SlideShare a Scribd company logo
1 of 84
copyright, Dr. C.T. Johnson, Capitol
College
1
PHYSICAL SECURITY
INTRODUCTION
Dr. Craig T. Johnson
Professor
copyright, Dr. C.T. Johnson, Capitol
College
2
Today’s Discussion Topics
• Principles of basic
physical security
• Establishing the baseline
• Defining what is security
and how to protect assets
• Review the Khobar
Towers case study
copyright, Dr. C.T. Johnson, Capitol
College
3
TYPES OF SECURITY
• PHYSICAL • PROCEDURAL
• PERSONNEL • CONSTRUCTION
• TECHNICAL • TRANSPORTATION
• INFORMATION
copyright, Dr. C.T. Johnson, Capitol
College
4
OUR FOCUS WILL BE…
PHYSICAL SECURITY
copyright, Dr. C.T. Johnson, Capitol
College
5
BASIC PHYSICAL
SECURITY
“That part of security concerned with physical
measures designed to safeguard personnel; to
prevent unauthorized access to equipment,
installations, material, and documents; and to
safeguard against espionage, sabotage, damage,
and theft.”
US Army Field Manual 3-19.30
Physical Security
Brought to you by the US Army, the sweetest smelling army in the world!
copyright, Dr. C.T. Johnson, Capitol
College
6
BASIC PHYSICAL
SECURITY
• Definition: “A means of preventing
unauthorized entry of persons into a
premises, and the prevention of loss due to
all kinds of crime associated with
uncontrolled access.”
copyright, Dr. C.T. Johnson, Capitol
College
7
TYPES OF SECURITY
AREAS
• PRINCIPLES OF SAFEGUARDING
• CRITICAL & RESTRICTED AREAS
• SECURITY- CONTROLLED AREAS
copyright, Dr. C.T. Johnson, Capitol
College
8
TYPES OF SECURITY
AREAS
(DEFINED) - I
• Principles of Safeguarding
– Guarding against force or surreptitious entry
– Protecting material, equipment or information
– Protecting classified areas
– Protecting unclassified areas
copyright, Dr. C.T. Johnson, Capitol
College
9
TYPES OF SECURITY
AREAS
(Defined) - II
• Critical & Restricted Areas
– Degree of Criticality
– Degree of Restricted Area
copyright, Dr. C.T. Johnson, Capitol
College
10
TYPES OF SECURITY
AREAS
(Defined) - III
• Security – Controlled Areas
– Exclusion Areas
– Limited Areas
– Control Areas
copyright, Dr. C.T. Johnson, Capitol
College
11
PHYSICAL SECURITY
Terms, History, Risk
IAE-684 “COMPLEMENTARY SECURITY”
copyright, Dr. C.T. Johnson, Capitol
College
12
HISTORICAL
EXAMPLES
• Vassal states’ walls joined
during Qin Dynasty
creating “10,000 li (5k km)
Great Wall”
– Built to hold off Hsiung Nu
tribes (Huns)
• Denial and avoidance
security
– Kept invaders out for 1,000
years
– Eventually overcome from
within
• http://ce.eng.usf.edu/pharos/wonders/Forgotten/greatwall.html
• http://www.enchantedlearning.com/subjects/greatwall/
• http://www.jpl.nasa.gov/radar/sircxsar/gwall.html
copyright, Dr. C.T. Johnson, Capitol
College
13
HISTORICAL
EXAMPLES
• THE “GREAT WALL OF
CHINA”, EMPEROR
CHINN OF CHINA BUILT
THE “GREAT WALL” TO
GUARD AGAINST THE
BARBARIANS FROM THE
NORTH.
• DENIAL AND
AVOIDANCE SECURITY
copyright, Dr. C.T. Johnson, Capitol
College
14
HISTORICAL
EXAMPLES
• World’s first bank vaults
• Access control & asset
protection
– Assured ascension of
deceased to the gods
• Security modernization
project underway
– Night vision CCTV cameras
copyright, Dr. C.T. Johnson, Capitol
College
15
HISTORICAL
EXAMPLES
• Mesa Verde (“green table”)
in Colorado, occupied 600-
1300 A.D.
• Center of San Juan Anasazi
(Pueblo) culture
• Cliff dwellings with ladders
for access control
– Defense Theory
– Internal strife due to drought?
• Difficult access with natural
obstacles
• http://www.nps.gov/meve/mvnp/smvf/p50.htm
• http://www.nps.gov/meve/index.htm
• http://www.abqjournal.com/venue/travel/heritage_mesaverd
e.htm
copyright, Dr. C.T. Johnson, Capitol
College
16
HISTORICAL
EXAMPLES
• Masada (“fortress”),
built by Rome-
appointed King
Herod
• Captured during
Revolt of the Jews
– Held 2 years
– Last stronghold of
Jews
• http://www.mfa.gov.il/mfa/go.asp?MFAH0dp00
• http://faculty.smu.edu/dbinder/masada.html
copyright, Dr. C.T. Johnson, Capitol
College
17
HISTORICAL
EXAMPLES - cont
• “MASADA” OF ISRAEL; KING
HERODS FORTRESS ON THE RED SEA
WAS CAPTURED BY JEWISH ZEALOTS
AND HELD TWO YEARS AGAINST
THREE ROMAN LEGIONS
copyright, Dr. C.T. Johnson, Capitol
College
18
What is Risk Management?
The process of selecting and
implementing security
countermeasures to achieve an
acceptable level of risk at an
acceptable cost
copyright, Dr. C.T. Johnson, Capitol
College
19
What is Risk?
Risk level is a combination of two factors:
 Impact of loss -The value placed on an
asset by its owner and the consequence
of an undesirable event on that asset.
 Probability of undesirable event -The
likelihood that a specific vulnerability will
be exploited by a
particular threat.
Risk is the potential for
damage or loss of an asset
copyright, Dr. C.T. Johnson, Capitol
College
20
What is an Asset?
The asset may have value to an adversary,
as well as to the owner, although the
values may differ.
An asset is anything of value:
 people
 information
 equipment
 facilities
 activities/operations
copyright, Dr. C.T. Johnson, Capitol
College
21
What is Impact?
Impact is the amount of loss or
damage that can be expected,
or may be expected, from a
successful attack on an asset.
copyright, Dr. C.T. Johnson, Capitol
College
22
What is Threat?
 Threat can also be defined as the intention to
undertake actions detrimental to assets
Threat is any indication, circumstance, or
event with the potential to cause the loss of
or damage to an asset.
copyright, Dr. C.T. Johnson, Capitol
College
23
What is an Adversary?
 Intelligence services, extremists, terrorists,
criminals, and private interests groups
Any individual, group, organization, or
government that conduces activities,
or has the intention and capability to conduce
activities detrimental to valued assets
copyright, Dr. C.T. Johnson, Capitol
College
24
Vulnerabilities
 Vulnerabilities can result from, but are not limited to, the
following:
 building characteristics
 equipment properties
 personal behavior
 locations of people, equipment, and buildings
 operational procedures and personnel practices
Vulnerabilities - Any weakness that
can be exploited by an adversary to
gain access to an asset
copyright, Dr. C.T. Johnson, Capitol
College
25
RISK
“1. Hazard; danger; peril; exposure to loss, injury, or destruction.”
Webster’s 1913 Dictionary
http://www.hyperdictionary.com/dictionary/risk
“The potential for realization of unwanted, adverse consequences to human
life, health, property, or the environment; estimation of risk is usually based
on the expected value of the conditional probability of the event occurring
times the consequence of the event given that it has occurred.”
Society for Risk Analysis
http://www.sra.org/gloss3.htm#R
 The probability of loss
 Factor of threat and vulnerability
(Risk=Threat x Vulnerability)
copyright, Dr. C.T. Johnson, Capitol
College
26
RISK ANALYSIS
• Risk analysis must be a constant,
comprehensive, integrated function of the
security organization
“A detailed examination including risk assessment, risk
evaluation, and risk management alternatives, performed to
understand the nature of unwanted, negative consequences to
human life, health, property, or the environment; an analytical
process to provide information regarding undesirable events; the
process of quantification of the probabilities and expected
consequences for identified risks.”
Society for Risk Analysis
http://www.sra.org/gloss3.htm#R
copyright, Dr. C.T. Johnson, Capitol
College
27
RISK ANALYSIS
WILL LOSS OCCUR?
WEAKNESS IN PERSONNEL
PROCEDURES OF PHYSICAL
PLANT
PERPETRATER
RISK
GAIN
copyright, Dr. C.T. Johnson, Capitol
College
28
RISK vs. GAIN
EQUATION
• The rational human threat can be deterred
by countermeasures or a lack of
vulnerability
• Personal risk for the bad guy
– Capture  Physical harm
Low risk
+ High gain
low hanging fruit
High risk
+ High or low gain
go next door
copyright, Dr. C.T. Johnson, Capitol
College
29
RISK
MANAGEMENT
Four basic steps:
1. Asset identification
2. Threat/Vulnerability Assessment
3. Risk Analysis
4. Countermeasure evaluation/implementation
The process is iterative!
copyright, Dr. C.T. Johnson, Capitol
College
30
Risk Management at a Glance
Assess
Assets
