SlideShare a Scribd company logo
1 of 29
Presented by:
Pallavi Agarwal
What is Physical Infrastructure
● The physical infrastructure is the foundation on which all
enterprise systems operate – power, communication, computing,
control and security. Research shows that faults within the
physical infrastructure cause a majority of system downtime.
Secure physical infrastructure
● Security can be best achieved by ensuring multiple layers
of security and not depending on a single measure. The
controls for physical and environmental security are
defined in three areas:
– Security of the premise
– Security of the equipment
– Secure behavior
Security Of The Premise
Components:-
● Physical security perimeter
● Physical entry controls
● Securing offices, rooms and facilities
● Isolated delivery and loading areas
● Working in secure areas
Physical security perimeter
 boundary of the premise
 entry points
 protective wall
 doors strong enough
 Entry gates controlled by cards
 watchmen, guards or receptionist monitoring the
entry points
Physical entry controls
 Only authorized persons should be allowed access to
the secure areas.
 This objective could be achieved by having a clear
access control policy defining the access rights.
 These measures may take the form of access controlled
devices like swipe card controlled doors, logging
information about visitors and visible identification
badges.
Securing offices, rooms and
facilities
 Support facilities like photocopier, fax machines, which
are constantly accessed by everyone, should be located
away from the secure area.
 Suitable intruder detection systems like CCTV, motion
sensors etc. should be installed and regularly tested.
Working in secure areas
 Location of the secure office within the physically
secure perimeter should be chosen with care.
 All the risks pertaining to fire, flood, explosion, civil
unrest and other forms of natural or man made disaster
should be considered.
 There could also be threat from neighboring premises
caused by leakage of water, spreading of fire or storage
of toxic/inflammable/explosive material.
 Even bulk supplies like stationery should not be stored
within the secure premises.
Isolated delivery and loading
areas
 In industrial premises there could be constant
movement of incoming and outgoing material.
 All this traffic needs to be isolated from the secure office
area so that it does not pose a threat.
Security Of The Equipment
Components:
● Equipment sitting and protection
● Power supplies
● Cabling Security
● Equipment Maintenance
● Security of equipment off-premises
● Secure disposal or re-use of equipment
Equipment sitting and protection
 Information processing equipment needs to be
handled carefully.
 It reduce the risk from environmental threats and
hazards.
 Reduce opportunity for unauthorized access.
Power supplies
 Information processing will come to a halt in the
absence of a suitable power supply.
 So equipment should be protected from power failure.
Cabling Security
 Power and telecommunication cabling carrying data
or supporting information services shall be protected
from interception or damage
Equipment Maintenance
 It is normally expected that due care is taken for
equipment maintenance and proper records are
maintained.
 One is to maintain record of faults that were noticed
and the second step is to maintain records of all
equipment sent off the premises for maintenance.
Security of equipment off-premises
 Security procedures and controls shall be used to
secure equipment used outside any company’s
premies
Secure disposal or re-use of equipment
 Every such device should be subjected to a thorough
erasing and overwriting to destroy the data.
 Since some reports claim that the data could be
recovered even after multiple overwriting and
formatting, it may be desirable to physically destroy
the media containing top secret information.
Secure Behaviour
Components
● Clear desk and clear screen policy
● Removal of property
Clear desk and clear screen policy
 Lock up all documents and media when not used.
 Protect the computers and terminals through use of key
locks, passwords, and screen savers.
 Fax and telex machines used for confidential
information should not be left unattended.
 Access to photocopiers and scanners is restricted after
office hours.
 Printing of classified information should be supervised
and all printouts must be removed immediately.
Removal of property
 Any movement of equipment, information or software
should be only with proper authorization.
 All these movements should be logged and records
maintained for all outgoing and incoming items.
Enterprise-wide
security framework
Introduction
 Traditionally, organizations have relied on policies.
 These documents, once issued, provide top down
influence for everyone in the company—from
business units to departments to individual
employees.
 One of the major challenges for an organization in
this area is the continued growth and adaptation of
the policies to mirror the transformation within the
organization.
Contd…
 The fastest area of growth and change within an
organization is Information Systems. With the rapid
development and push toward new technologies,
organizations find themselves striving to maintain
current technical environments with outdated
policies.
 Secondly, with the emergence of new technology
strategies such as Intranets and Extranets, security
and the protection of informational assets has
become paramount.
Contd…
 The first step is an enterprise-wide Information
Systems Security Policy that is consistently enforced
even as business needs change.
 Unfortunately, most companies have only bits and
pieces of security scattered throughout the
organization. These may make some departments or
individuals feel safe, but they do little to protect the
enterprise as a whole.
What is PPT methodology?
 PPT stands for People, Policy, & Technology. The
security process is a mixture of these three elements.
Each element depends in some manner on the other
elements.
People
 This core element is the most important. The people
element comprises the people and various roles and
responsibilities within the organization.
 These are the people that are put in place to execute
and support the process.
 A few key roles include senior management, security
administrators, system and IT administrators, end
users, and auditors.
Policy
 This element comprises the security vision statement,
security policy and standards, and the control
documentation.
 This is basically the written security environment—
the bible that the security process will refer to for
direction and guidance.
Technology
 This element includes tools, methods, and
mechanisms in place to support the process.
 These are core technologies—the operating systems,
the databases, the applications, the security tools—
embraced by the organization.
 The technology then is the enforcement, monitoring,
and operational tool that will facilitate the process.
Secure physical infrastructure

