SlideShare a Scribd company logo
1 of 43
Download to read offline
1
1 1 tohttps://github.com/syaifulahdan/
INFORMATION SECURITY
Physical Security Threat
 Seven Major Sources of Physical Loss
 Community Roles
 Acces Controls
 Facilities Management
 Control for Protecting the Secure Facility
 ID Card and Badges
 Locks and Keys
 Mantraps
 Electronic Monitoring
 Alarms and Alarms Systems
 Computer Rooms and Wiring Closets
 Interior Walls and Doors
 Fire Safety
 Fire Detection and Response
 Fire Detection
 Fire Suppression
 Gaseous Emission Systems
 Failure of Supporting Utilities
and structural collapse
+ Heating, Bentilation, And Air Cond
 Ventilation Shafts
 Power Management And Conditioning
 Uniterruptible Poser Supplies (UPS)
 Emergency Shutoff
 Electrical Terms
 Water Problems
 Structural Collapse
 Testing Facility Systems
 Interception of Data
 Mobile and Portable Systems
 Stopping Laptop Losses
 Remote Computing Security
 Special Considerations for Physical Security Threat
 Inventory Management
2
2 2 tohttps://github.com/syaifulahdan/
Physical Security :Professor Saiedian
If someone really wants to get at the information, it is not
difficult if they can gain physical access to the computer or
hard drive.
--Microsoft White Paper, July 1999
3
3 3 tohttps://github.com/syaifulahdan/
Learning Objectives:
Upon completion of this chapter you should
be able to:
 Understand the conceptual need for physical security.
 Identify threats to information security that are unique to
physical security.
 Describe the key physical security considerations for
selecting a facility site.
 Identify physical security monitoring components.
 Grasp the essential elements of access control within the
scope of facilities management.
 Understand the criticality of fire safety programs to all
physical security programs.
4
4 4 tohttps://github.com/syaifulahdan/
Learning Objectives:
Upon completion of this chapter you should
be able to:
 Describe the components of fire detection and response.
 Grasp the impact of interruptions in the service of
supporting utilities.
 Understand the technical details of uninterruptible power
supplies and how they are used to increase availability of
information assets.
 Discuss critical physical environment considerations for
computing facilities.
 Discuss countermeasures to the physical theft of computing
devices.
5
5 5 tohttps://github.com/syaifulahdan/
Seven Major Sources of
Physical Loss
 Temperature extremes
 Gases
 Liquids
 Living organisms
 Projectiles
 Movement
 Energy anomalies
6
6 6 tohttps://github.com/syaifulahdan/
Community Roles
 General management:
 responsible for the security of the facility
 IT management and professionals:
 responsible for environmental and access security
 Information security management and
professionals:
 perform risk assessments and implementation
reviews
7
7 7 tohttps://github.com/syaifulahdan/
Access Controls
There are a number of physical access
controls that are uniquely suited to the
physical entry and exit of people to and from
the organization’s facilities, including
 biometrics
 smart cards
 wireless enabled keycards
8
8 8 tohttps://github.com/syaifulahdan/
Facilities Management
 A secure facility is a physical location that
has been engineered with controls designed
to minimize the risk of attacks from physical
threats
 A secure facility can use the natural terrain;
traffic flow, urban development, and can
complement these features with protection
mechanisms such as fences, gates, walls,
guards, and alarms
9
9 9 tohttps://github.com/syaifulahdan/
Controls for Protecting the
Secure Facility
 Walls, Fencing, and
Gates
 Guards
 Dogs, ID Cards, and
Badges
 Locks and Keys
 Mantraps
 Electronic Monitoring
 Alarms and Alarm
Systems
 Computer Rooms
 Walls and Doors
10
10 10 tohttps://github.com/syaifulahdan/
ID Cards and Badges
 Ties physical security to information access with
identification cards (ID) and/or name badges
 ID card is typically concealed
 Name badge is visible
 These devices are actually biometrics (facial
recognition)
 Should not be the only control as they can be easily
duplicated, stolen, and modified
 Tailgating occurs when unauthorized individuals
follow authorized users through the control
11
11 11 tohttps://github.com/syaifulahdan/
Locks and Keys
 There are two types of locks
 mechanical and electro-mechanical
 Locks can also be divided into four categories
 manual, programmable, electronic, and biometric
 Locks fail and facilities need alternative procedures
for access
 Locks fail in one of two ways:
 when the lock of a door fails and the door becomes
unlocked, that is a fail-safe lock
 when the lock of a door fails and the door remains locked,
this is a fail-secure lock
12
12 12 tohttps://github.com/syaifulahdan/
Figure 9-1
13
13 13 tohttps://github.com/syaifulahdan/
Mantraps
 An enclosure that has an entry point and a
different exit point
 The individual enters the mantrap, requests
access, and if verified, is allowed to exit the
mantrap into the facility
 If the individual is denied entry, they are not
allowed to exit until a security official
overrides the automatic locks of the
enclosure
14
14 14 tohttps://github.com/syaifulahdan/
Figure 9-2 Mantraps
15
15 15 tohttps://github.com/syaifulahdan/
Electronic Monitoring
 Records events where other types of physical
controls are not practical
 May use cameras with video recorders
 Drawbacks:
 reactive and do not prevent access or prohibited
activity
 recordings often not monitored in real time and
must be reviewed to have any value
16
16 16 tohttps://github.com/syaifulahdan/
Alarms and Alarm Systems
 Alarm systems notify when an event occurs
 Used for fire, intrusion, environmental
disturbance, or an interruption in services
 These systems rely on sensors that detect
the event: motion detectors, smoke detectors,
thermal detectors, glass breakage detectors,
weight sensors, and contact sensors
17
17 17 tohttps://github.com/syaifulahdan/