1
Assess
Threats
2
Assess
Vulnerabilities
3
Assess
Risks
4
Determine
Countermeasure
Options
5
Make RM
Decisions
Benefits Analysis
Cost Analysis
Monitor
Implement
T & E
copyright, Dr. C.T. Johnson, Capitol
College
31
Relationship of Risk Management Practices
to Achieving Benefits
Critical Success Factors
1. Senior management support & involvement
2. Focal points
3. Define procedures
4. Experts involved
Process
1. Identify & rank critical assets
and operations & estimate
potential damage of loss
2. Identify threats & likelihood of
threats materializing
3. Identify exploitable
vulnerabilities
4. Determine Risk
5. Identify cost effective mitigating
countermeasures
6. Obtain risk management
decisions
7. Develop/Implement action plans
8. Test/Evaluate countermeasures
9. Monitor changes in risk
factors/repeat process
Tools
1. Tables/Matrices
2. Questionnaires
3. Standard formats
4. Software to facilitate
documentation and analysis
5. Lists of threats, controls,
vulnerabilities
Benefits
1. Assurance that the greatest risks have
been identified and addressed
2. Increased understanding of risks
3. Mechanism for reaching consensus
4. Support for needed controls
5. Means for communicating results
5. Units responsible
6. Assessment scope limited
7. Document & maintain results
copyright, Dr. C.T. Johnson, Capitol
College
32
Critical Success
Factors
1. Senior management support & involvement
2. Focal points
3. Define procedures
4. Experts involved
5. Units responsible
6. Assessment scope limited
7. Document & maintain results
copyright, Dr. C.T. Johnson, Capitol
College
33
Process
1. Identify & rank critical assets
and operations & estimate potential damage of loss
2. Identify threats & likelihood of threats materializing
3. Identify exploitable vulnerabilities
4. Determine Risk
5. Identify cost effective mitigating countermeasures
6. Obtain risk management decisions
7. Develop/Implement action plans
8. Test/Evaluate countermeasures
9. Monitor changes in risk factors/repeat process
copyright, Dr. C.T. Johnson, Capitol
College
34
Tools
1. Tables/Matrices
2. Questionnaires
3. Standard formats
4. Software to facilitate documentation
and analysis
5. Lists of threats, controls,
vulnerabilities
copyright, Dr. C.T. Johnson, Capitol
College
35
Benefits
1. Assurance that the greatest risks have
been identified and addressed
2. Increased understanding of risks
3. Mechanism for reaching consensus
4. Support for needed controls
5. Means for communicating results
copyright, Dr. C.T. Johnson, Capitol
College
36
THREAT
Defined
• A force or event that could cause loss
– Environmental/natural
• Acts of God (or some higher power)
• Weather
– Human
• Unintentional (error)
• Intentional (penetration, theft, espionage)
copyright, Dr. C.T. Johnson, Capitol
College
37
THREAT
• Environment can cause as great or greater
loss than humans but are more predictable
• Human threats present the greatest
challenge to the security professional
– If threat is rational, deterrence is possible
– No countermeasure will deter an irrational
human
“It is unlikely that measures can be devised that can
eliminate entirely the multitude of diverse dangers that may
arise, particularly when the President is traveling…”
Warren Commission Report, 1964
copyright, Dr. C.T. Johnson, Capitol
College
38
THREAT
(DEFINED)
• AN OUTSIDE FORCE THAT COULD
CAUSE A LOSS TO THE ORGANIZATION.
THE THREAT CAN BE NATURAL AS IN A
HURRICANE OR EARTHQUAKE OR IT
MAY BE HUMAN SUCH AS A BURGLAR
OR TERRORIST.
copyright, Dr. C.T. Johnson, Capitol
College
39
THREAT
(DEFINED – II)
• ENVIRONMENTAL THREATS ARE THOSE
NATURAL OCCURING EVENTS THAT ARE
INHERENT WITH THE GEOGRAPHICAL
LOCATION, WEATHER CONDITIONS OR
SIMPLY “GOD’S WILL”.
• THESE ENVIRONMENTAL THREATS CAN
CAUSE AS GREAT A LOSS AS A HUMAN
HOWEVER, THEY ARE MUCH MORE
PREDICTABLE.
copyright, Dr. C.T. Johnson, Capitol
College
40
THREAT
(DEFINED – III)
• HUMAN THREATS PRESENT THE GREATEST
CHALLENGE TO THE SECURITY PROFESSIONAL. IF
THE HUMAN THREAT IS EXPECTED TO BE A
RATIONAL THINKING PERSON THEN THE THREAT
CAN BE DETERRED.
• HUMAN IS NOT RATIONAL NO COUNTERMEASURE
WILL DETER THE INDIVIDUAL
copyright, Dr. C.T. Johnson, Capitol
College
41
BASIC PHYSICAL
SECURITY
PROTESTORS
MOTHER
NATURE
DISGRUNTLED
EMPLOYEE
THEFT
TERRORIST
FIRE
CRIMINALS
copyright, Dr. C.T. Johnson, Capitol
College
42
THE THREE “D’S”
Modern Security programs
are predicated on a theory
of controlling access to
valuables by employing
countermeasures that
will:
– DETER
– DELAY
– DETECT
copyright, Dr. C.T. Johnson, Capitol
College
43
THE THREE “D’S”
• Deterrence:
– Creating the appearance that the Risk of Entry would be
greater than the personal gain.
• Delay:
– Slowing access through the use of Physical barriers
• Detection:
– The ability of the protector to Detect an attempted or
actual entry into a protected area.
copyright, Dr. C.T. Johnson, Capitol
College
44
DETERRENCE – I
Historical perspective
• Creating the appearance
that the risk of entry would
be higher then the possible
gain.
• A deterrent does not have
to be real to be effective!
copyright, Dr. C.T. Johnson, Capitol
College
45
DELAY – II
Historical perspective
• Preventing or slowing
access through the use of
physical barriers.
• Most often used method
for security
• Historically, moats, sentry
towers & castles were
used
• Modern systems call for
fences, walls and bollards.
copyright, Dr. C.T. Johnson, Capitol
College
46
DETECTION - III
• The ability of the protector
to detect or sense an
attempted or actual entry
into the protected area.
• Detection systems do not
physical stop the intrusion!
• A response is critical to
prevent loss of valuables
Impact or Risk
Threat or Vulnerability
Suggested Scales
Low Medium High Critical
Range 1-3 4-13 14-49 50-100
Mid-
point
2 5 25 71
Low Medium High Critical
Range .01-.24 .25-.49 .50-.74 .75-1.00
Mid-
point
.12 .37 .62 .87
copyright, Dr. C.T. Johnson, Capitol
College
48
The Rating by Definition
I & R .T & .V
50-100
14-49
4-13
1-3
.75-1.00
.50-.74
.25-.49
.01-.24
With the scales being so big or wide, it would be hard for you to assign a
number to the rating if you did not use the degree of rating like H/C
copyright, Dr. C.T. Johnson, Capitol
College
49
The Degrees of Impact
Criticality
Degree
High
Medium
Low
H/C
High
Medium
Low
High
Medium
Low
L
M/M
L/H
Low is low enough
The value of low is only
three numbers 1-3 for
Impact and Risk
copyright, Dr. C.T. Johnson, Capitol
College
50
The Degrees of
Threat & Vulnerability
Criticality
Degree
High
Medium
Low
H/C
High
Medium
Low
High
Medium
Low
M/L
M/M
L/H
High
Medium
Low
copyright, Dr. C.T. Johnson, Capitol
College
51
Bottom Line
When using the degrees with the rating,
assignment of numbers becomes much easier. Using
this method will allow for repeatable and consistent
our assessments. This method also builds
creditability with others that must be convince with
the analysis
Always obtain consciences on your definitions
and ensure you are assigning the the ratings
correctly.
copyright, Dr. C.T. Johnson, Capitol
College
52
WHERE ARE MY VULNERABILITIES?
How do we define them???
copyright, Dr. C.T. Johnson, Capitol
College
53
VULNERABILITY
(DEFINED)
“…IS DEFINED AS THE STRENGTH
OR WEAKNESS OF DEFENSE.”
copyright, Dr. C.T. Johnson, Capitol
College
54
IDENTIFY ADVERSARY
THREATS
• Lessons learned from past adversaries
• Determine adversary pathways to your
assets
• Use the asymmetrical perspective by view
your assets through the eyes of your
adversary.
copyright, Dr. C.T. Johnson, Capitol
College
55
Security Breaches at the
Los Alamos Lab
Presented by
Former student
Mr. Albert Reel
2006
copyright, Dr. C.T. Johnson, Capitol
College
56
History of Los Alamos
• Los Alamos Lab was created in 1943 in the
middle of World War II
• Manhattan Project
– Fat Man
– Little Boy
• July 16, 1945 First Atomic Bomb was
detonated.
copyright, Dr. C.T. Johnson, Capitol
College
57
Past Espionage
• During World War II there were three
known individuals that engaged in
Espionage Efforts at the Los Alamos Lab
– Klaus Fuchs
– Theodore Hall
– David Greenglass
copyright, Dr. C.T. Johnson, Capitol
College
58
Klaus Fuchs
• German Expatriate and Emigrated to the