More Related Content

What's hot

What's hot (20)

Environ policy lecture ppt
Environ policy lecture pptEnviron policy lecture ppt
Environ policy lecture ppt
 
3.1 development control rules
3.1 development control rules3.1 development control rules
3.1 development control rules
 
Urban planning
Urban planningUrban planning
Urban planning
 
Urban renewal
Urban renewalUrban renewal
Urban renewal
 
Urban morphology
Urban morphologyUrban morphology
Urban morphology
 
Types of settlement
Types of settlementTypes of settlement
Types of settlement
 
Cultural Landscape
Cultural LandscapeCultural Landscape
Cultural Landscape
 
Urban Development Department
Urban Development DepartmentUrban Development Department
Urban Development Department
 
Chapter 3 parth urdpfi (1)
Chapter 3 parth urdpfi (1)Chapter 3 parth urdpfi (1)
Chapter 3 parth urdpfi (1)
 
Town Planning
Town Planning Town Planning
Town Planning
 
City and regional planning lec 5
City and regional planning  lec 5City and regional planning  lec 5
City and regional planning lec 5
 
Urban heritage conservation , India
Urban heritage conservation , IndiaUrban heritage conservation , India
Urban heritage conservation , India
 
Urban spaces
Urban spaces  Urban spaces
Urban spaces
 
Introduction to town planning
Introduction to town planningIntroduction to town planning
Introduction to town planning
 
Hudco Construction Techniques
Hudco Construction TechniquesHudco Construction Techniques
Hudco Construction Techniques
 
Smart City Mission (India)
Smart City Mission (India)Smart City Mission (India)
Smart City Mission (India)
 
Origin of cities
Origin of citiesOrigin of cities
Origin of cities
 
Passive architecture
Passive architecturePassive architecture
Passive architecture
 
Regional plan
Regional plan Regional plan
Regional plan
 
Sustainable Transportation
Sustainable TransportationSustainable Transportation
Sustainable Transportation
 

Similar to Secure physical infrastructure

PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental ControlsPACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental ControlsPace IT at Edmonds Community College
 
11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docxmoggdede
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatanceKudzi Chikwatu
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security BackgroundNicholas Davis
 
Information security background
Information security backgroundInformation security background
Information security backgroundNicholas Davis
 
Take the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security ProtectionTake the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security ProtectionVTECH SOLUTION
 
Week 11 - Physical 2.pdf
Week 11 - Physical 2.pdfWeek 11 - Physical 2.pdf
Week 11 - Physical 2.pdfVinc2ntCabrera
 
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newJupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newMaxpromotion
 
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newJupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newMaxpromotion
 
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newJupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newMaxpromotion
 
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newJupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newMaxpromotion
 
IT Network Security Policy
IT Network Security PolicyIT Network Security Policy
IT Network Security Policyssuser06c4a6
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security madunix
 
CYBERSECURITY.pptx
CYBERSECURITY.pptxCYBERSECURITY.pptx
CYBERSECURITY.pptxItzRoswell1
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMChristopher Nanchengwa
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence SystemJoseph Yosi Margalit
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxMohanPandey31
 

Similar to Secure physical infrastructure (20)

PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental ControlsPACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
 
11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
08 pdf show-239
08   pdf show-23908   pdf show-239
08 pdf show-239
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatance
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
 
Information security background
Information security backgroundInformation security background
Information security background
 
Take the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security ProtectionTake the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security Protection
 
Week 11 - Physical 2.pdf
Week 11 - Physical 2.pdfWeek 11 - Physical 2.pdf
Week 11 - Physical 2.pdf
 
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newJupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 new
 
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newJupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 new
 
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newJupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 new
 
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newJupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 new
 
IT Network Security Policy
IT Network Security PolicyIT Network Security Policy
IT Network Security Policy
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 
CYBERSECURITY.pptx
CYBERSECURITY.pptxCYBERSECURITY.pptx
CYBERSECURITY.pptx
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
 
Information Security - I.T Project Management
Information Security - I.T Project ManagementInformation Security - I.T Project Management
Information Security - I.T Project Management
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence System
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptx
 

More from Pallavi Agarwal

Smoothing in Digital Image Processing
Smoothing in Digital Image ProcessingSmoothing in Digital Image Processing
Smoothing in Digital Image ProcessingPallavi Agarwal
 
Presentation on Software Piracy
Presentation on Software PiracyPresentation on Software Piracy
Presentation on Software PiracyPallavi Agarwal
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETPallavi Agarwal
 
VANET for Security using Cryptography
VANET for Security using Cryptography VANET for Security using Cryptography
VANET for Security using Cryptography Pallavi Agarwal
 
VANET: Trust and Hashing
VANET: Trust and HashingVANET: Trust and Hashing
VANET: Trust and HashingPallavi Agarwal
 
Overview of Trust and Cryptography in VANET
Overview of Trust and Cryptography in VANET Overview of Trust and Cryptography in VANET
Overview of Trust and Cryptography in VANET Pallavi Agarwal
 
Security and Trust Management in VANET
Security and Trust Management in VANETSecurity and Trust Management in VANET
Security and Trust Management in VANETPallavi Agarwal
 

More from Pallavi Agarwal (10)

Smoothing in Digital Image Processing
Smoothing in Digital Image ProcessingSmoothing in Digital Image Processing
Smoothing in Digital Image Processing
 
Facial Recognition
Facial RecognitionFacial Recognition
Facial Recognition
 
Presentation on Software Piracy
Presentation on Software PiracyPresentation on Software Piracy
Presentation on Software Piracy
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANET
 
VANET for Security using Cryptography
VANET for Security using Cryptography VANET for Security using Cryptography
VANET for Security using Cryptography
 
Introduction of VANET
Introduction of VANETIntroduction of VANET
Introduction of VANET
 
VANET: Trust and Hashing
VANET: Trust and HashingVANET: Trust and Hashing
VANET: Trust and Hashing
 
Overview of Trust and Cryptography in VANET
Overview of Trust and Cryptography in VANET Overview of Trust and Cryptography in VANET
Overview of Trust and Cryptography in VANET
 
Security and Trust Management in VANET
Security and Trust Management in VANETSecurity and Trust Management in VANET
Security and Trust Management in VANET
 
Review Paper on VANET
Review Paper on VANETReview Paper on VANET
Review Paper on VANET
 

Recently uploaded

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 

Recently uploaded (20)