Computer Rooms and Wiring
Closets
 Computer rooms and wiring and
communications closets require special
attention
 Logical controls are easily defeated, if an
attacker gains physical access to the
computing equipment
 Custodial staff are often the least scrutinized
of those who have access to offices and are
given the greatest degree of unsupervised
access
18
18 18 tohttps://github.com/syaifulahdan/
Interior Walls and Doors
 The walls in a facility are typically either:
 standard interior
 firewall
 All high-security areas must have firewall grade
walls to provide physical security from potential
intruders and improves the facility's resistance to
fires
 Doors that allow access into secured rooms should
also be evaluated
 Computer rooms and wiring closets can have push
or crash bars installed to meet building codes and
provide much higher levels of security than the
standard door pull handle
19
19 19 tohttps://github.com/syaifulahdan/
Fire Safety
 The most serious threat to the safety of the
people who work in the organization is the
possibility of fire
 Fires account for more property damage,
personal injury, and death than any other
threat
 It is imperative that physical security plans
examine and implement strong measures to
detect and respond to fires and fire hazards
20
20 20 tohttps://github.com/syaifulahdan/
Fire Detection and Response
 Fire suppression systems are devices installed and
maintained to detect and respond to a fire
 They work to deny an environment of one of the
three requirements for a fire to burn: heat, fuel, and
oxygen
 Water and water mist systems reduce the temperature and
saturate some fuels to prevent ignition
 Carbon dioxide systems rob fire of its oxygen
 Soda acid systems deny fire its fuel, preventing spreading
 Gas-based systems disrupt the fire’s chemical reaction but
leave enough oxygen for people to survive for a short time
21
21 21 tohttps://github.com/syaifulahdan/
Fire Detection
 Before a fire can be suppressed, it must be
detected
 Fire detection systems fall into two general
categories:
 manual and automatic
 Part of a complete fire safety program includes
individuals that monitor the chaos of a fire
evacuation to prevent an attacker accessing offices
 There are three basic types of fire detection
systems: thermal detection, smoke detection, and
flame detection
 Smoke detectors operate in one of three ways:
photoelectric, ionization, and air-aspirating
22
22 22 tohttps://github.com/syaifulahdan/
Fire Suppression
 Can be portable, manual, or automatic
 Portable extinguishers are rated by the type of fire:
 Class A: fires of ordinary combustible fuels
 Class B: fires fueled by combustible liquids or gases
 Class C: fires with energized electrical equipment
 Class D: fires fueled by combustible metals
 Installed systems apply suppressive agents, either sprinkler or
gaseous systems
 Sprinkler systems are designed to apply liquid, usually water
 In sprinkler systems, the organization can implement wet-pipe,
dry-pipe, or pre-action systems
 Water mist sprinklers are the newest form of sprinkler systems
and rely on microfine mists
23
23 23 tohttps://github.com/syaifulahdan/
Figure 9-3 Water Sprinkler
System
24
24 24 tohttps://github.com/syaifulahdan/
Gaseous Emission Systems
 Until recently there were only two types of systems
 carbon dioxide and halon
 Carbon dioxide robs a fire of its oxygen supply
 Halon is a clean agent but has been classified as an
ozone-depleting substance, and new installations
are prohibited
 Alternative clean agents include the following:
 FM-200
 Inergen
 Carbon dioxide
 FE-13 (trifluromethane)
25
25 25 tohttps://github.com/syaifulahdan/
Figure 9-4 Fire Suppression
System
26
26 26 tohttps://github.com/syaifulahdan/
Failure of Supporting Utilities
and Structural Collapse
 Supporting utilities, such as heating, ventilation and
air conditioning, power, water, and other utilities,
have a significant impact on the continued safe
operation of a facility
 Extreme temperatures and humidity levels, electrical
fluctuations and the interruption of water, sewage,
and garbage services can create conditions that
inject vulnerabilities in systems designed to protect
information
27
27 27 tohttps://github.com/syaifulahdan/
Heating, Ventilation, and Air
Conditioning
HVAC system areas that can cause damage to
information systems:
 Temperature
 Computer systems are subject to damage from extreme temperature
 The optimal temperature for a computing environment (and people) is
between 70 and 74 degrees Fahrenheit
 Filtration
 Humidity
 Static
 One of the leading causes of damage to sensitive circuitry is
electrostatic discharge (ESD)
 A person can generate up to 12,000 volts of static current by walking
across a carpet
28
28 28 tohttps://github.com/syaifulahdan/
Ventilation Shafts
 Security of the ventilation system air
ductwork:
 While in residential buildings the ductwork is quite
small, in large commercial buildings it can be
large enough for an individual to climb through
 If the vents are large, security can install wire
mesh grids at various points to compartmentalize
the runs
29
29 29 tohttps://github.com/syaifulahdan/
Power Management and
Conditioning
 Electrical quantity (voltage level and amperage
rating) is a concern, as is the quality of the power
(cleanliness and proper installation)
 Any noise that interferes with the normal 60 Hertz
cycle can result in inaccurate time clocks or
unreliable internal clocks inside the CPU
 Grounding
 Grounding ensures that the returning flow of current is
properly discharged
 If this is not properly installed it could cause damage to
equipment and injury or death to the person
 Overloading a circuit not only causes problems with
the circuit tripping but can also overload the power
load on an electrical cable, creating the risk of fire
30
30 30 tohttps://github.com/syaifulahdan/
Uninterruptible Power
Supplies (UPSs)
 In case of power outage, a UPS is a backup