United Kingdom to escape Nazis
• He worked on Implosion Problems in Los
Alamos
• Delivered sketches of Fat Man to the Soviet
Union
• Spent 14 Years in Wormwood Scrubbs
Prison
copyright, Dr. C.T. Johnson, Capitol
College
59
Theodore Hall
• Graduated From Harvard at the age of 18
• On vacation walked into the Soviet
Embassy to volunteer to work for the
Russians
• Never arrested by the FBI
• Little is known or what information he gave
to Soviet Union
copyright, Dr. C.T. Johnson, Capitol
College
60
David Greenglass
• US Army enlisted personnel trained as a
machinist
• Brother of Ethel Rosenberg
• Rosenberg’s recruited David to become part
of their espionage ring
• Supplied Soviets with drawings of parts to
Fat Boy
copyright, Dr. C.T. Johnson, Capitol
College
61
Security Lapses
• Wen Ho Lee
– Held Q clearance which granted him access to
Top Secret information
– Between 1980 and December 23, 1998
– First thought to be spying for the People’s
Republic of China
– Charged 59 counts for Mishandling Classified
Information
– Release from Jail in 2000
copyright, Dr. C.T. Johnson, Capitol
College
62
Security Lapses
• In 2000 FBI investigate missing hard drives
• Drives belonged to the Alamos Nuclear
Emergency Research Team
• Found days later behind a copy machine
copyright, Dr. C.T. Johnson, Capitol
College
63
Security Lapses
• 2004 the Los Alamos Lab was shut down after an
inventory showed they were missing two
computer disk containing nuclear secrets
discovered missing
• Sloppy inventory controls were blamed as the
culprit as it was determined that no disks missing
• Following this incident, that Lab instituted a 5
year program to migrate to an environment
without the use of computer disks
copyright, Dr. C.T. Johnson, Capitol
College
64
Security Lapses
• Jessica Lynn Quintana
– During a methamphetamines laboratory drug bust by
law enforcement, officials in New Mexico found Top
Secret documents from the National Laboratory
– Over 1000 pages of classified documents were
discovered
– Suspect removed classified documents, computer
hardware from vault type rooms
– In 2006, Quintana plead guilty to knowingly removing
documents
copyright, Dr. C.T. Johnson, Capitol
College
65
Conclusion
• National security breeches such as these can
greatly harm the United States
• All aspects of security are important
– These systems weren’t “hacked”
– Careless errors and gross incompetence reasons
for security lapses
• Everyone must be security conscience
copyright, Dr. C.T. Johnson, Capitol
College
66
PROVOCATIVE QUESTION
How do we stop the threat???
copyright, Dr. C.T. Johnson, Capitol
College
67
PHYSICAL SECURITY – III
(EXECUTION)
CONCENTRIC CIRCLES
copyright, Dr. C.T. Johnson, Capitol
College
68
BASIC PHYSICAL
SECURITY - THEORY
• ANY COUNTERMEASURE CREATED BY
MAN CAN BE DEFEATED
• MULTIPLE LAYERS OF DIFFERENT TYPES
OF COUNTERMEASURES ARE THE MOST
EFFECTIVE
• NUMBER AND TYPES OF LAYERS ARE
FLEXIBLE ACCORDING TO THREAT TO THE
VALUABLES
• A GOOD “RISK ASSESSMENT” IS CRITICAL
copyright, Dr. C.T. Johnson, Capitol
College
69
BASIC PRINCIPLES
TYPES OF “LAYERS”
• THE “RINGS” OR “LAYERS” ARE THE
“DEFENSE IN DEPTH” COUNTERMEASURES
WITH EACH RING COMPLEMENT THE OTHER
• FOR EXAMPLE, VIBRATION SENSORS ON
FENCES OR WALLS WILL DELAY & DETECT
• KNOWLEDGE OF SUCH SENSORS CAN
DETER INTRUDERS AND ADD VALUE TO
SYSTEM
copyright, Dr. C.T. Johnson, Capitol
College
70
HISTORICAL
IMPLICATIONS
• PROTECTION WAS FIRST
CONSIDERATION FOR ANCIENTS
• WALLS AND BARRIERS MEANT
SECURITY & PROTECTION
• SAVEHAVENS AND SECURED
AREAS WERE IMPORTANT
• GUARD AGAINST THE EXTERNAL
ENEMIES OUTSIDE THE CITIES
copyright, Dr. C.T. Johnson, Capitol
College
71
DEPLOYING
COUNTER-MEASURES
PASSIVE & ACTIVE SENSORS SECURITY PERSONNEL
copyright, Dr. C.T. Johnson, Capitol
College
72
After Countermeasures!
To find out the benefit in Risk reduction
• Go back to your Vulnerability rating
• Look at your new CM’s
• Re-evaluate the Vulnerability
• Look at the definitions again
• The Rating should be REDUCED
• Mark the new Vulnerability Rating and Value
• Go back, do the math again for that line
• Impact x Threat x New Vulnerability Value = New Risk
• You should now have a new Risk Value
– The NEW Risk Value should be lower
• Convert NEW Risk Value to Linguistic Rating
You should have lowered your Risk for that single event line.
copyright, Dr. C.T. Johnson, Capitol
College
73
PHYSICAL SECURITY
DEPLOYMENT
CONCENTRIC RINGS
Five Rings
ASSETS
copyright, Dr. C.T. Johnson, Capitol
College
74
Perimeter Zone
Base Camp
Warfighter Zone
Tactical Zone
Detection Zone
Intelligence Zone
Warning
Detection
Assessment
Delay/Denial
Response
Investigation/Follow-up
C2
The Force Protection
World Tactical View
copyright, Dr. C.T. Johnson, Capitol
College
75
Integrated Command
and Control
Civil/Facility
Engineers
Security
Force
Investigative
Services
Intelligence
Communi-
cations -
Electronics
Medical Logistics
Force Protection
Situation Awareness
Command and Control Capability
Counter
Intelligence
Sources
Special
Systems
Organic
Sensors
Camera fence
Installation
Security
Systems
Intelligence
Sources
Surveillance
Sources
Reconnaissance
Sources
Allied/Coalition
Host Country
Sources
“Force Protection
Integrated Information Infrastructure”
Functions
Sources
Responses
A Systems Approach to Security Decision Making
Key Terms & Definitions
Analytical Risk Management
copyright, Dr. C.T. Johnson, Capitol
College
77
What is a Risk Assessment?
 Establishes the basis for countermeasure
recommendations
The process of evaluating threat
to and vulnerabilities of an asset to
give an expert opinion on the probability
of loss or damage and its impact
I x (.T x .V) = R
copyright, Dr. C.T. Johnson, Capitol
College
78
What is a Countermeasure?
 Countermeasure costs may be monetary, but
also non-monetary (e.g., reduced operational
effectiveness, adverse publicity, poor working
conditions, political consequences)
* May also affect threat and/or impact
A countermeasure is an action taken or
a physical entity principally* used to
reduce or eliminate one or
more vulnerabilities.
copyright, Dr. C.T. Johnson, Capitol
College
79
What is a Cost-Benefit Analysis?
Part of the Risk Management decision-making
process in which the costs and benefits of each
alternative are compared and the most appropriate
alternative is selected
 Minimize cost
 Maximize risk reduction
Discussion of Key Terms &
Definitions
Questions & Comments
copyright, Dr. C.T. Johnson, Capitol
College
81
DEBRIEFING OF
KhOBAR TOWERS CASE
STUDY
• How might the terrorist acts been
mitigated?
• How should responsibility be allocated?
• What’s your recommendation re BG
Schwalier?
• Lessons learned that can relate to IT
INFOSEC catastrophic events?
copyright, Dr. C.T. Johnson, Capitol
College
82
References
Harris, S. (2005). CISSP Exam Guide (3rd ed.), Emeryville,
CA: McGraw-Hill/Osborne
Miller, L. & Gregory, P. (2002). CISSP for Dummies,
Hoboken, NJ: Wiley Publishing, Inc.
Pfleeger, C., & Pfleeger, S. (2003). Security in Computing
(3rd ed.), Upper Saddle River, NJ: Prentice Hall
Professional Technical Reference.
Russell, D, & Gangemi, G.T. (1991). Computer Security
Basics, Sebastopol, CA: O’Reilly & Associates.
Tung, B. (2006). The Moron's Guide to Kerberos, Version 2.0.
Retrieved November 9, 2006 from
http://www.isi.edu/~brian/security/kerberos.html
copyright, Dr. C.T. Johnson, Capitol
College
83
References
• Thomas, Ryan and Cook (May 15, 2007) Guilty Plea in
Los Alamos Security Breach abc NEWS
http://abcnews.go.com/TheLaw/story?id=3177289
• Associated Press (October 25, 2006) Classified document
found in drug raid USA Today
http://www.usatoday.com/news/nation/2006-10-24-los-
alamos-documents_x.htm
• Associated Press (October 25, 2006) New Details Emerge
in Los Alamos Case CBS NEWS
http://www.cbsnews.com/stories/2006/10/24/national/main
2122004.shtml
copyright, Dr. C.T. Johnson, Capitol
College
84
References
• www.ietf.org/html.charters/cat-charter.html
• www.nrl.navy.mil/CCS/people/kerberos-faq.html
• www.mit.edu/afs/athena.mit.edu/astaff/project/ker
beros/www/papers.html
• “A History of National Security” Los Alamos National
Laboratory http://www.lanl.gov/history/index.shtml
(March 20, 2008)

