SlideShare a Scribd company logo
Physical Security
By: Christian Hudson
Overview
 Definition and importance
 Components
 Layers
 Physical Security Briefs
 Zones
 Implementation
Definition
 Physical security is the protection of
personnel, hardware, programs,
networks, and data from physical
circumstances and events that could
cause serious losses or damage to an
enterprise, agency, or institution. This
includes protection from fire, theft,
vandalism, natural disasters, and
terrorism.
Is physical security important?
 Significance is underestimated
 Breaches in action require no technical
background
 Accidents and natural disasters are
inevitable so preparation is necessary
Components
 Accidental and environmental
disasters
 Placing obstacles
 Idea is to confuse attacker,
delay serious ones, and
attempt to avoid the
inevitable
 Monitoring and notification
systems
 Security mechanisms to
monitor and detect potential
harm or violations
 Alarms, security lighting,
security guards or closed-
circuit television cameras
(CCTV)
Components (cont.)
 Recovery mechanisms
 To repel, catch or frustrate attackers
when an attack is detected
 Intrusion handling
Layers
 Environment Design
 First layer of physical
protection
 Consists of external
design void off
intruders
 May include objects like
barbed wire, warning
signs, fencing, metal
barriers, and site
lighting
Layers (cont.)
 Mechanical and
electronic access
control
 Prevents intruders
or unauthorized
users to direct
access to physical
components
 Includes gates,
doors and locks
Layers (cont.)
Layers (cont.)
 Monitoring system
 Less of a
preventative
measure
 Used more for
incident verification
and analysis
 Most common
mechanism is
CCTVs
Layers (cont.)
 Intrusion Detection
 Monitors for attacks
 Less of a preventative measure
 More of an response mechanism
 Alarms/Notification
Physical Security Briefs
 Security site brief
 Security policies used for the framework of
preventing the access to a physical setting
 Security design brief
 Security policies used for the layout or design for
a physical entity (may be coding, layout for
servers, access control, etc)
Zoning
 Public Zone
 Public has access to this area of a facility and its
surrounding
 Examples are facility grounds, elevator lobbies,
etc
 Reception Zone
 Zone which entail the transition from a public
zone to a restricted-access area of control
 Typically means where the contact of visitors
and a department is initiated
Zones (cont.)
 Operations Zone
 An area where access is limited to personnel
who work at facility and to escorted visitors
 Production floors and open office areas
 Security Zone
 An area to which access is limited to authorized
personnel and to authorized and escorted
visitors
 Area where secret information is
processed/stored
Layers (cont.)
 High Security Zone
 An area where access is limited to
authorized, appropriately screened
personnel and authorized and properly
escorted visitors
 A general example would be an area
where high-value assets are handled by
selected personnel
Implementation
 State the plan’s purpose
 Define the areas, buildings, and other
structures considered critical and
establish priorities for their protection
 Define and establish restrictions on
access and movement of critical areas
 Categorize restrictions
Questions?
References and Resources
 Bishop, Matt. Introduction to Computer Security.
Massachusetts: Pearson Education, Inc., 2005.
 http://64.233.167.104/search?q=cache:0xtkul7lJOgJ:www.tess
-
llc.com/Physical%2520Security%2520PolicyV4.pdf+physical+
security+policy&hl=en&ct=clnk&cd=1&gl=us
 http://en.wikipedia.org/wiki/Physical_Security
 http://www.rcmp-grc.gc.ca/tsb/pubs/phys_sec/g1-026_e.pdf
 http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci11
50976,00.html
 http://tldp.org/HOWTO/Security-HOWTO/physical-
security.html

More Related Content

What's hot

Cybersecurity risk management 101
Cybersecurity risk management 101Cybersecurity risk management 101
Cybersecurity risk management 101
Srinivasan Vanamali
 
Physical Security Domain
Physical Security DomainPhysical Security Domain
Physical Security Domain
amiable_indian
 