power source for major computer systems
 There are four basic configurations of UPS:
 the standby
 ferroresonant standby
 line-interactive
 the true online
31
31 31 tohttps://github.com/syaifulahdan/
Uninterruptible Power
Supplies (UPSs)
 A standby or offline UPS is an offline battery backup that
detects the interruption of power to the power equipment
 A ferroresonant standby UPS is still an offline UPS
 the ferroresonant transformer reduces power problems
 The line-interactive UPS is always connected to the
output, so has a much faster response time and
incorporates power conditioning and line filtering
 The true online UPS works in the opposite fashion to a
standby UPS since the primary power source is the
battery, with the power feed from the utility constantly
recharging the batteries
 this model allows constant feed to the system, while completely
eliminating power quality problems
32
32 32 tohttps://github.com/syaifulahdan/
Emergency Shutoff
 One important aspect of power management
in any environment is the need to be able to
stop power immediately should the current
represent a risk to human or machine safety
 Most computer rooms and wiring closets are
equipped with an emergency power shutoff,
which is usually a large red button,
prominently placed to facilitate access, with
an accident-proof cover to prevent
unintentional use
33
33 33 tohttps://github.com/syaifulahdan/
Electrical Terms
 Fault: momentary interruption in power
 Blackout: prolonged interruption in power
 Sag: momentary drop in power voltage levels
 Brownout: prolonged drop in power voltage
levels
 Spike: momentary increase in power voltage
levels
 Surge: prolonged increase in power voltage
levels
34
34 34 tohttps://github.com/syaifulahdan/
Water Problems
 Lack of water poses problems to systems,
including the functionality of fire suppression
systems, and the ability of water chillers to
provide air-conditioning
 On the other hand, a surplus of water, or
water pressure, poses a real threat
 It is therefore important to integrate water
detection systems into the alarm systems
that regulate overall facilities operations
35
35 35 tohttps://github.com/syaifulahdan/
Structural Collapse
 Unavoidable forces can cause failures of structures
that house the organization
 Structures are designed and constructed with
specific load limits, and overloading these design
limits, intentionally or unintentionally, inevitably
results in structural failure and potentially loss of life
or injury
 Periodic inspections by qualified civil engineers
assists in identifying potentially dangerous structural
conditions well before they fail
36
36 36 tohttps://github.com/syaifulahdan/
Testing Facility Systems
 Physical security of the facility must be
constantly documented, evaluated, and
tested
 Documentation of the facility’s configuration,
operation, and function is integrated into
disaster recovery plans and standing
operating procedures
 Testing provides information necessary to
improve the physical security in the facility
and identifies weak points
37
37 37 tohttps://github.com/syaifulahdan/
Interception of Data
 There are three methods of data interception:
 Direct observation
 Data transmission
 Eavesdropping on signals
 TEMPEST is a technology that involves the control of
devices that emit electromagnetic radiation (EMR) in
such a manner that the data cannot be reconstructed
38
38 38 tohttps://github.com/syaifulahdan/
Mobile and Portable Systems
 With the increased threat to overall information
security for laptops, handhelds, and PDAs, mobile
computing requires even more security than the
average in-house system
 Many of these mobile computing systems not only
have corporate information stored within them, many
are configured to facilitate the user’s access into the
organization’s secure computing facilities
39
39 39 tohttps://github.com/syaifulahdan/
Stopping Laptop Losses
Controls support the security and retrieval of
lost or stolen laptops
 CompuTrace is stored on a laptop’s hardware and
reports to a central monitoring center
 Burglar alarms made up of a PC card that
contains a motion detector
 If the alarm in the laptop is armed, and the laptop is
moved beyond a configured distance, the alarm
triggers an audible alarm
 The system also shuts down the computer and
includes an encryption option to completely render the
information unusable
40
40 40 tohttps://github.com/syaifulahdan/
Figure 9-6 Laptop Theft
Deterrence
41
41 41 tohttps://github.com/syaifulahdan/
Remote Computing Security
 Remote site computing - distant from the
organizational facility
 Telecommuting - computing using
telecommunications including Internet, dial-up, or
leased point-to-point links
 Employees may need to access networks on
business trips
 Telecommuters need access from home systems or
satellite offices
 To provide a secure extension of the organization’s
internal networks, all external connections and
systems must be secured
42
42 42 tohttps://github.com/syaifulahdan/
Special Considerations for
Physical Security Threats
 Develop physical security in-house or outsource?
 Many qualified and professional agencies
 Benefit of outsourcing physical security includes gaining
the experience and knowledge of these agencies
 Downside includes high expense, loss of control over the
individual components, and the level of trust that must be
placed in another company
 Social engineering is the use of people skills to
obtain information from employees
43
43 43 tohttps://github.com/syaifulahdan/
Inventory Management
 Computing equipment should be inventoried and
inspected on a regular basis
 Classified information should also be inventoried
and managed
 Whenever a classified document is reproduced, a stamp
should be placed on the original before it is copied
 This stamp states the document’s classification level and
document number for tracking
 Each classified copy is issued to its receiver, who signs for
the document