More Related Content

Similar to Physical_Security_Historical_perspective.ppt

Ethical Aspects of Science and Technology
Ethical Aspects of Science and TechnologyEthical Aspects of Science and Technology
Ethical Aspects of Science and TechnologySushmita Mae Leones
 
Terrorist related hazardsassignment2 jarodbleibdrey
Terrorist related hazardsassignment2 jarodbleibdreyTerrorist related hazardsassignment2 jarodbleibdrey
Terrorist related hazardsassignment2 jarodbleibdreyjbleibdrey
 
6RussBowman_NICHI_BusinessSummit
6RussBowman_NICHI_BusinessSummit6RussBowman_NICHI_BusinessSummit
6RussBowman_NICHI_BusinessSummitNICHI_USA
 
Week 6 GuidancePsychological ResearchThere are many ways to co
Week 6 GuidancePsychological ResearchThere are many ways to coWeek 6 GuidancePsychological ResearchThere are many ways to co
Week 6 GuidancePsychological ResearchThere are many ways to coladonnacamplin
 
Synthetic Biology beyond the bench: Biosafety & biosecurity
Synthetic Biology beyond the bench: Biosafety & biosecuritySynthetic Biology beyond the bench: Biosafety & biosecurity
Synthetic Biology beyond the bench: Biosafety & biosecurityDrew Endy
 
Thesis (J. Kyle Treman)
Thesis (J. Kyle Treman)Thesis (J. Kyle Treman)
Thesis (J. Kyle Treman)J. Kyle Treman
 
In defense of posthuman dignity. Nick Bostrom (2005).
In defense of posthuman dignity. Nick Bostrom (2005).In defense of posthuman dignity. Nick Bostrom (2005).
In defense of posthuman dignity. Nick Bostrom (2005).Jorge Pacheco
 
Windows of Opportunity in Hallways of Distractions: the race between threats,...
Windows of Opportunity in Hallways of Distractions: the race between threats,...Windows of Opportunity in Hallways of Distractions: the race between threats,...
Windows of Opportunity in Hallways of Distractions: the race between threats,...Curtis A. Carver Jr.
 
Article Detail 3 - Domestic Preparedness
Article Detail 3 - Domestic PreparednessArticle Detail 3 - Domestic Preparedness
Article Detail 3 - Domestic PreparednessDiana Hopkins
 
Disaster Management Introduction & Classification
Disaster Management Introduction & ClassificationDisaster Management Introduction & Classification
Disaster Management Introduction & ClassificationDhruv Saxena
 
Disaster Management nursing
Disaster Management nursing Disaster Management nursing
Disaster Management nursing OM VERMA
 
Forensic science and beyond: authenticity, provenance and assurance - evidenc...
Forensic science and beyond: authenticity, provenance and assurance - evidenc...Forensic science and beyond: authenticity, provenance and assurance - evidenc...
Forensic science and beyond: authenticity, provenance and assurance - evidenc...bis_foresight
 
Crisis Intervention- Response
Crisis Intervention- ResponseCrisis Intervention- Response
Crisis Intervention- ResponseDanielle Kelley
 
47Critical Infrastructure Protection, Emergency Respon.docx
  47Critical Infrastructure Protection, Emergency Respon.docx  47Critical Infrastructure Protection, Emergency Respon.docx
47Critical Infrastructure Protection, Emergency Respon.docxShiraPrater50
 
Exploring your Inner Microbiome
Exploring your Inner MicrobiomeExploring your Inner Microbiome
Exploring your Inner MicrobiomeLarry Smarr
 
Gorman National Academies Cscans 30 October 2006
Gorman National Academies Cscans 30 October 2006Gorman National Academies Cscans 30 October 2006
Gorman National Academies Cscans 30 October 2006bgorman
 

Similar to Physical_Security_Historical_perspective.ppt (20)

Ethical Aspects of Science and Technology
Ethical Aspects of Science and TechnologyEthical Aspects of Science and Technology
Ethical Aspects of Science and Technology
 
IRB Basics
IRB BasicsIRB Basics
IRB Basics
 
Terrorist related hazardsassignment2 jarodbleibdrey
Terrorist related hazardsassignment2 jarodbleibdreyTerrorist related hazardsassignment2 jarodbleibdrey
Terrorist related hazardsassignment2 jarodbleibdrey
 
6RussBowman_NICHI_BusinessSummit
6RussBowman_NICHI_BusinessSummit6RussBowman_NICHI_BusinessSummit
6RussBowman_NICHI_BusinessSummit
 
Threat Assessment: The New Normal
Threat Assessment: The New NormalThreat Assessment: The New Normal
Threat Assessment: The New Normal
 
Week 6 GuidancePsychological ResearchThere are many ways to co
Week 6 GuidancePsychological ResearchThere are many ways to coWeek 6 GuidancePsychological ResearchThere are many ways to co
Week 6 GuidancePsychological ResearchThere are many ways to co
 
Synthetic Biology beyond the bench: Biosafety & biosecurity
Synthetic Biology beyond the bench: Biosafety & biosecuritySynthetic Biology beyond the bench: Biosafety & biosecurity
Synthetic Biology beyond the bench: Biosafety & biosecurity
 
Thesis (J. Kyle Treman)
Thesis (J. Kyle Treman)Thesis (J. Kyle Treman)
Thesis (J. Kyle Treman)
 
In defense of posthuman dignity. Nick Bostrom (2005).
In defense of posthuman dignity. Nick Bostrom (2005).In defense of posthuman dignity. Nick Bostrom (2005).
In defense of posthuman dignity. Nick Bostrom (2005).
 
Windows of Opportunity in Hallways of Distractions: the race between threats,...
Windows of Opportunity in Hallways of Distractions: the race between threats,...Windows of Opportunity in Hallways of Distractions: the race between threats,...
Windows of Opportunity in Hallways of Distractions: the race between threats,...
 
Article Detail 3 - Domestic Preparedness
Article Detail 3 - Domestic PreparednessArticle Detail 3 - Domestic Preparedness
Article Detail 3 - Domestic Preparedness
 
Lecture MDR VU
Lecture MDR VULecture MDR VU
Lecture MDR VU
 
Disaster Management Introduction & Classification
Disaster Management Introduction & ClassificationDisaster Management Introduction & Classification
Disaster Management Introduction & Classification
 
Disaster Management nursing
Disaster Management nursing Disaster Management nursing
Disaster Management nursing
 
Forensic science and beyond: authenticity, provenance and assurance - evidenc...
Forensic science and beyond: authenticity, provenance and assurance - evidenc...Forensic science and beyond: authenticity, provenance and assurance - evidenc...
Forensic science and beyond: authenticity, provenance and assurance - evidenc...
 