Physical Security
Physical SecurityPhysical Security
Physical Security
Kriscila Yumul
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
Tom Eston
 
CISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsCISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security Concepts
Karthikeyan Dhayalan
 
Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Security
leminhvuong
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
Wajahat Rajab
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
amiable_indian
 
CISSP - Chapter 3 - Physical security
CISSP - Chapter 3  - Physical securityCISSP - Chapter 3  - Physical security
CISSP - Chapter 3 - Physical security
Karthikeyan Dhayalan
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
jayashri kolekar
 
Security risk management
Security risk managementSecurity risk management
Security risk management
G Prachi
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principles
Divya Tiwari
 
7. physical sec
7. physical sec7. physical sec
7. physical sec
7wounders
 
Access control
Access controlAccess control
Access control
arj_presenter
 
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Dheeraj Kataria
 
Physical access control
Physical access controlPhysical access control
Physical access control
Ahsin Yousaf
 
Personnel security
Personnel securityPersonnel security
Information Security Policies and Standards
Information Security Policies and StandardsInformation Security Policies and Standards
Information Security Policies and Standards
Directorate of Information Security | Ditjen Aptika
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
vasanthimuniasamy
 
Introduction to SOC
Introduction to SOCIntroduction to SOC
Introduction to SOC
Boni Yeamin
 

What's hot (20)

Cybersecurity risk management 101
Cybersecurity risk management 101Cybersecurity risk management 101
Cybersecurity risk management 101
 
Physical Security Domain
Physical Security DomainPhysical Security Domain
Physical Security Domain
 
Physical Security
Physical SecurityPhysical Security
Physical Security
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
 
CISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsCISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security Concepts
 
Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Security
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
 
CISSP - Chapter 3 - Physical security
CISSP - Chapter 3  - Physical securityCISSP - Chapter 3  - Physical security
CISSP - Chapter 3 - Physical security
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principles
 
7. physical sec
7. physical sec7. physical sec
7. physical sec
 
Access control
Access controlAccess control
Access control
 
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
 
Physical access control
Physical access controlPhysical access control
Physical access control
 
Personnel security
Personnel securityPersonnel security
Personnel security
 
Information Security Policies and Standards
Information Security Policies and StandardsInformation Security Policies and Standards
Information Security Policies and Standards
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
Introduction to SOC
Introduction to SOCIntroduction to SOC
Introduction to SOC
 

Similar to Physical Security.ppt

Jupiter physical security ppt 2016 1
Jupiter physical security ppt 2016 1Jupiter physical security ppt 2016 1
Jupiter physical security ppt 2016 1
Maxpromotion
 
Jupiter physical security ppt 2016
Jupiter physical security ppt 2016Jupiter physical security ppt 2016
Jupiter physical security ppt 2016
Maxpromotion
 
Physical security.docx
Physical security.docxPhysical security.docx
Physical security.docx
MVNVKUMAR
 
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newJupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 new
Maxpromotion
 
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newJupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 new
Maxpromotion
 
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newJupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 new
Maxpromotion
 
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newJupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 new
Maxpromotion
 
Chapter008
Chapter008Chapter008
Chapter008
Jeanie Delos Arcos
 
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental ControlsPACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
Pace IT at Edmonds Community College
 
Types of Security in Industrial Security
Types of Security in Industrial SecurityTypes of Security in Industrial Security
Types of Security in Industrial Security
RJCubillo
 
Secure physical infrastructure
Secure physical infrastructureSecure physical infrastructure
Secure physical infrastructure
Pallavi Agarwal
 
Concept of physical protection and its principals
Concept of physical protection and its principalsConcept of physical protection and its principals
Concept of physical protection and its principals
Rasheed Abbasi
 
Network Security: Physical security
Network Security: Physical security Network Security: Physical security
Network Security: Physical security
lalithambiga kamaraj
 