More Related Content

What's hot

IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
 
Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443Yokogawa1
 
Cybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesCybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesSlideTeam
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityThe Open Group SA
 
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton ChuvakinAnton Chuvakin
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)PECB
 
Unit - I cyber security fundamentals part -1.pptx
Unit - I cyber security fundamentals part -1.pptxUnit - I cyber security fundamentals part -1.pptx
Unit - I cyber security fundamentals part -1.pptxkarthikaparthasarath
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesSpiceworks
 
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSDISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSiQHub
 
[공개용]정보보호, 우리 업무의 기본
[공개용]정보보호, 우리 업무의 기본[공개용]정보보호, 우리 업무의 기본
[공개용]정보보호, 우리 업무의 기본hyundai-mnsoft
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk M sharifi
 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset SecurityKarthikeyan Dhayalan
 
Advanced Data Center Security
Advanced Data Center SecurityAdvanced Data Center Security
Advanced Data Center Securitymanoharparakh
 
Introduction to SAP ERP - by http://www.sapficotraining.com/
Introduction to SAP ERP - by http://www.sapficotraining.com/Introduction to SAP ERP - by http://www.sapficotraining.com/
Introduction to SAP ERP - by http://www.sapficotraining.com/SapFico Training
 
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 BoothHey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 BoothAnton Chuvakin
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operationsPiyush Jain
 

What's hot (20)

IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443
 
Cybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesCybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation Slides
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber Security
 
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
 
Unit - I cyber security fundamentals part -1.pptx
Unit - I cyber security fundamentals part -1.pptxUnit - I cyber security fundamentals part -1.pptx
Unit - I cyber security fundamentals part -1.pptx
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup Strategies
 
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSDISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
 
[공개용]정보보호, 우리 업무의 기본
[공개용]정보보호, 우리 업무의 기본[공개용]정보보호, 우리 업무의 기본
[공개용]정보보호, 우리 업무의 기본
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk
 
Soc
SocSoc
Soc
 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset Security
 
Advanced Data Center Security
Advanced Data Center SecurityAdvanced Data Center Security
Advanced Data Center Security
 
Introduction to SAP ERP - by http://www.sapficotraining.com/
Introduction to SAP ERP - by http://www.sapficotraining.com/Introduction to SAP ERP - by http://www.sapficotraining.com/
Introduction to SAP ERP - by http://www.sapficotraining.com/
 
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 BoothHey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
Gdpr presentation
Gdpr presentationGdpr presentation
Gdpr presentation
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operations
 

Similar to Chapter 2 phisycal security threat

Physical security
Physical securityPhysical security
Physical securityDhani Ahmad
 
physicalsecurity-150317020111-conversion-gate01.pdf
physicalsecurity-150317020111-conversion-gate01.pdfphysicalsecurity-150317020111-conversion-gate01.pdf
physicalsecurity-150317020111-conversion-gate01.pdfJohnLagman3
 
Week 11 - Physical 2.pdf
Week 11 - Physical 2.pdfWeek 11 - Physical 2.pdf
Week 11 - Physical 2.pdfVinc2ntCabrera
 
Extronics Advance AeroScout Real Time Worker Location use case
Extronics Advance AeroScout Real Time Worker Location use caseExtronics Advance AeroScout Real Time Worker Location use case
Extronics Advance AeroScout Real Time Worker Location use caseSusie Marriott
 
Chapter 6 network security
Chapter 6   network securityChapter 6   network security
Chapter 6 network securitySyaiful Ahdan
 
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental ControlsPACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental ControlsPace IT at Edmonds Community College
 
CiNPA Security SIG - Physical Security
CiNPA Security SIG - Physical SecurityCiNPA Security SIG - Physical Security
CiNPA Security SIG - Physical SecurityCiNPA Security SIG
 
Electronic security system
Electronic security systemElectronic security system
Electronic security systemAtharva Chavan
 
An electronic switch sensor with a point to-point intrusive monitoring system
An electronic switch sensor with a point to-point intrusive monitoring systemAn electronic switch sensor with a point to-point intrusive monitoring system
An electronic switch sensor with a point to-point intrusive monitoring systemZac Darcy
 
Safety Instrumentation
Safety Instrumentation Safety Instrumentation
Safety Instrumentation Living Online
 
DefCon_2015_Slides_Krotofil_Larsen
DefCon_2015_Slides_Krotofil_LarsenDefCon_2015_Slides_Krotofil_Larsen
DefCon_2015_Slides_Krotofil_LarsenMarina Krotofil
 
Barrier Thinking - rev 2 May 15.pptx
Barrier Thinking - rev 2 May 15.pptxBarrier Thinking - rev 2 May 15.pptx
Barrier Thinking - rev 2 May 15.pptxPatrickAyan
 
Barrier Thinking - rev 2 May 15.pptx
Barrier Thinking - rev 2 May 15.pptxBarrier Thinking - rev 2 May 15.pptx
Barrier Thinking - rev 2 May 15.pptxPatrickAyan
 
Step Into Security Webinar - Physical Security Integration & Access Control -...
Step Into Security Webinar - Physical Security Integration & Access Control -...Step Into Security Webinar - Physical Security Integration & Access Control -...
Step Into Security Webinar - Physical Security Integration & Access Control -...Keith Harris
 

Similar to Chapter 2 phisycal security threat (20)

Physical security
Physical securityPhysical security
Physical security
 
physicalsecurity-150317020111-conversion-gate01.pdf
physicalsecurity-150317020111-conversion-gate01.pdfphysicalsecurity-150317020111-conversion-gate01.pdf
physicalsecurity-150317020111-conversion-gate01.pdf
 
Chapter 9 (1).ppt
Chapter 9 (1).pptChapter 9 (1).ppt
Chapter 9 (1).ppt
 
home automation
home automationhome automation
home automation
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Week 11 - Physical 2.pdf
Week 11 - Physical 2.pdfWeek 11 - Physical 2.pdf
Week 11 - Physical 2.pdf
 
Extronics Advance AeroScout Real Time Worker Location use case
Extronics Advance AeroScout Real Time Worker Location use caseExtronics Advance AeroScout Real Time Worker Location use case
Extronics Advance AeroScout Real Time Worker Location use case
 
Chapter 6 network security
Chapter 6   network securityChapter 6   network security
Chapter 6 network security
 
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental ControlsPACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
 
CiNPA Security SIG - Physical Security
CiNPA Security SIG - Physical SecurityCiNPA Security SIG - Physical Security
CiNPA Security SIG - Physical Security
 
Electronic security system
Electronic security systemElectronic security system
Electronic security system
 
Access-Control-101-Book.pdf
Access-Control-101-Book.pdfAccess-Control-101-Book.pdf
Access-Control-101-Book.pdf
 