Crisis Intervention- Response
Crisis Intervention- ResponseCrisis Intervention- Response
Crisis Intervention- Response
 
Emerging world order
Emerging world orderEmerging world order
Emerging world order
 
47Critical Infrastructure Protection, Emergency Respon.docx
  47Critical Infrastructure Protection, Emergency Respon.docx  47Critical Infrastructure Protection, Emergency Respon.docx
47Critical Infrastructure Protection, Emergency Respon.docx
 
Exploring your Inner Microbiome
Exploring your Inner MicrobiomeExploring your Inner Microbiome
Exploring your Inner Microbiome
 
Gorman National Academies Cscans 30 October 2006
Gorman National Academies Cscans 30 October 2006Gorman National Academies Cscans 30 October 2006
Gorman National Academies Cscans 30 October 2006
 

More from Major K. Subramaniam Kmaravehlu

TRAINING PEDAGOGY.ppt Introduction to Understanding of Pedagogy.
TRAINING PEDAGOGY.ppt Introduction to Understanding of Pedagogy.TRAINING PEDAGOGY.ppt Introduction to Understanding of Pedagogy.
TRAINING PEDAGOGY.ppt Introduction to Understanding of Pedagogy.Major K. Subramaniam Kmaravehlu
 
PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY
PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITYPSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY
PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITYMajor K. Subramaniam Kmaravehlu
 
BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...
BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...
BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...Major K. Subramaniam Kmaravehlu
 
BLE 1213 MUST (SESSION 3).pptx- basic principles of physical security
BLE 1213 MUST (SESSION 3).pptx- basic principles of physical securityBLE 1213 MUST (SESSION 3).pptx- basic principles of physical security
BLE 1213 MUST (SESSION 3).pptx- basic principles of physical securityMajor K. Subramaniam Kmaravehlu
 
AI GENERATIVE.pptx- Introduction to AI generative in Warfare
AI GENERATIVE.pptx- Introduction to AI generative in WarfareAI GENERATIVE.pptx- Introduction to AI generative in Warfare
AI GENERATIVE.pptx- Introduction to AI generative in WarfareMajor K. Subramaniam Kmaravehlu
 
AVI SAFETY CULTURE.pptx- maintenance engineers safety principles
AVI SAFETY CULTURE.pptx- maintenance engineers safety principlesAVI SAFETY CULTURE.pptx- maintenance engineers safety principles
AVI SAFETY CULTURE.pptx- maintenance engineers safety principlesMajor K. Subramaniam Kmaravehlu
 
Phy Sy CTPAT.pptx-ctpat training for supply chain managers.
Phy Sy CTPAT.pptx-ctpat training for supply chain managers.Phy Sy CTPAT.pptx-ctpat training for supply chain managers.
Phy Sy CTPAT.pptx-ctpat training for supply chain managers.Major K. Subramaniam Kmaravehlu
 
BLE 1213 PSM Fitri Gp 3.pptx- STUDENT GROUP PRESENTATION
BLE 1213 PSM Fitri Gp 3.pptx- STUDENT GROUP PRESENTATIONBLE 1213 PSM Fitri Gp 3.pptx- STUDENT GROUP PRESENTATION
BLE 1213 PSM Fitri Gp 3.pptx- STUDENT GROUP PRESENTATIONMajor K. Subramaniam Kmaravehlu
 
BLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSM
BLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSMBLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSM
BLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSMMajor K. Subramaniam Kmaravehlu
 
BLE 1213 MUST.pptx- basics principles of Physical Security
BLE 1213 MUST.pptx- basics  principles of Physical SecurityBLE 1213 MUST.pptx- basics  principles of Physical Security
BLE 1213 MUST.pptx- basics principles of Physical SecurityMajor K. Subramaniam Kmaravehlu
 

More from Major K. Subramaniam Kmaravehlu (20)

TRAINING PEDAGOGY.ppt Introduction to Understanding of Pedagogy.
TRAINING PEDAGOGY.ppt Introduction to Understanding of Pedagogy.TRAINING PEDAGOGY.ppt Introduction to Understanding of Pedagogy.
TRAINING PEDAGOGY.ppt Introduction to Understanding of Pedagogy.
 
PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY
PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITYPSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY
PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY
 
u2-lect-1-to-9-mtd-pvb-1801161758710.ppt
u2-lect-1-to-9-mtd-pvb-1801161758710.pptu2-lect-1-to-9-mtd-pvb-1801161758710.ppt
u2-lect-1-to-9-mtd-pvb-1801161758710.ppt
 
BLE 1213 PSM (SESSION 5).pptx-key Concepts in PSM
BLE 1213 PSM (SESSION 5).pptx-key Concepts in PSMBLE 1213 PSM (SESSION 5).pptx-key Concepts in PSM
BLE 1213 PSM (SESSION 5).pptx-key Concepts in PSM
 
BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...
BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...
BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...
 
BLE 1213 MUST (SESSION 3).pptx- basic principles of physical security
BLE 1213 MUST (SESSION 3).pptx- basic principles of physical securityBLE 1213 MUST (SESSION 3).pptx- basic principles of physical security
BLE 1213 MUST (SESSION 3).pptx- basic principles of physical security
 
BLE 1213 MUST (SESSION 2).pptx-Student learning Guide
BLE 1213 MUST (SESSION 2).pptx-Student learning GuideBLE 1213 MUST (SESSION 2).pptx-Student learning Guide
BLE 1213 MUST (SESSION 2).pptx-Student learning Guide
 
AI GENERATIVE.pptx- Introduction to AI generative in Warfare
AI GENERATIVE.pptx- Introduction to AI generative in WarfareAI GENERATIVE.pptx- Introduction to AI generative in Warfare
AI GENERATIVE.pptx- Introduction to AI generative in Warfare
 
AVI SAFETY CULTURE.pptx- maintenance engineers safety principles
AVI SAFETY CULTURE.pptx- maintenance engineers safety principlesAVI SAFETY CULTURE.pptx- maintenance engineers safety principles
AVI SAFETY CULTURE.pptx- maintenance engineers safety principles
 
CTPAT PPTX Presentation.pptx - minimum security
CTPAT  PPTX Presentation.pptx - minimum securityCTPAT  PPTX Presentation.pptx - minimum security
CTPAT PPTX Presentation.pptx - minimum security
 
Phy Sy CTPAT.pptx-ctpat training for supply chain managers.
Phy Sy CTPAT.pptx-ctpat training for supply chain managers.Phy Sy CTPAT.pptx-ctpat training for supply chain managers.
Phy Sy CTPAT.pptx-ctpat training for supply chain managers.
 
SECURITY PLANNING DESIGN (SESSION 3).ppt
SECURITY PLANNING  DESIGN (SESSION 3).pptSECURITY PLANNING  DESIGN (SESSION 3).ppt
SECURITY PLANNING DESIGN (SESSION 3).ppt
 
BLE 1213 PSM-Rosaini Gp 2.pptx- GROUP DISCUSSION
BLE 1213 PSM-Rosaini Gp 2.pptx- GROUP DISCUSSIONBLE 1213 PSM-Rosaini Gp 2.pptx- GROUP DISCUSSION
BLE 1213 PSM-Rosaini Gp 2.pptx- GROUP DISCUSSION
 
BLE 1213 PSM Fitri Gp 3.pptx- STUDENT GROUP PRESENTATION
BLE 1213 PSM Fitri Gp 3.pptx- STUDENT GROUP PRESENTATIONBLE 1213 PSM Fitri Gp 3.pptx- STUDENT GROUP PRESENTATION
BLE 1213 PSM Fitri Gp 3.pptx- STUDENT GROUP PRESENTATION
 
BLE 1213 PSM - GP 1,2,3 PRSTN.ppt-Presentation slidesx
BLE 1213 PSM - GP 1,2,3 PRSTN.ppt-Presentation slidesxBLE 1213 PSM - GP 1,2,3 PRSTN.ppt-Presentation slidesx
BLE 1213 PSM - GP 1,2,3 PRSTN.ppt-Presentation slidesx
 
BLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSM
BLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSMBLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSM
BLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSM
 
BLE 1213 MUST.pptx- basics principles of Physical Security
BLE 1213 MUST.pptx- basics  principles of Physical SecurityBLE 1213 MUST.pptx- basics  principles of Physical Security
BLE 1213 MUST.pptx- basics principles of Physical Security
 
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
 
CTPAT-MSR.pptx- Presentation Slides for trainees
CTPAT-MSR.pptx- Presentation Slides for traineesCTPAT-MSR.pptx- Presentation Slides for trainees
CTPAT-MSR.pptx- Presentation Slides for trainees
 
DLE 1013-ISM REV.pptx - This note covers 20 over slides
DLE 1013-ISM REV.pptx - This note covers 20 over slidesDLE 1013-ISM REV.pptx - This note covers 20 over slides
DLE 1013-ISM REV.pptx - This note covers 20 over slides
 

Recently uploaded

How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17Celine George
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文中 央社
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnershipsexpandedwebsite
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesPooky Knightsmith
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxneillewis46
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxAdelaideRefugio
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17Celine George
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽中 央社
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxLimon Prince
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjMohammed Sikander
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFVivekanand Anglo Vedic Academy
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppCeline George
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...Gary Wood
 

Recently uploaded (20)