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 

Secure physical infrastructure

  • 2. What is Physical Infrastructure ● The physical infrastructure is the foundation on which all enterprise systems operate – power, communication, computing, control and security. Research shows that faults within the physical infrastructure cause a majority of system downtime.
  • 3. Secure physical infrastructure ● Security can be best achieved by ensuring multiple layers of security and not depending on a single measure. The controls for physical and environmental security are defined in three areas: – Security of the premise – Security of the equipment – Secure behavior
  • 4. Security Of The Premise Components:- ● Physical security perimeter ● Physical entry controls ● Securing offices, rooms and facilities ● Isolated delivery and loading areas ● Working in secure areas
  • 5. Physical security perimeter  boundary of the premise  entry points  protective wall  doors strong enough  Entry gates controlled by cards  watchmen, guards or receptionist monitoring the entry points
  • 6. Physical entry controls  Only authorized persons should be allowed access to the secure areas.  This objective could be achieved by having a clear access control policy defining the access rights.  These measures may take the form of access controlled devices like swipe card controlled doors, logging information about visitors and visible identification badges.
  • 7. Securing offices, rooms and facilities  Support facilities like photocopier, fax machines, which are constantly accessed by everyone, should be located away from the secure area.  Suitable intruder detection systems like CCTV, motion sensors etc. should be installed and regularly tested.
  • 8. Working in secure areas  Location of the secure office within the physically secure perimeter should be chosen with care.  All the risks pertaining to fire, flood, explosion, civil unrest and other forms of natural or man made disaster should be considered.  There could also be threat from neighboring premises caused by leakage of water, spreading of fire or storage of toxic/inflammable/explosive material.  Even bulk supplies like stationery should not be stored within the secure premises.
  • 9. Isolated delivery and loading areas  In industrial premises there could be constant movement of incoming and outgoing material.  All this traffic needs to be isolated from the secure office area so that it does not pose a threat.
  • 10. Security Of The Equipment Components: ● Equipment sitting and protection ● Power supplies ● Cabling Security ● Equipment Maintenance ● Security of equipment off-premises ● Secure disposal or re-use of equipment
  • 11. Equipment sitting and protection  Information processing equipment needs to be handled carefully.  It reduce the risk from environmental threats and hazards.  Reduce opportunity for unauthorized access.
  • 12. Power supplies  Information processing will come to a halt in the absence of a suitable power supply.  So equipment should be protected from power failure.
  • 13. Cabling Security  Power and telecommunication cabling carrying data or supporting information services shall be protected from interception or damage
  • 14. Equipment Maintenance  It is normally expected that due care is taken for equipment maintenance and proper records are maintained.  One is to maintain record of faults that were noticed and the second step is to maintain records of all equipment sent off the premises for maintenance.
  • 15. Security of equipment off-premises  Security procedures and controls shall be used to secure equipment used outside any company’s premies
  • 16. Secure disposal or re-use of equipment  Every such device should be subjected to a thorough erasing and overwriting to destroy the data.  Since some reports claim that the data could be recovered even after multiple overwriting and formatting, it may be desirable to physically destroy the media containing top secret information.
  • 17. Secure Behaviour Components ● Clear desk and clear screen policy ● Removal of property
  • 18. Clear desk and clear screen policy  Lock up all documents and media when not used.  Protect the computers and terminals through use of key locks, passwords, and screen savers.  Fax and telex machines used for confidential information should not be left unattended.  Access to photocopiers and scanners is restricted after office hours.  Printing of classified information should be supervised and all printouts must be removed immediately.
  • 19. Removal of property  Any movement of equipment, information or software should be only with proper authorization.  All these movements should be logged and records maintained for all outgoing and incoming items.
  • 21. Introduction  Traditionally, organizations have relied on policies.  These documents, once issued, provide top down influence for everyone in the company—from business units to departments to individual employees.  One of the major challenges for an organization in this area is the continued growth and adaptation of the policies to mirror the transformation within the organization.
  • 22. Contd…  The fastest area of growth and change within an organization is Information Systems. With the rapid development and push toward new technologies, organizations find themselves striving to maintain current technical environments with outdated policies.  Secondly, with the emergence of new technology strategies such as Intranets and Extranets, security and the protection of informational assets has become paramount.
  • 23. Contd…  The first step is an enterprise-wide Information Systems Security Policy that is consistently enforced even as business needs change.  Unfortunately, most companies have only bits and pieces of security scattered throughout the organization. These may make some departments or individuals feel safe, but they do little to protect the enterprise as a whole.
  • 24. What is PPT methodology?  PPT stands for People, Policy, & Technology. The security process is a mixture of these three elements. Each element depends in some manner on the other elements.
  • 25.
  • 26. People  This core element is the most important. The people element comprises the people and various roles and responsibilities within the organization.  These are the people that are put in place to execute and support the process.  A few key roles include senior management, security administrators, system and IT administrators, end users, and auditors.
  • 27. Policy  This element comprises the security vision statement, security policy and standards, and the control documentation.  This is basically the written security environment— the bible that the security process will refer to for direction and guidance.
  • 28. Technology  This element includes tools, methods, and mechanisms in place to support the process.  These are core technologies—the operating systems, the databases, the applications, the security tools— embraced by the organization.  The technology then is the enforcement, monitoring, and operational tool that will facilitate the process.