An electronic switch sensor with a point to-point intrusive monitoring system
An electronic switch sensor with a point to-point intrusive monitoring systemAn electronic switch sensor with a point to-point intrusive monitoring system
An electronic switch sensor with a point to-point intrusive monitoring system
 
Safety Instrumentation
Safety Instrumentation Safety Instrumentation
Safety Instrumentation
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
DefCon_2015_Slides_Krotofil_Larsen
DefCon_2015_Slides_Krotofil_LarsenDefCon_2015_Slides_Krotofil_Larsen
DefCon_2015_Slides_Krotofil_Larsen
 
PACE-IT: Introduction to Safety Practices (part 2)
PACE-IT: Introduction to Safety Practices (part 2)PACE-IT: Introduction to Safety Practices (part 2)
PACE-IT: Introduction to Safety Practices (part 2)
 
Barrier Thinking - rev 2 May 15.pptx
Barrier Thinking - rev 2 May 15.pptxBarrier Thinking - rev 2 May 15.pptx
Barrier Thinking - rev 2 May 15.pptx
 
Barrier Thinking - rev 2 May 15.pptx
Barrier Thinking - rev 2 May 15.pptxBarrier Thinking - rev 2 May 15.pptx
Barrier Thinking - rev 2 May 15.pptx
 
Step Into Security Webinar - Physical Security Integration & Access Control -...
Step Into Security Webinar - Physical Security Integration & Access Control -...Step Into Security Webinar - Physical Security Integration & Access Control -...
Step Into Security Webinar - Physical Security Integration & Access Control -...
 

More from Syaiful Ahdan

Sertifikat EC00202128391
 Sertifikat EC00202128391 Sertifikat EC00202128391
Sertifikat EC00202128391Syaiful Ahdan
 
SP2JPB - Aplikasi Sistem Pelayanan Pemesanan Jasa Perbaikan Pada Bengkel Alam...
SP2JPB - Aplikasi Sistem Pelayanan Pemesanan Jasa Perbaikan Pada Bengkel Alam...SP2JPB - Aplikasi Sistem Pelayanan Pemesanan Jasa Perbaikan Pada Bengkel Alam...
SP2JPB - Aplikasi Sistem Pelayanan Pemesanan Jasa Perbaikan Pada Bengkel Alam...Syaiful Ahdan
 
Sertifikat ec00202059774
Sertifikat ec00202059774Sertifikat ec00202059774
Sertifikat ec00202059774Syaiful Ahdan
 
Sertifikat ec00202059775
Sertifikat ec00202059775Sertifikat ec00202059775
Sertifikat ec00202059775Syaiful Ahdan
 
Sertifikat EC00202045078
Sertifikat EC00202045078Sertifikat EC00202045078
Sertifikat EC00202045078Syaiful Ahdan
 
Sertifikat EC00202044723
 Sertifikat EC00202044723 Sertifikat EC00202044723
Sertifikat EC00202044723Syaiful Ahdan
 
Sertifikat EC00202023523
Sertifikat EC00202023523Sertifikat EC00202023523
Sertifikat EC00202023523Syaiful Ahdan
 
Sertifikat EC00201826309
Sertifikat EC00201826309Sertifikat EC00201826309
Sertifikat EC00201826309Syaiful Ahdan
 
Sertifikat EC00202023149
Sertifikat EC00202023149Sertifikat EC00202023149
Sertifikat EC00202023149Syaiful Ahdan
 
Sertifikat EC00202022868
Sertifikat EC00202022868Sertifikat EC00202022868
Sertifikat EC00202022868Syaiful Ahdan
 
Sertifikat EC00202021343
Sertifikat EC00202021343Sertifikat EC00202021343
Sertifikat EC00202021343Syaiful Ahdan
 
Sertifikat EC00202022755
Sertifikat EC00202022755Sertifikat EC00202022755
Sertifikat EC00202022755Syaiful Ahdan
 
Sertifikat EC00201987196
Sertifikat EC00201987196Sertifikat EC00201987196
Sertifikat EC00201987196Syaiful Ahdan
 
Sertifikat EC00201856484
Sertifikat EC00201856484Sertifikat EC00201856484
Sertifikat EC00201856484Syaiful Ahdan
 
Sertifikat EC00201856352
Sertifikat EC00201856352Sertifikat EC00201856352
Sertifikat EC00201856352Syaiful Ahdan
 
Sertifikat EC00201856994
Sertifikat EC00201856994Sertifikat EC00201856994
Sertifikat EC00201856994Syaiful Ahdan
 
Sertifikat EC00201856895
Sertifikat EC00201856895Sertifikat EC00201856895
Sertifikat EC00201856895Syaiful Ahdan
 
Meeting 2 introdcution network administrator
Meeting 2   introdcution network administratorMeeting 2   introdcution network administrator
Meeting 2 introdcution network administratorSyaiful Ahdan
 

More from Syaiful Ahdan (20)

Sertifikat EC00202128391
 Sertifikat EC00202128391 Sertifikat EC00202128391
Sertifikat EC00202128391
 
SP2JPB - Aplikasi Sistem Pelayanan Pemesanan Jasa Perbaikan Pada Bengkel Alam...
SP2JPB - Aplikasi Sistem Pelayanan Pemesanan Jasa Perbaikan Pada Bengkel Alam...SP2JPB - Aplikasi Sistem Pelayanan Pemesanan Jasa Perbaikan Pada Bengkel Alam...
SP2JPB - Aplikasi Sistem Pelayanan Pemesanan Jasa Perbaikan Pada Bengkel Alam...
 
