SlideShare a Scribd company logo
1 of 32
Security Engineering –
Physical Security
Secure Facility Plan
• Critical Path Analysis:
• Systematic effort to identify relationships between mission-critical
applications, processes
• When performing this analysis technology convergence should be taken
into consideration
• Technology Convergence:
• Tendency of various technologies, solutions, utilities and systems to
evolve and merge over time
The primary goal of the plan should be to protect human life.
Life safety goals should take precedence over all other types of
goals
Threats to an organization
• 4 Main threats categories to an organization are
• Natural environmental threats
• Flood, earthquakes etc
• Supply system threats
• Power distribution failure, communications interruption
• Manmade threats
• Unauthorized access, fraud, theft, errors, accidents
• Socio-political threats
• Strikes, war, violence, terrorist attack
Physical Security Program Goals
• Prevention through Deterrence
• Fence, security guard, dogs
• Damage reduction through Delay
• Security layer, barriers
• Anomaly Detection
• CCTV, smoke detectors, alarms
• Incident Analysis
• Response to detect events, triage
• Response to Incident
• Fire suppression, emergency response, Law enforcement notification
Crime Prevention through Environmental Design
• Discipline that outlines how proper design of physical environment can
reduce crime by directly affecting human behavior
• Three main strategies of CPTED are
• Natural access control
• Natural surveillance
• Natural territorial reinforcement
• Best physical security approach is to build an environment from a
CPTED approach and apply target hardening principles on top of the
design
• Target Hardening
• Focusses on denying access through physical and artificial barriers
• It can lead to restrictions on the use and aesthetics of an environment.
Natural Access control
• Guidance of people entering/leaving a space by placement of
doors, fences, lighting and even landscaping
• Clear line of sight, transparency via glass
• Creation of security zones, layering different security levels and
applying specific controls per zone
• Create barriers
• Natural – cliff, river, hill
• Manmade – highway; railway line
• Artificial - fences, closing streets
Natural Surveillance
• Can take place through
• Organized means (security guards)
• Mechanical means (CCTV)
• Natural strategies (clear line of sight, low landscaping)
• Main objective is to give the maximum visibility to activity areas
thereby preventing malicious actions
Natural Territorial Reinforcement
• Creates physical designs that emphasizes the companies
physical sphere of influence so legitimate users feel a sense of
ownership
• Can be implemented through, fence, landscaping, sing-boards,
flags
• Goal is to create a sense of dedicated community
Construction Material
Light frame material • Composed of untreated lumber that is combustible during fire
• Provides least amount of protection
• Used to build houses
• Fire survival rate is 30 minutes
Heavy Timber • The material must be at least 4 inches in thickness
• Denser wood is used and are fastened with metal bolts
• Fire survival rate is 1 hour
• Commonly used for office building
Incombustible material • Provides higher level of protection against combustion, but loses
its strength under extreme temperature
• Eg: Steel
Fire-resistance material • Construction material is fire retardant
• Steel rods are cased inside a concrete wall and support beams
• Provides the most protection against fire and forced entry
attempts
Entry Points
• They are the weakest section of the structure; made of doors and
windows
• In doors the weakness lies within the frames, hinges and door
material
• The door and surrounding walls and ceilings should also provide
the same level of strength
Door Types
• Hollow-core:
• Can be easily penetrated by cutting or kicking them
• Should not be used in exterior places
• Solid-core:
• Stronger than hollow-core, has a higher fire rating and protection from forced entry
• Can be used externally
• Bulletproof doors
• Bullet-resistant and bulletproof material is sandwiched between wood or steel
• High protection areas can have bullet proof doors
Door Types
• Turnstile
• Form of door that prevents more than one person entering at a time
• Coupled with security guards/access control helps prevent un-authorized entry into
facility
• Can prevent tailgating
• Mantrap
• A set of double doors often protected by a guard
• The first door is provided access for entry, once the person passes the first door and
enters, the first door closes; the person has to authenticate again at the second door to
get access
• This prevents piggybacking and tailgating
Window types
Standard Common type, cheapest and lowest protection
Tempered Glass is heated and suddenly cooled to increase its integrity and
strength
Acrylic A type of plastic, polycarbonate acrylics are stronger than normal
acrylic
Wired A mesh of wire is embedded between the glass; prevents the glass
from shattering
Laminated Plastic layer is placed between the glasses; helps increase its
strength
Security
Film
Transparent film is applied to the glass to increase strength and
obscure visibility
Equipment Failure