How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 

Physical_Security_Historical_perspective.ppt

  • 1. copyright, Dr. C.T. Johnson, Capitol College 1 PHYSICAL SECURITY INTRODUCTION Dr. Craig T. Johnson Professor
  • 2. copyright, Dr. C.T. Johnson, Capitol College 2 Today’s Discussion Topics • Principles of basic physical security • Establishing the baseline • Defining what is security and how to protect assets • Review the Khobar Towers case study
  • 3. copyright, Dr. C.T. Johnson, Capitol College 3 TYPES OF SECURITY • PHYSICAL • PROCEDURAL • PERSONNEL • CONSTRUCTION • TECHNICAL • TRANSPORTATION • INFORMATION
  • 4. copyright, Dr. C.T. Johnson, Capitol College 4 OUR FOCUS WILL BE… PHYSICAL SECURITY
  • 5. copyright, Dr. C.T. Johnson, Capitol College 5 BASIC PHYSICAL SECURITY “That part of security concerned with physical measures designed to safeguard personnel; to prevent unauthorized access to equipment, installations, material, and documents; and to safeguard against espionage, sabotage, damage, and theft.” US Army Field Manual 3-19.30 Physical Security Brought to you by the US Army, the sweetest smelling army in the world!
  • 6. copyright, Dr. C.T. Johnson, Capitol College 6 BASIC PHYSICAL SECURITY • Definition: “A means of preventing unauthorized entry of persons into a premises, and the prevention of loss due to all kinds of crime associated with uncontrolled access.”
  • 7. copyright, Dr. C.T. Johnson, Capitol College 7 TYPES OF SECURITY AREAS • PRINCIPLES OF SAFEGUARDING • CRITICAL & RESTRICTED AREAS • SECURITY- CONTROLLED AREAS
  • 8. copyright, Dr. C.T. Johnson, Capitol College 8 TYPES OF SECURITY AREAS (DEFINED) - I • Principles of Safeguarding – Guarding against force or surreptitious entry – Protecting material, equipment or information – Protecting classified areas – Protecting unclassified areas
  • 9. copyright, Dr. C.T. Johnson, Capitol College 9 TYPES OF SECURITY AREAS (Defined) - II • Critical & Restricted Areas – Degree of Criticality – Degree of Restricted Area
  • 10. copyright, Dr. C.T. Johnson, Capitol College 10 TYPES OF SECURITY AREAS (Defined) - III • Security – Controlled Areas – Exclusion Areas – Limited Areas – Control Areas
  • 11. copyright, Dr. C.T. Johnson, Capitol College 11 PHYSICAL SECURITY Terms, History, Risk IAE-684 “COMPLEMENTARY SECURITY”
  • 12. copyright, Dr. C.T. Johnson, Capitol College 12 HISTORICAL EXAMPLES • Vassal states’ walls joined during Qin Dynasty creating “10,000 li (5k km) Great Wall” – Built to hold off Hsiung Nu tribes (Huns) • Denial and avoidance security – Kept invaders out for 1,000 years – Eventually overcome from within • http://ce.eng.usf.edu/pharos/wonders/Forgotten/greatwall.html • http://www.enchantedlearning.com/subjects/greatwall/ • http://www.jpl.nasa.gov/radar/sircxsar/gwall.html
  • 13. copyright, Dr. C.T. Johnson, Capitol College 13 HISTORICAL EXAMPLES • THE “GREAT WALL OF CHINA”, EMPEROR CHINN OF CHINA BUILT THE “GREAT WALL” TO GUARD AGAINST THE BARBARIANS FROM THE NORTH. • DENIAL AND AVOIDANCE SECURITY
  • 14. copyright, Dr. C.T. Johnson, Capitol College 14 HISTORICAL EXAMPLES • World’s first bank vaults • Access control & asset protection – Assured ascension of deceased to the gods • Security modernization project underway – Night vision CCTV cameras
  • 15. copyright, Dr. C.T. Johnson, Capitol College 15 HISTORICAL EXAMPLES • Mesa Verde (“green table”) in Colorado, occupied 600- 1300 A.D. • Center of San Juan Anasazi (Pueblo) culture • Cliff dwellings with ladders for access control – Defense Theory – Internal strife due to drought? • Difficult access with natural obstacles • http://www.nps.gov/meve/mvnp/smvf/p50.htm • http://www.nps.gov/meve/index.htm • http://www.abqjournal.com/venue/travel/heritage_mesaverd e.htm
  • 16. copyright, Dr. C.T. Johnson, Capitol College 16 HISTORICAL EXAMPLES • Masada (“fortress”), built by Rome- appointed King Herod • Captured during Revolt of the Jews – Held 2 years – Last stronghold of Jews • http://www.mfa.gov.il/mfa/go.asp?MFAH0dp00 • http://faculty.smu.edu/dbinder/masada.html
  • 17. copyright, Dr. C.T. Johnson, Capitol College 17 HISTORICAL EXAMPLES - cont • “MASADA” OF ISRAEL; KING HERODS FORTRESS ON THE RED SEA WAS CAPTURED BY JEWISH ZEALOTS AND HELD TWO YEARS AGAINST THREE ROMAN LEGIONS
  • 18. copyright, Dr. C.T. Johnson, Capitol College 18 What is Risk Management? The process of selecting and implementing security countermeasures to achieve an acceptable level of risk at an acceptable cost
  • 19. copyright, Dr. C.T. Johnson, Capitol College 19 What is Risk? Risk level is a combination of two factors:  Impact of loss -The value placed on an asset by its owner and the consequence of an undesirable event on that asset.  Probability of undesirable event -The likelihood that a specific vulnerability will be exploited by a particular threat. Risk is the potential for damage or loss of an asset
  • 20. copyright, Dr. C.T. Johnson, Capitol College 20 What is an Asset? The asset may have value to an adversary, as well as to the owner, although the values may differ. An asset is anything of value:  people  information  equipment  facilities  activities/operations
  • 21. copyright, Dr. C.T. Johnson, Capitol College 21 What is Impact? Impact is the amount of loss or damage that can be expected, or may be expected, from a successful attack on an asset.
  • 22. copyright, Dr. C.T. Johnson, Capitol College 22 What is Threat?  Threat can also be defined as the intention to undertake actions detrimental to assets Threat is any indication, circumstance, or event with the potential to cause the loss of or damage to an asset.
  • 23. copyright, Dr. C.T. Johnson, Capitol College 23 What is an Adversary?  Intelligence services, extremists, terrorists, criminals, and private interests groups Any individual, group, organization, or government that conduces activities, or has the intention and capability to conduce activities detrimental to valued assets
  • 24. copyright, Dr. C.T. Johnson, Capitol College 24 Vulnerabilities  Vulnerabilities can result from, but are not limited to, the following:  building characteristics  equipment properties  personal behavior  locations of people, equipment, and buildings  operational procedures and personnel practices Vulnerabilities - Any weakness that can be exploited by an adversary to gain access to an asset
  • 25. copyright, Dr. C.T. Johnson, Capitol College 25 RISK “1. Hazard; danger; peril; exposure to loss, injury, or destruction.” Webster’s 1913 Dictionary http://www.hyperdictionary.com/dictionary/risk “The potential for realization of unwanted, adverse consequences to human life, health, property, or the environment; estimation of risk is usually based on the expected value of the conditional probability of the event occurring times the consequence of the event given that it has occurred.” Society for Risk Analysis http://www.sra.org/gloss3.htm#R  The probability of loss  Factor of threat and vulnerability (Risk=Threat x Vulnerability)
  • 26. copyright, Dr. C.T. Johnson, Capitol College 26 RISK ANALYSIS • Risk analysis must be a constant, comprehensive, integrated function of the security organization “A detailed examination including risk assessment, risk evaluation, and risk management alternatives, performed to understand the nature of unwanted, negative consequences to human life, health, property, or the environment; an analytical process to provide information regarding undesirable events; the process of quantification of the probabilities and expected consequences for identified risks.” Society for Risk Analysis http://www.sra.org/gloss3.htm#R
  • 27. copyright, Dr. C.T. Johnson, Capitol College 27 RISK ANALYSIS WILL LOSS OCCUR? WEAKNESS IN PERSONNEL PROCEDURES OF PHYSICAL PLANT PERPETRATER RISK GAIN
  • 28. copyright, Dr. C.T. Johnson, Capitol College 28 RISK vs. GAIN EQUATION • The rational human threat can be deterred by countermeasures or a lack of vulnerability • Personal risk for the bad guy – Capture  Physical harm Low risk + High gain low hanging fruit High risk + High or low gain go next door
  • 29. copyright, Dr. C.T. Johnson, Capitol College 29 RISK MANAGEMENT Four basic steps: 1. Asset identification 2. Threat/Vulnerability Assessment 3. Risk Analysis 4. Countermeasure evaluation/implementation The process is iterative!