Sertifikat ec00202059774
Sertifikat ec00202059774Sertifikat ec00202059774
Sertifikat ec00202059774
 
Sertifikat ec00202059775
Sertifikat ec00202059775Sertifikat ec00202059775
Sertifikat ec00202059775
 
Sertifikat EC00202045078
Sertifikat EC00202045078Sertifikat EC00202045078
Sertifikat EC00202045078
 
Sertifikat EC00202044723
 Sertifikat EC00202044723 Sertifikat EC00202044723
Sertifikat EC00202044723
 
Sertifikat EC00202023523
Sertifikat EC00202023523Sertifikat EC00202023523
Sertifikat EC00202023523
 
Sertifikat EC00201826309
Sertifikat EC00201826309Sertifikat EC00201826309
Sertifikat EC00201826309
 
Sertifikat EC00202023149
Sertifikat EC00202023149Sertifikat EC00202023149
Sertifikat EC00202023149
 
Sertifikat EC00202022868
Sertifikat EC00202022868Sertifikat EC00202022868
Sertifikat EC00202022868
 
Sertifikat EC00202021343
Sertifikat EC00202021343Sertifikat EC00202021343
Sertifikat EC00202021343
 
Sertifikat EC00202022755
Sertifikat EC00202022755Sertifikat EC00202022755
Sertifikat EC00202022755
 
Sertifikat EC00201987196
Sertifikat EC00201987196Sertifikat EC00201987196
Sertifikat EC00201987196
 
Sertifikat EC00201856484
Sertifikat EC00201856484Sertifikat EC00201856484
Sertifikat EC00201856484
 
Sertifikat EC00201856352
Sertifikat EC00201856352Sertifikat EC00201856352
Sertifikat EC00201856352
 
Sertifikat EC00201856994
Sertifikat EC00201856994Sertifikat EC00201856994
Sertifikat EC00201856994
 
Sertifikat EC00201856895
Sertifikat EC00201856895Sertifikat EC00201856895
Sertifikat EC00201856895
 
Meeting 2 introdcution network administrator
Meeting 2   introdcution network administratorMeeting 2   introdcution network administrator
Meeting 2 introdcution network administrator
 
Pertemuan 5
Pertemuan 5Pertemuan 5
Pertemuan 5
 
Pertemuan 4
Pertemuan 4Pertemuan 4
Pertemuan 4
 

Recently uploaded

What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 

Recently uploaded (20)

