now
 
Top profile Call Girls In Nandurbar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Nandurbar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Nandurbar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Nandurbar [ 7014168258 ] Call Me For Genuine Models...
 
Dubai Call Girls Peeing O525547819 Call Girls Dubai
Dubai Call Girls Peeing O525547819 Call Girls DubaiDubai Call Girls Peeing O525547819 Call Girls Dubai
Dubai Call Girls Peeing O525547819 Call Girls Dubai
 
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
 
Digital Transformation Playbook by Graham Ware
Digital Transformation Playbook by Graham WareDigital Transformation Playbook by Graham Ware
Digital Transformation Playbook by Graham Ware
 
Top Call Girls in Balaghat 9332606886Call Girls Advance Cash On Delivery Ser...
Top Call Girls in Balaghat  9332606886Call Girls Advance Cash On Delivery Ser...Top Call Girls in Balaghat  9332606886Call Girls Advance Cash On Delivery Ser...
Top Call Girls in Balaghat 9332606886Call Girls Advance Cash On Delivery Ser...
 
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
 
Belur $ Female Escorts Service in Kolkata (Adult Only) 8005736733 Escort Serv...
Belur $ Female Escorts Service in Kolkata (Adult Only) 8005736733 Escort Serv...Belur $ Female Escorts Service in Kolkata (Adult Only) 8005736733 Escort Serv...
Belur $ Female Escorts Service in Kolkata (Adult Only) 8005736733 Escort Serv...
 
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
 
Abortion pills in Doha {{ QATAR }} +966572737505) Get Cytotec
Abortion pills in Doha {{ QATAR }} +966572737505) Get CytotecAbortion pills in Doha {{ QATAR }} +966572737505) Get Cytotec
Abortion pills in Doha {{ QATAR }} +966572737505) Get Cytotec
 
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
 
DATA SUMMIT 24 Building Real-Time Pipelines With FLaNK
DATA SUMMIT 24  Building Real-Time Pipelines With FLaNKDATA SUMMIT 24  Building Real-Time Pipelines With FLaNK
DATA SUMMIT 24 Building Real-Time Pipelines With FLaNK
 
Introduction to Statistics Presentation.pptx
Introduction to Statistics Presentation.pptxIntroduction to Statistics Presentation.pptx
Introduction to Statistics Presentation.pptx
 
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
 
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
 
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
 

Paper review: Information Security; Physical and Environmental Security Procedure

  • 1. P A P E R R E V I E W : I N F O R M A T I O N S E C U R I T Y ; P H Y S I C A L A N D E N V I R O N M E N T A L S E C U R I T Y P R O C E D U R E B y : L a m a A l - B a n y a n & I s r a a A l - N a m i I D : 2 1 6 0 0 9 7 8 0 I D : 2 1 6 0 1 5 3 7 1 King Faisal University School of Business Administration Management of Information System Department Information Systems Security course. Fall 2019.
  • 2. INTRODUCTION • The paper that we reviewed listed the needed procedures to be made to secure The Newcastle university’s information system physically and environmentally. Through this presentation we summarized the most important points for you to know and follow to secure your own information systems.
  • 3. PHYSICAL AND ENVIRONMENTAL SECURITY PROCEDURES • Secure Areas Objective: To prevent unauthorized physical access, damage and interference to the university’s information and assets. • Equipment Objective: To prevent loss, damage, theft of compromise of assets and interruption to the university’s operations.
  • 4. SECURE AREAS • Physical Security Perimeter - University information processing facilities must be protected by a physical security perimeter. Intruder detection system must be installed. • Physical Entry Controls - Manned reception and appropriate entry and authentication controls are needed to ensure only authorized personnel are allowed. While visitors must be escorted by authorized personnel. • Securing Offices, Rooms and Facilities - Controls to ensure security of information and information systems located in University offices, rooms and other facilities must be designed, applied and documented.
  • 5. SECURE AREAS • Protecting Against External and Environmental Threats – Information owners, managers, staff must incorporate physical security controls that protect against damage from fire, flood, earthquake, explosion, civil unrest and other forms of natural and man-made disasters. • Physical protection against malicious attacks or accidents must be designed and applied. • Working in secure areas– Information owners must inform the authorized personnel that: - Sensitive information cannot be discussed in non-secure area. - Sensitive information cannot be disclosed to unauthorized personnel. - Any recording device of any type is not allowed inside the secure area.
  • 6. SECURE AREAS • Delivery and loading areas – Access points such as reception, delivery and loading areas and other points where unauthorized persons may enter the premises must be controlled and, if possible, isolated from secure areas or offices to avoid unauthorized access.
  • 7. EQUIPMENT • Equipment siting and protection - Equipment must be protected to reduce the risks from unauthorized access, environmental threats and hazards. • Supporting utilities - Equipment must be protected from power supply interruption and other disruptions caused by failures in supporting utilities. They should be regularly inspected and to ensure their proper functioning and reduce the risk of malfunctioning or failure. • Cabling security - Power and telecommunications cabling carrying data or supporting information services must be protected from interception or damage. Cables and equipment be clearly marked to reduce handling errors.
  • 8. EQUIPMENT • Equipment maintenance - Equipment must be correctly maintained to help ensure availability and integrity of sensitive information and assets. Records must be kept of all suspected faults and all preventive and corrective maintenance. • Removal of assets - Information owners must establish a formal authorization process for the removal of assets for re-location, maintenance, disposal or any other purpose.
  • 9. EQUIPMENT • Security of equipment and assets off-premises – Information Owners must ensure that equipment used or stored off-site is safeguarded in accordance with the sensitivity of the information and the value of the assets. By encrypting sensitive data or using a logical or physical control mechanisms to protect against unauthorized access. • Secure disposal or re-use of equipment – Information owners must consider the sensitivity of information and the value of the assets when determining whether or not hardware or media will be re- used or destroyed. 1) Prior to re-use; The integrity of University records must be maintained by adhering to the Records Management policy. 2) In case of disposal; Storage media that will no longer be used in the University must be wiped by a method approved by the IT Security team, in compliance with the Asset Management Procedure.
  • 10. EQUIPMENT • Unattended user equipment - Users must ensure unattended equipment has appropriate protection by terminating the active session when finished and locking it with a password or other approved mechanism. • Clear desk and clear screen policy - Users must safeguard sensitive information from unauthorized access, loss, or By locking hard copy sensitive information or portable storage devices in a locked cabinet.