SECURITY PLANNING DESIGN (SESSION 3).ppt
SECURITY PLANNING  DESIGN (SESSION 3).pptSECURITY PLANNING  DESIGN (SESSION 3).ppt
SECURITY PLANNING DESIGN (SESSION 3).ppt
Major K. Subramaniam Kmaravehlu
 
Physical security is a fundamental component of any secure infrastru.pdf
Physical security is a fundamental component of any secure infrastru.pdfPhysical security is a fundamental component of any secure infrastru.pdf
Physical security is a fundamental component of any secure infrastru.pdf
feelinggift
 
Perimeter Security: Explore the Importance of Security, Future Trends and Eme...
Perimeter Security: Explore the Importance of Security, Future Trends and Eme...Perimeter Security: Explore the Importance of Security, Future Trends and Eme...
Perimeter Security: Explore the Importance of Security, Future Trends and Eme...
GQ Research
 
4. Define communication security, information security, network secu.pdf
4. Define communication security, information security, network secu.pdf4. Define communication security, information security, network secu.pdf
4. Define communication security, information security, network secu.pdf
arvindarora20042013
 
Supplier security assessment questionnaire
Supplier security assessment questionnaireSupplier security assessment questionnaire
Supplier security assessment questionnaire
Priyanka Aash
 
ICT-security-Lesson-4.pdf
ICT-security-Lesson-4.pdfICT-security-Lesson-4.pdf
ICT-security-Lesson-4.pdf
asdfg hjkl
 
When  a traffic camera is installed in a designated community, d.docx
When  a traffic camera is installed in a designated community, d.docxWhen  a traffic camera is installed in a designated community, d.docx
When  a traffic camera is installed in a designated community, d.docx
jolleybendicty
 

Similar to Physical Security.ppt (20)

Jupiter physical security ppt 2016 1
Jupiter physical security ppt 2016 1Jupiter physical security ppt 2016 1
Jupiter physical security ppt 2016 1
 
Jupiter physical security ppt 2016
Jupiter physical security ppt 2016Jupiter physical security ppt 2016
Jupiter physical security ppt 2016
 
Physical security.docx
Physical security.docxPhysical security.docx
Physical security.docx
 
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newJupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 new
 
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newJupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 new
 
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newJupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 new
 
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newJupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 new
 
Chapter008
Chapter008Chapter008
Chapter008
 
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental ControlsPACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
 
Types of Security in Industrial Security
Types of Security in Industrial SecurityTypes of Security in Industrial Security
Types of Security in Industrial Security
 
Secure physical infrastructure
Secure physical infrastructureSecure physical infrastructure
Secure physical infrastructure
 
Concept of physical protection and its principals
Concept of physical protection and its principalsConcept of physical protection and its principals
Concept of physical protection and its principals
 
Network Security: Physical security
Network Security: Physical security Network Security: Physical security
Network Security: Physical security
 
SECURITY PLANNING DESIGN (SESSION 3).ppt
SECURITY PLANNING  DESIGN (SESSION 3).pptSECURITY PLANNING  DESIGN (SESSION 3).ppt
SECURITY PLANNING DESIGN (SESSION 3).ppt
 
Physical security is a fundamental component of any secure infrastru.pdf
Physical security is a fundamental component of any secure infrastru.pdfPhysical security is a fundamental component of any secure infrastru.pdf
Physical security is a fundamental component of any secure infrastru.pdf
 
Perimeter Security: Explore the Importance of Security, Future Trends and Eme...
Perimeter Security: Explore the Importance of Security, Future Trends and Eme...Perimeter Security: Explore the Importance of Security, Future Trends and Eme...
Perimeter Security: Explore the Importance of Security, Future Trends and Eme...
 