What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 

Chapter 2 phisycal security threat

  • 1. 1 1 1 tohttps://github.com/syaifulahdan/ INFORMATION SECURITY Physical Security Threat  Seven Major Sources of Physical Loss  Community Roles  Acces Controls  Facilities Management  Control for Protecting the Secure Facility  ID Card and Badges  Locks and Keys  Mantraps  Electronic Monitoring  Alarms and Alarms Systems  Computer Rooms and Wiring Closets  Interior Walls and Doors  Fire Safety  Fire Detection and Response  Fire Detection  Fire Suppression  Gaseous Emission Systems  Failure of Supporting Utilities and structural collapse + Heating, Bentilation, And Air Cond  Ventilation Shafts  Power Management And Conditioning  Uniterruptible Poser Supplies (UPS)  Emergency Shutoff  Electrical Terms  Water Problems  Structural Collapse  Testing Facility Systems  Interception of Data  Mobile and Portable Systems  Stopping Laptop Losses  Remote Computing Security  Special Considerations for Physical Security Threat  Inventory Management
  • 2. 2 2 2 tohttps://github.com/syaifulahdan/ Physical Security :Professor Saiedian If someone really wants to get at the information, it is not difficult if they can gain physical access to the computer or hard drive. --Microsoft White Paper, July 1999
  • 3. 3 3 3 tohttps://github.com/syaifulahdan/ Learning Objectives: Upon completion of this chapter you should be able to:  Understand the conceptual need for physical security.  Identify threats to information security that are unique to physical security.  Describe the key physical security considerations for selecting a facility site.  Identify physical security monitoring components.  Grasp the essential elements of access control within the scope of facilities management.  Understand the criticality of fire safety programs to all physical security programs.
  • 4. 4 4 4 tohttps://github.com/syaifulahdan/ Learning Objectives: Upon completion of this chapter you should be able to:  Describe the components of fire detection and response.  Grasp the impact of interruptions in the service of supporting utilities.  Understand the technical details of uninterruptible power supplies and how they are used to increase availability of information assets.  Discuss critical physical environment considerations for computing facilities.  Discuss countermeasures to the physical theft of computing devices.
  • 5. 5 5 5 tohttps://github.com/syaifulahdan/ Seven Major Sources of Physical Loss  Temperature extremes  Gases  Liquids  Living organisms  Projectiles  Movement  Energy anomalies
  • 6. 6 6 6 tohttps://github.com/syaifulahdan/ Community Roles  General management:  responsible for the security of the facility  IT management and professionals:  responsible for environmental and access security  Information security management and professionals:  perform risk assessments and implementation reviews
  • 7. 7 7 7 tohttps://github.com/syaifulahdan/ Access Controls There are a number of physical access controls that are uniquely suited to the physical entry and exit of people to and from the organization’s facilities, including  biometrics  smart cards  wireless enabled keycards
  • 8. 8 8 8 tohttps://github.com/syaifulahdan/ Facilities Management  A secure facility is a physical location that has been engineered with controls designed to minimize the risk of attacks from physical threats  A secure facility can use the natural terrain; traffic flow, urban development, and can complement these features with protection mechanisms such as fences, gates, walls, guards, and alarms
  • 9. 9 9 9 tohttps://github.com/syaifulahdan/ Controls for Protecting the Secure Facility  Walls, Fencing, and Gates  Guards  Dogs, ID Cards, and Badges  Locks and Keys  Mantraps  Electronic Monitoring  Alarms and Alarm Systems  Computer Rooms  Walls and Doors
  • 10. 10 10 10 tohttps://github.com/syaifulahdan/ ID Cards and Badges  Ties physical security to information access with identification cards (ID) and/or name badges  ID card is typically concealed  Name badge is visible  These devices are actually biometrics (facial recognition)  Should not be the only control as they can be easily duplicated, stolen, and modified  Tailgating occurs when unauthorized individuals follow authorized users through the control
  • 11. 11 11 11 tohttps://github.com/syaifulahdan/ Locks and Keys  There are two types of locks  mechanical and electro-mechanical  Locks can also be divided into four categories  manual, programmable, electronic, and biometric  Locks fail and facilities need alternative procedures for access  Locks fail in one of two ways:  when the lock of a door fails and the door becomes unlocked, that is a fail-safe lock  when the lock of a door fails and the door remains locked, this is a fail-secure lock
  • 13. 13 13 13 tohttps://github.com/syaifulahdan/ Mantraps  An enclosure that has an entry point and a different exit point  The individual enters the mantrap, requests access, and if verified, is allowed to exit the mantrap into the facility  If the individual is denied entry, they are not allowed to exit until a security official overrides the automatic locks of the enclosure
  • 15. 15 15 15 tohttps://github.com/syaifulahdan/ Electronic Monitoring  Records events where other types of physical controls are not practical  May use cameras with video recorders  Drawbacks:  reactive and do not prevent access or prohibited activity  recordings often not monitored in real time and must be reviewed to have any value
  • 16. 16 16 16 tohttps://github.com/syaifulahdan/ Alarms and Alarm Systems  Alarm systems notify when an event occurs  Used for fire, intrusion, environmental disturbance, or an interruption in services  These systems rely on sensors that detect the event: motion detectors, smoke detectors, thermal detectors, glass breakage detectors, weight sensors, and contact sensors
  • 17. 17 17 17 tohttps://github.com/syaifulahdan/ Computer Rooms and Wiring Closets  Computer rooms and wiring and communications closets require special attention  Logical controls are easily defeated, if an attacker gains physical access to the computing equipment  Custodial staff are often the least scrutinized of those who have access to offices and are given the greatest degree of unsupervised access
  • 18. 18 18 18 tohttps://github.com/syaifulahdan/ Interior Walls and Doors  The walls in a facility are typically either:  standard interior  firewall  All high-security areas must have firewall grade walls to provide physical security from potential intruders and improves the facility's resistance to fires  Doors that allow access into secured rooms should also be evaluated  Computer rooms and wiring closets can have push or crash bars installed to meet building codes and provide much higher levels of security than the standard door pull handle
  • 19. 19 19 19 tohttps://github.com/syaifulahdan/ Fire Safety  The most serious threat to the safety of the people who work in the organization is the possibility of fire  Fires account for more property damage, personal injury, and death than any other threat  It is imperative that physical security plans examine and implement strong measures to detect and respond to fires and fire hazards
  • 20. 20 20 20 tohttps://github.com/syaifulahdan/ Fire Detection and Response  Fire suppression systems are devices installed and maintained to detect and respond to a fire  They work to deny an environment of one of the three requirements for a fire to burn: heat, fuel, and oxygen  Water and water mist systems reduce the temperature and saturate some fuels to prevent ignition  Carbon dioxide systems rob fire of its oxygen  Soda acid systems deny fire its fuel, preventing spreading  Gas-based systems disrupt the fire’s chemical reaction but leave enough oxygen for people to survive for a short time
  • 21. 21 21 21 tohttps://github.com/syaifulahdan/ Fire Detection  Before a fire can be suppressed, it must be detected  Fire detection systems fall into two general categories:  manual and automatic  Part of a complete fire safety program includes individuals that monitor the chaos of a fire evacuation to prevent an attacker accessing offices  There are three basic types of fire detection systems: thermal detection, smoke detection, and flame detection  Smoke detectors operate in one of three ways: photoelectric, ionization, and air-aspirating
  • 22. 22 22 22 tohttps://github.com/syaifulahdan/ Fire Suppression  Can be portable, manual, or automatic  Portable extinguishers are rated by the type of fire:  Class A: fires of ordinary combustible fuels  Class B: fires fueled by combustible liquids or gases  Class C: fires with energized electrical equipment  Class D: fires fueled by combustible metals  Installed systems apply suppressive agents, either sprinkler or gaseous systems  Sprinkler systems are designed to apply liquid, usually water  In sprinkler systems, the organization can implement wet-pipe, dry-pipe, or pre-action systems  Water mist sprinklers are the newest form of sprinkler systems and rely on microfine mists