  • 30. copyright, Dr. C.T. Johnson, Capitol College 30 Risk Management at a Glance Assess Assets 1 Assess Threats 2 Assess Vulnerabilities 3 Assess Risks 4 Determine Countermeasure Options 5 Make RM Decisions Benefits Analysis Cost Analysis Monitor Implement T & E
  • 31. copyright, Dr. C.T. Johnson, Capitol College 31 Relationship of Risk Management Practices to Achieving Benefits Critical Success Factors 1. Senior management support & involvement 2. Focal points 3. Define procedures 4. Experts involved Process 1. Identify & rank critical assets and operations & estimate potential damage of loss 2. Identify threats & likelihood of threats materializing 3. Identify exploitable vulnerabilities 4. Determine Risk 5. Identify cost effective mitigating countermeasures 6. Obtain risk management decisions 7. Develop/Implement action plans 8. Test/Evaluate countermeasures 9. Monitor changes in risk factors/repeat process Tools 1. Tables/Matrices 2. Questionnaires 3. Standard formats 4. Software to facilitate documentation and analysis 5. Lists of threats, controls, vulnerabilities Benefits 1. Assurance that the greatest risks have been identified and addressed 2. Increased understanding of risks 3. Mechanism for reaching consensus 4. Support for needed controls 5. Means for communicating results 5. Units responsible 6. Assessment scope limited 7. Document & maintain results
  • 32. copyright, Dr. C.T. Johnson, Capitol College 32 Critical Success Factors 1. Senior management support & involvement 2. Focal points 3. Define procedures 4. Experts involved 5. Units responsible 6. Assessment scope limited 7. Document & maintain results
  • 33. copyright, Dr. C.T. Johnson, Capitol College 33 Process 1. Identify & rank critical assets and operations & estimate potential damage of loss 2. Identify threats & likelihood of threats materializing 3. Identify exploitable vulnerabilities 4. Determine Risk 5. Identify cost effective mitigating countermeasures 6. Obtain risk management decisions 7. Develop/Implement action plans 8. Test/Evaluate countermeasures 9. Monitor changes in risk factors/repeat process
  • 34. copyright, Dr. C.T. Johnson, Capitol College 34 Tools 1. Tables/Matrices 2. Questionnaires 3. Standard formats 4. Software to facilitate documentation and analysis 5. Lists of threats, controls, vulnerabilities
  • 35. copyright, Dr. C.T. Johnson, Capitol College 35 Benefits 1. Assurance that the greatest risks have been identified and addressed 2. Increased understanding of risks 3. Mechanism for reaching consensus 4. Support for needed controls 5. Means for communicating results
  • 36. copyright, Dr. C.T. Johnson, Capitol College 36 THREAT Defined • A force or event that could cause loss – Environmental/natural • Acts of God (or some higher power) • Weather – Human • Unintentional (error) • Intentional (penetration, theft, espionage)
  • 37. copyright, Dr. C.T. Johnson, Capitol College 37 THREAT • Environment can cause as great or greater loss than humans but are more predictable • Human threats present the greatest challenge to the security professional – If threat is rational, deterrence is possible – No countermeasure will deter an irrational human “It is unlikely that measures can be devised that can eliminate entirely the multitude of diverse dangers that may arise, particularly when the President is traveling…” Warren Commission Report, 1964
  • 38. copyright, Dr. C.T. Johnson, Capitol College 38 THREAT (DEFINED) • AN OUTSIDE FORCE THAT COULD CAUSE A LOSS TO THE ORGANIZATION. THE THREAT CAN BE NATURAL AS IN A HURRICANE OR EARTHQUAKE OR IT MAY BE HUMAN SUCH AS A BURGLAR OR TERRORIST.
  • 39. copyright, Dr. C.T. Johnson, Capitol College 39 THREAT (DEFINED – II) • ENVIRONMENTAL THREATS ARE THOSE NATURAL OCCURING EVENTS THAT ARE INHERENT WITH THE GEOGRAPHICAL LOCATION, WEATHER CONDITIONS OR SIMPLY “GOD’S WILL”. • THESE ENVIRONMENTAL THREATS CAN CAUSE AS GREAT A LOSS AS A HUMAN HOWEVER, THEY ARE MUCH MORE PREDICTABLE.
  • 40. copyright, Dr. C.T. Johnson, Capitol College 40 THREAT (DEFINED – III) • HUMAN THREATS PRESENT THE GREATEST CHALLENGE TO THE SECURITY PROFESSIONAL. IF THE HUMAN THREAT IS EXPECTED TO BE A RATIONAL THINKING PERSON THEN THE THREAT CAN BE DETERRED. • HUMAN IS NOT RATIONAL NO COUNTERMEASURE WILL DETER THE INDIVIDUAL
  • 41. copyright, Dr. C.T. Johnson, Capitol College 41 BASIC PHYSICAL SECURITY PROTESTORS MOTHER NATURE DISGRUNTLED EMPLOYEE THEFT TERRORIST FIRE CRIMINALS
  • 42. copyright, Dr. C.T. Johnson, Capitol College 42 THE THREE “D’S” Modern Security programs are predicated on a theory of controlling access to valuables by employing countermeasures that will: – DETER – DELAY – DETECT
  • 43. copyright, Dr. C.T. Johnson, Capitol College 43 THE THREE “D’S” • Deterrence: – Creating the appearance that the Risk of Entry would be greater than the personal gain. • Delay: – Slowing access through the use of Physical barriers • Detection: – The ability of the protector to Detect an attempted or actual entry into a protected area.
  • 44. copyright, Dr. C.T. Johnson, Capitol College 44 DETERRENCE – I Historical perspective • Creating the appearance that the risk of entry would be higher then the possible gain. • A deterrent does not have to be real to be effective!
  • 45. copyright, Dr. C.T. Johnson, Capitol College 45 DELAY – II Historical perspective • Preventing or slowing access through the use of physical barriers. • Most often used method for security • Historically, moats, sentry towers & castles were used • Modern systems call for fences, walls and bollards.
  • 46. copyright, Dr. C.T. Johnson, Capitol College 46 DETECTION - III • The ability of the protector to detect or sense an attempted or actual entry into the protected area. • Detection systems do not physical stop the intrusion! • A response is critical to prevent loss of valuables
  • 47. Impact or Risk Threat or Vulnerability Suggested Scales Low Medium High Critical Range 1-3 4-13 14-49 50-100 Mid- point 2 5 25 71 Low Medium High Critical Range .01-.24 .25-.49 .50-.74 .75-1.00 Mid- point .12 .37 .62 .87
  • 48. copyright, Dr. C.T. Johnson, Capitol College 48 The Rating by Definition I & R .T & .V 50-100 14-49 4-13 1-3 .75-1.00 .50-.74 .25-.49 .01-.24 With the scales being so big or wide, it would be hard for you to assign a number to the rating if you did not use the degree of rating like H/C
  • 49. copyright, Dr. C.T. Johnson, Capitol College 49 The Degrees of Impact Criticality Degree High Medium Low H/C High Medium Low High Medium Low L M/M L/H Low is low enough The value of low is only three numbers 1-3 for Impact and Risk
  • 50. copyright, Dr. C.T. Johnson, Capitol College 50 The Degrees of Threat & Vulnerability Criticality Degree High Medium Low H/C High Medium Low High Medium Low M/L M/M L/H High Medium Low
  • 51. copyright, Dr. C.T. Johnson, Capitol College 51 Bottom Line When using the degrees with the rating, assignment of numbers becomes much easier. Using this method will allow for repeatable and consistent our assessments. This method also builds creditability with others that must be convince with the analysis Always obtain consciences on your definitions and ensure you are assigning the the ratings correctly.
  • 52. copyright, Dr. C.T. Johnson, Capitol College 52 WHERE ARE MY VULNERABILITIES? How do we define them???
  • 53. copyright, Dr. C.T. Johnson, Capitol College 53 VULNERABILITY (DEFINED) “…IS DEFINED AS THE STRENGTH OR WEAKNESS OF DEFENSE.”
  • 54. copyright, Dr. C.T. Johnson, Capitol College 54 IDENTIFY ADVERSARY THREATS • Lessons learned from past adversaries • Determine adversary pathways to your assets • Use the asymmetrical perspective by view your assets through the eyes of your adversary.
  • 55. copyright, Dr. C.T. Johnson, Capitol College 55 Security Breaches at the Los Alamos Lab Presented by Former student Mr. Albert Reel 2006
  • 56. copyright, Dr. C.T. Johnson, Capitol College 56 History of Los Alamos • Los Alamos Lab was created in 1943 in the middle of World War II • Manhattan Project – Fat Man – Little Boy • July 16, 1945 First Atomic Bomb was detonated.
  • 57. copyright, Dr. C.T. Johnson, Capitol College 57 Past Espionage • During World War II there were three known individuals that engaged in Espionage Efforts at the Los Alamos Lab – Klaus Fuchs – Theodore Hall – David Greenglass