4. Define communication security, information security, network secu.pdf
4. Define communication security, information security, network secu.pdf4. Define communication security, information security, network secu.pdf
4. Define communication security, information security, network secu.pdf
 
Supplier security assessment questionnaire
Supplier security assessment questionnaireSupplier security assessment questionnaire
Supplier security assessment questionnaire
 
ICT-security-Lesson-4.pdf
ICT-security-Lesson-4.pdfICT-security-Lesson-4.pdf
ICT-security-Lesson-4.pdf
 
When  a traffic camera is installed in a designated community, d.docx
When  a traffic camera is installed in a designated community, d.docxWhen  a traffic camera is installed in a designated community, d.docx
When  a traffic camera is installed in a designated community, d.docx
 

Recently uploaded

GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
Sease
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
Fwdays
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
DianaGray10
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 

Recently uploaded (20)

GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 

Physical Security.ppt

  • 2. Overview  Definition and importance  Components  Layers  Physical Security Briefs  Zones  Implementation
  • 3. Definition  Physical security is the protection of personnel, hardware, programs, networks, and data from physical circumstances and events that could cause serious losses or damage to an enterprise, agency, or institution. This includes protection from fire, theft, vandalism, natural disasters, and terrorism.
  • 4. Is physical security important?  Significance is underestimated  Breaches in action require no technical background  Accidents and natural disasters are inevitable so preparation is necessary
  • 5. Components  Accidental and environmental disasters  Placing obstacles  Idea is to confuse attacker, delay serious ones, and attempt to avoid the inevitable  Monitoring and notification systems  Security mechanisms to monitor and detect potential harm or violations  Alarms, security lighting, security guards or closed- circuit television cameras (CCTV)
  • 6. Components (cont.)  Recovery mechanisms  To repel, catch or frustrate attackers when an attack is detected  Intrusion handling
  • 7. Layers  Environment Design  First layer of physical protection  Consists of external design void off intruders  May include objects like barbed wire, warning signs, fencing, metal barriers, and site lighting
  • 8. Layers (cont.)  Mechanical and electronic access control  Prevents intruders or unauthorized users to direct access to physical components  Includes gates, doors and locks
  • 10. Layers (cont.)  Monitoring system  Less of a preventative measure  Used more for incident verification and analysis  Most common mechanism is CCTVs
  • 11. Layers (cont.)  Intrusion Detection  Monitors for attacks  Less of a preventative measure  More of an response mechanism  Alarms/Notification
  • 12. Physical Security Briefs  Security site brief  Security policies used for the framework of preventing the access to a physical setting  Security design brief  Security policies used for the layout or design for a physical entity (may be coding, layout for servers, access control, etc)
  • 13. Zoning  Public Zone  Public has access to this area of a facility and its surrounding  Examples are facility grounds, elevator lobbies, etc  Reception Zone  Zone which entail the transition from a public zone to a restricted-access area of control  Typically means where the contact of visitors and a department is initiated
  • 14. Zones (cont.)  Operations Zone  An area where access is limited to personnel who work at facility and to escorted visitors  Production floors and open office areas  Security Zone  An area to which access is limited to authorized personnel and to authorized and escorted visitors  Area where secret information is processed/stored
  • 15. Layers (cont.)  High Security Zone  An area where access is limited to authorized, appropriately screened personnel and authorized and properly escorted visitors  A general example would be an area where high-value assets are handled by selected personnel
  • 16. Implementation  State the plan’s purpose  Define the areas, buildings, and other structures considered critical and establish priorities for their protection  Define and establish restrictions on access and movement of critical areas  Categorize restrictions
  • 18. References and Resources  Bishop, Matt. Introduction to Computer Security. Massachusetts: Pearson Education, Inc., 2005.  http://64.233.167.104/search?q=cache:0xtkul7lJOgJ:www.tess - llc.com/Physical%2520Security%2520PolicyV4.pdf+physical+ security+policy&hl=en&ct=clnk&cd=1&gl=us  http://en.wikipedia.org/wiki/Physical_Security  http://www.rcmp-grc.gc.ca/tsb/pubs/phys_sec/g1-026_e.pdf  http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci11 50976,00.html  http://tldp.org/HOWTO/Security-HOWTO/physical- security.html