  • 24. 24 24 24 tohttps://github.com/syaifulahdan/ Gaseous Emission Systems  Until recently there were only two types of systems  carbon dioxide and halon  Carbon dioxide robs a fire of its oxygen supply  Halon is a clean agent but has been classified as an ozone-depleting substance, and new installations are prohibited  Alternative clean agents include the following:  FM-200  Inergen  Carbon dioxide  FE-13 (trifluromethane)
  • 26. 26 26 26 tohttps://github.com/syaifulahdan/ Failure of Supporting Utilities and Structural Collapse  Supporting utilities, such as heating, ventilation and air conditioning, power, water, and other utilities, have a significant impact on the continued safe operation of a facility  Extreme temperatures and humidity levels, electrical fluctuations and the interruption of water, sewage, and garbage services can create conditions that inject vulnerabilities in systems designed to protect information
  • 27. 27 27 27 tohttps://github.com/syaifulahdan/ Heating, Ventilation, and Air Conditioning HVAC system areas that can cause damage to information systems:  Temperature  Computer systems are subject to damage from extreme temperature  The optimal temperature for a computing environment (and people) is between 70 and 74 degrees Fahrenheit  Filtration  Humidity  Static  One of the leading causes of damage to sensitive circuitry is electrostatic discharge (ESD)  A person can generate up to 12,000 volts of static current by walking across a carpet
  • 28. 28 28 28 tohttps://github.com/syaifulahdan/ Ventilation Shafts  Security of the ventilation system air ductwork:  While in residential buildings the ductwork is quite small, in large commercial buildings it can be large enough for an individual to climb through  If the vents are large, security can install wire mesh grids at various points to compartmentalize the runs
  • 29. 29 29 29 tohttps://github.com/syaifulahdan/ Power Management and Conditioning  Electrical quantity (voltage level and amperage rating) is a concern, as is the quality of the power (cleanliness and proper installation)  Any noise that interferes with the normal 60 Hertz cycle can result in inaccurate time clocks or unreliable internal clocks inside the CPU  Grounding  Grounding ensures that the returning flow of current is properly discharged  If this is not properly installed it could cause damage to equipment and injury or death to the person  Overloading a circuit not only causes problems with the circuit tripping but can also overload the power load on an electrical cable, creating the risk of fire
  • 30. 30 30 30 tohttps://github.com/syaifulahdan/ Uninterruptible Power Supplies (UPSs)  In case of power outage, a UPS is a backup power source for major computer systems  There are four basic configurations of UPS:  the standby  ferroresonant standby  line-interactive  the true online
  • 31. 31 31 31 tohttps://github.com/syaifulahdan/ Uninterruptible Power Supplies (UPSs)  A standby or offline UPS is an offline battery backup that detects the interruption of power to the power equipment  A ferroresonant standby UPS is still an offline UPS  the ferroresonant transformer reduces power problems  The line-interactive UPS is always connected to the output, so has a much faster response time and incorporates power conditioning and line filtering  The true online UPS works in the opposite fashion to a standby UPS since the primary power source is the battery, with the power feed from the utility constantly recharging the batteries  this model allows constant feed to the system, while completely eliminating power quality problems
  • 32. 32 32 32 tohttps://github.com/syaifulahdan/ Emergency Shutoff  One important aspect of power management in any environment is the need to be able to stop power immediately should the current represent a risk to human or machine safety  Most computer rooms and wiring closets are equipped with an emergency power shutoff, which is usually a large red button, prominently placed to facilitate access, with an accident-proof cover to prevent unintentional use
  • 33. 33 33 33 tohttps://github.com/syaifulahdan/ Electrical Terms  Fault: momentary interruption in power  Blackout: prolonged interruption in power  Sag: momentary drop in power voltage levels  Brownout: prolonged drop in power voltage levels  Spike: momentary increase in power voltage levels  Surge: prolonged increase in power voltage levels
  • 34. 34 34 34 tohttps://github.com/syaifulahdan/ Water Problems  Lack of water poses problems to systems, including the functionality of fire suppression systems, and the ability of water chillers to provide air-conditioning  On the other hand, a surplus of water, or water pressure, poses a real threat  It is therefore important to integrate water detection systems into the alarm systems that regulate overall facilities operations
  • 35. 35 35 35 tohttps://github.com/syaifulahdan/ Structural Collapse  Unavoidable forces can cause failures of structures that house the organization  Structures are designed and constructed with specific load limits, and overloading these design limits, intentionally or unintentionally, inevitably results in structural failure and potentially loss of life or injury  Periodic inspections by qualified civil engineers assists in identifying potentially dangerous structural conditions well before they fail
  • 36. 36 36 36 tohttps://github.com/syaifulahdan/ Testing Facility Systems  Physical security of the facility must be constantly documented, evaluated, and tested  Documentation of the facility’s configuration, operation, and function is integrated into disaster recovery plans and standing operating procedures  Testing provides information necessary to improve the physical security in the facility and identifies weak points
  • 37. 37 37 37 tohttps://github.com/syaifulahdan/ Interception of Data  There are three methods of data interception:  Direct observation  Data transmission  Eavesdropping on signals  TEMPEST is a technology that involves the control of devices that emit electromagnetic radiation (EMR) in such a manner that the data cannot be reconstructed
  • 38. 38 38 38 tohttps://github.com/syaifulahdan/ Mobile and Portable Systems  With the increased threat to overall information security for laptops, handhelds, and PDAs, mobile computing requires even more security than the average in-house system  Many of these mobile computing systems not only have corporate information stored within them, many are configured to facilitate the user’s access into the organization’s secure computing facilities
  • 39. 39 39 39 tohttps://github.com/syaifulahdan/ Stopping Laptop Losses Controls support the security and retrieval of lost or stolen laptops  CompuTrace is stored on a laptop’s hardware and reports to a central monitoring center  Burglar alarms made up of a PC card that contains a motion detector  If the alarm in the laptop is armed, and the laptop is moved beyond a configured distance, the alarm triggers an audible alarm  The system also shuts down the computer and includes an encryption option to completely render the information unusable
  • 41. 41 41 41 tohttps://github.com/syaifulahdan/ Remote Computing Security  Remote site computing - distant from the organizational facility  Telecommuting - computing using telecommunications including Internet, dial-up, or leased point-to-point links  Employees may need to access networks on business trips  Telecommuters need access from home systems or satellite offices  To provide a secure extension of the organization’s internal networks, all external connections and systems must be secured
  • 42. 42 42 42 tohttps://github.com/syaifulahdan/ Special Considerations for Physical Security Threats  Develop physical security in-house or outsource?  Many qualified and professional agencies  Benefit of outsourcing physical security includes gaining the experience and knowledge of these agencies  Downside includes high expense, loss of control over the individual components, and the level of trust that must be placed in another company  Social engineering is the use of people skills to obtain information from employees
  • 43. 43 43 43 tohttps://github.com/syaifulahdan/ Inventory Management  Computing equipment should be inventoried and inspected on a regular basis  Classified information should also be inventoried and managed  Whenever a classified document is reproduced, a stamp should be placed on the original before it is copied  This stamp states the document’s classification level and document number for tracking  Each classified copy is issued to its receiver, who signs for the document