• Establishing SLA with vendor is essential
• SLA defines the response time the vendor will provide in the event of an
equipment failure
• MTTF – Mean time to Failure
• Typical functional life time of the device given a specific operating environment
• MTTR – Mean time to Repair
• Average length of time required to perform a repair on the device
• MTBF – Mean time between Failure
• Estimation of time between the first and any subsequent failures
Datacentre security
• Datacenter, server rooms, wiring closets should be located in the core of the facility
• Wiring closets in a multistory building should be placed directly above or below each other; this helps
easier connectivity of wires across the building
• Access to DC should be via only one door; if additional doors are there, they should function as one-
way exit doors
• DC should not be located in the basement or upper floors of a building
• Should be located well above the ground level
• Data processing center should be constructed as one room rather than different individual rooms
• Should have positive air pressure ~ no contaminants can be sucked into the room
• Water detectors should be placed under raised floors and on dropped ceilings
• HVAC system should be implemented for temperature and humidity control
Media storage security - Safe
• Safes are commonly used to store
media
• Passive locking safes can detect if
someone attempts to tamper with
it, in which case extra internal
bolts will fall into place to ensure it
cannot be compromised
• Thermal locking safes can identify
temperature changes and
implement additional locks
Wall Safe Embedded into the wall and easily hidden
Floor Safe Embedded into the floor and easily hidden
Chests Stand alone safe
Depositories Safes with slots, allows valuables to be
slipped in
Vaults Safes that are large enough to allow walk-in
Access control
• Smartcards:
• Security ID with embedded magnetic strip, bar code, or integrated circuit chip.
• Can process information or store reasonable amount of data in memory
• Can be used in multifactor authentication for better protection
• Vulnerable to physical security attacks
• Memory cards
• Machine readable ID cards with memory sticks
• Can hold small amount of data in memory but cannot process it
• Memory cards are easy to copy or duplicate
• Proximity readers
• Passive device, or transponder that can be used to control physical access
• A passive device, typically worn by an individual alters the magnetic field generated by the reader which is detected
and processed
Motion Detectors
• A device that senses movement or sound in a specific area
Type Operation
Infrared Monitors for significant changes in infrared lighting pattern of a
monitored area
Heat-based Monitors for significant changes in heat levels of a monitored area
Wave pattern Transmits low ultrasonic frequency signal and monitors for significant
changes in the reflected patters
Capacitance Monitors the changes in electrical or magnetic field surrounding a
monitored object
Photoelectric Monitors visible light levels in a monitored area
Passive audio Listens for abnormal sounds in monitored area
Electric Power – Power Protection
• Power can be protected in 3 ways
• UPS, Power line conditioners, backup sources
• UPS: Battery packs that can range in size and capacity
• Online UPS –
• uses AC voltage to charge the batteries, uses inverter to change the DC output from the batteries to
AC form
• Normal power always passes through them, hence it detects power failure much faster
• Constantly provide power from their own inverters, even when the electric power is in proper use
• Standby UPS
• Stays inactive until electric power failure
• Has sensors to detect a power failure and the load is switched to the battery pack
Electric Power – Power Issues
• Clean power:
• Power supply does not contain any interference or voltage fluctuation
• Interference can be via EMI or RFI
• EMI (Noise):
• Can be created by difference in the 3 wires: neutral, hot, ground and the magnetic field they create
• Common mode noise: generated by difference in power between hot and ground
• Traverse mode noise: generated by difference in power between hot and neutral
• Lightning and electrical motors can induce EMI
• RFI
• Can be caused by anything that creates radio waves
• Fluorescent lighting is one of the main causes of RFI within buildings today
Electric Power – Problems
Power Excess Spike Momentary high voltage
Surge Prolonged high voltage
Degradation Sag/dip Momentary low voltage
Brownout Prolonged low voltage
In-rush current Initial surge of current required to start load
Power Loss Fault Momentary power outage
Blackout Prolonged power outage
Interference Transient A short duration of line noise disturbance
Noise Stead interfering power disturbance or fluctuation
Emanation Security
• Preventing unauthorized intercept of EMI or RF signals from the
devices
• TEMPEST is used to protect against emanation leaks
• TEMPEST countermeasures include Farady cage, white noise, control
zones
• Faraday Cage:
• A closed enclosure with external metal mesh that fully surrounds the enclosure
absorbing EM signals
• They are quite effective in blocking EM signals
• White Noise:
• Broadcasting false traffic at all times to mask and hide presence of real emanations