  • 58. copyright, Dr. C.T. Johnson, Capitol College 58 Klaus Fuchs • German Expatriate and Emigrated to the United Kingdom to escape Nazis • He worked on Implosion Problems in Los Alamos • Delivered sketches of Fat Man to the Soviet Union • Spent 14 Years in Wormwood Scrubbs Prison
  • 59. copyright, Dr. C.T. Johnson, Capitol College 59 Theodore Hall • Graduated From Harvard at the age of 18 • On vacation walked into the Soviet Embassy to volunteer to work for the Russians • Never arrested by the FBI • Little is known or what information he gave to Soviet Union
  • 60. copyright, Dr. C.T. Johnson, Capitol College 60 David Greenglass • US Army enlisted personnel trained as a machinist • Brother of Ethel Rosenberg • Rosenberg’s recruited David to become part of their espionage ring • Supplied Soviets with drawings of parts to Fat Boy
  • 61. copyright, Dr. C.T. Johnson, Capitol College 61 Security Lapses • Wen Ho Lee – Held Q clearance which granted him access to Top Secret information – Between 1980 and December 23, 1998 – First thought to be spying for the People’s Republic of China – Charged 59 counts for Mishandling Classified Information – Release from Jail in 2000
  • 62. copyright, Dr. C.T. Johnson, Capitol College 62 Security Lapses • In 2000 FBI investigate missing hard drives • Drives belonged to the Alamos Nuclear Emergency Research Team • Found days later behind a copy machine
  • 63. copyright, Dr. C.T. Johnson, Capitol College 63 Security Lapses • 2004 the Los Alamos Lab was shut down after an inventory showed they were missing two computer disk containing nuclear secrets discovered missing • Sloppy inventory controls were blamed as the culprit as it was determined that no disks missing • Following this incident, that Lab instituted a 5 year program to migrate to an environment without the use of computer disks
  • 64. copyright, Dr. C.T. Johnson, Capitol College 64 Security Lapses • Jessica Lynn Quintana – During a methamphetamines laboratory drug bust by law enforcement, officials in New Mexico found Top Secret documents from the National Laboratory – Over 1000 pages of classified documents were discovered – Suspect removed classified documents, computer hardware from vault type rooms – In 2006, Quintana plead guilty to knowingly removing documents
  • 65. copyright, Dr. C.T. Johnson, Capitol College 65 Conclusion • National security breeches such as these can greatly harm the United States • All aspects of security are important – These systems weren’t “hacked” – Careless errors and gross incompetence reasons for security lapses • Everyone must be security conscience
  • 66. copyright, Dr. C.T. Johnson, Capitol College 66 PROVOCATIVE QUESTION How do we stop the threat???
  • 67. copyright, Dr. C.T. Johnson, Capitol College 67 PHYSICAL SECURITY – III (EXECUTION) CONCENTRIC CIRCLES
  • 68. copyright, Dr. C.T. Johnson, Capitol College 68 BASIC PHYSICAL SECURITY - THEORY • ANY COUNTERMEASURE CREATED BY MAN CAN BE DEFEATED • MULTIPLE LAYERS OF DIFFERENT TYPES OF COUNTERMEASURES ARE THE MOST EFFECTIVE • NUMBER AND TYPES OF LAYERS ARE FLEXIBLE ACCORDING TO THREAT TO THE VALUABLES • A GOOD “RISK ASSESSMENT” IS CRITICAL
  • 69. copyright, Dr. C.T. Johnson, Capitol College 69 BASIC PRINCIPLES TYPES OF “LAYERS” • THE “RINGS” OR “LAYERS” ARE THE “DEFENSE IN DEPTH” COUNTERMEASURES WITH EACH RING COMPLEMENT THE OTHER • FOR EXAMPLE, VIBRATION SENSORS ON FENCES OR WALLS WILL DELAY & DETECT • KNOWLEDGE OF SUCH SENSORS CAN DETER INTRUDERS AND ADD VALUE TO SYSTEM
  • 70. copyright, Dr. C.T. Johnson, Capitol College 70 HISTORICAL IMPLICATIONS • PROTECTION WAS FIRST CONSIDERATION FOR ANCIENTS • WALLS AND BARRIERS MEANT SECURITY & PROTECTION • SAVEHAVENS AND SECURED AREAS WERE IMPORTANT • GUARD AGAINST THE EXTERNAL ENEMIES OUTSIDE THE CITIES
  • 71. copyright, Dr. C.T. Johnson, Capitol College 71 DEPLOYING COUNTER-MEASURES PASSIVE & ACTIVE SENSORS SECURITY PERSONNEL
  • 72. copyright, Dr. C.T. Johnson, Capitol College 72 After Countermeasures! To find out the benefit in Risk reduction • Go back to your Vulnerability rating • Look at your new CM’s • Re-evaluate the Vulnerability • Look at the definitions again • The Rating should be REDUCED • Mark the new Vulnerability Rating and Value • Go back, do the math again for that line • Impact x Threat x New Vulnerability Value = New Risk • You should now have a new Risk Value – The NEW Risk Value should be lower • Convert NEW Risk Value to Linguistic Rating You should have lowered your Risk for that single event line.
  • 73. copyright, Dr. C.T. Johnson, Capitol College 73 PHYSICAL SECURITY DEPLOYMENT CONCENTRIC RINGS Five Rings ASSETS
  • 74. copyright, Dr. C.T. Johnson, Capitol College 74 Perimeter Zone Base Camp Warfighter Zone Tactical Zone Detection Zone Intelligence Zone Warning Detection Assessment Delay/Denial Response Investigation/Follow-up C2 The Force Protection World Tactical View
  • 75. copyright, Dr. C.T. Johnson, Capitol College 75 Integrated Command and Control Civil/Facility Engineers Security Force Investigative Services Intelligence Communi- cations - Electronics Medical Logistics Force Protection Situation Awareness Command and Control Capability Counter Intelligence Sources Special Systems Organic Sensors Camera fence Installation Security Systems Intelligence Sources Surveillance Sources Reconnaissance Sources Allied/Coalition Host Country Sources “Force Protection Integrated Information Infrastructure” Functions Sources Responses
  • 76. A Systems Approach to Security Decision Making Key Terms & Definitions Analytical Risk Management
  • 77. copyright, Dr. C.T. Johnson, Capitol College 77 What is a Risk Assessment?  Establishes the basis for countermeasure recommendations The process of evaluating threat to and vulnerabilities of an asset to give an expert opinion on the probability of loss or damage and its impact I x (.T x .V) = R
  • 78. copyright, Dr. C.T. Johnson, Capitol College 78 What is a Countermeasure?  Countermeasure costs may be monetary, but also non-monetary (e.g., reduced operational effectiveness, adverse publicity, poor working conditions, political consequences) * May also affect threat and/or impact A countermeasure is an action taken or a physical entity principally* used to reduce or eliminate one or more vulnerabilities.
  • 79. copyright, Dr. C.T. Johnson, Capitol College 79 What is a Cost-Benefit Analysis? Part of the Risk Management decision-making process in which the costs and benefits of each alternative are compared and the most appropriate alternative is selected  Minimize cost  Maximize risk reduction
  • 80. Discussion of Key Terms & Definitions Questions & Comments
  • 81. copyright, Dr. C.T. Johnson, Capitol College 81 DEBRIEFING OF KhOBAR TOWERS CASE STUDY • How might the terrorist acts been mitigated? • How should responsibility be allocated? • What’s your recommendation re BG Schwalier? • Lessons learned that can relate to IT INFOSEC catastrophic events?
  • 82. copyright, Dr. C.T. Johnson, Capitol College 82 References Harris, S. (2005). CISSP Exam Guide (3rd ed.), Emeryville, CA: McGraw-Hill/Osborne Miller, L. & Gregory, P. (2002). CISSP for Dummies, Hoboken, NJ: Wiley Publishing, Inc. Pfleeger, C., & Pfleeger, S. (2003). Security in Computing (3rd ed.), Upper Saddle River, NJ: Prentice Hall Professional Technical Reference. Russell, D, & Gangemi, G.T. (1991). Computer Security Basics, Sebastopol, CA: O’Reilly & Associates. Tung, B. (2006). The Moron's Guide to Kerberos, Version 2.0. Retrieved November 9, 2006 from http://www.isi.edu/~brian/security/kerberos.html
  • 83. copyright, Dr. C.T. Johnson, Capitol College 83 References • Thomas, Ryan and Cook (May 15, 2007) Guilty Plea in Los Alamos Security Breach abc NEWS http://abcnews.go.com/TheLaw/story?id=3177289 • Associated Press (October 25, 2006) Classified document found in drug raid USA Today http://www.usatoday.com/news/nation/2006-10-24-los- alamos-documents_x.htm • Associated Press (October 25, 2006) New Details Emerge in Los Alamos Case CBS NEWS http://www.cbsnews.com/stories/2006/10/24/national/main 2122004.shtml
  • 84. copyright, Dr. C.T. Johnson, Capitol College 84 References • www.ietf.org/html.charters/cat-charter.html • www.nrl.navy.mil/CCS/people/kerberos-faq.html • www.mit.edu/afs/athena.mit.edu/astaff/project/ker beros/www/papers.html • “A History of National Security” Los Alamos National Laboratory http://www.lanl.gov/history/index.shtml (March 20, 2008)