• Most effective when created around the perimeter of an area so that it is broadcast to
protect the internal area where emanations may be needed
• Control Zones
• Implementation of zones such that the emanations are controlled within the
environment; can use faraday cage or white noise in those zones
HVAC
• Humidity should be between 40 to 60 % for Datacenter
• High humidity will cause corrosion
• Low humidity will cause static electricity
Damaging
Temperature
Component
175F Computer systems
100F Magnetic storage devices
350F Paper products
Static
voltage
Possible damage
40 Sensitive circuits and electronic
components
1500 Data stored in hard drives
2000 Abrupt system shutdown
Fire Prevention, Detection and Suppression
• Fire Prevention
• Training employees of fire safety
• Supplying right equipment and ensuring their working condition
• Storing combustible material in a proper manner
• Fire Detection
• Fire detectors placed at strategic points to detect smoke/fire
• Fire Suppression Systems
• Use of suppression agent to put out a fire
Stages of Fire
Stage 1 – Incipient
stage
Initial Stage, only air ionization, no smoke
Stage 2 – Smoke stage Smoke is visible from the point of ignition
Stage 3 – Flame stage Flame can be seen with naked eye
Stage 4 – Heat stage Fire is considerably higher
• The earlier the fire is detected, the easier it is to be extinguished
Fire Detection
• Smoke Activated
• Good early warning devices
• Photoelectric device
• Detects variation in light intensity – produces a beam of light and if the light is
obstructed an alarm is produced
• Heat Activated
• Fixed temperate: Alarm is generated when a particular temperate us
reached
• Rate-of-raise: alarm is generated when temperature raises over time
• Rate-of-raise temperature sensors usually provide a quicker warning that
fixed-temperature sensors but they are prone to false positives
Fire Suppression
Fire Class Type of Fire Elements Suppression Method
A Common Combustible Wood, paper Water, Foam
B Liquid Oil and coolants Gas, CO2, Foam, Dry Powder
C Electrical Wires, Electrical equipment's Gas, CO2, Dry Powder
D Metals Magnesium, sodium,
potassium
Dry powder
• CO2 should be used only in unattended areas
• There should a delay mechanism before CO2 is released
• FM200 is the approved replacement for Halon gas
• Dry powder like potassium bicarbonate, calcium carbonate interrupt the chemical
combustion of fire
• Dry powder like mono-ammonium phosphate melts and low temperature and excludes
oxygen from fuel
Water based Fire Suppression
Type Functionality comment
Wet-pipe It is always full of water, usually discharged by
temperature control sensors
Also called closed head systems
Water may freeze in colder
temperatures
A damage in nozzle or pipe can
result in leak
Dry Pipe Water is not stored in pipe, instead contains
compressed air. Opening the water valve cause
water to fill the pipes and discharge
Best suited for colder climates
Preaction Combination of wet and dry pipe; water is not
held in pipes until fire is detected; it is released
only after the sprinkler head activation triggers
are melted by sufficient heat;
Used in data processing
equipment's
Deluge Another form of dry pipe system that uses larger
pipes and can deliver significantly larger volume
of water
Inappropriate for environments
that contain electronic
equipments
Gas Suppression
• More effective than water suppression systems
• Gas discharge systems removes oxygen in the air and hence
should not be used in environments were people are located
• Halon is an effective gas suppression system, but it degrades
environment and hence is since banned
• Effective replacement for Halon are
• FM200
• NAF-S-III
• Argon
• Inergen
Intrusion Alarm
Alarm Operation
Deterrent Alarms that trigger deterrent actions; goal is to make intrusion attempts more difficult
Repellent Alarms that trigger sound or light; goal is to discourage intruders
Notification Alarm Alarms that trigger notifications to security analyst; they are silent from attacker
perspective but gives warning signals to security team
Category Operation
Local Alarm System Must broadcast an audible alarm signal that can be heard within 400feet; for a local
alarm to be effective security guards should be stationed nearby
Central Station Alarm is silent locally, but offsite monitor agents are notified;
Auxiliary system Can be added to either local or centralized system, notification is sent to emergency
services including fire, police and medical teams
Motion Detectors
Type Operation
Infrared Monitors for significant changes in the IR lighting pattern of a monitored area
Heat-based Monitors for significant change in the heat levels in a monitored area
Wave pattern Transmits a consistent low ultrasonic or high micros-wave frequency signal
into a monitored area and monitors for significant changes in the reflected
pattern
Capacitance Senses changes in the EM signals or magnetic fields surrounding a
monitored object
Photoelectric Senses changes in the visible light levels for the monitored area. Usually
deployed in internal rooms that have no windows and are kept dark
Passive Audio Listens for abnormal sounds in the monitored area
Karthikeyan Dhayalan
MD & Chief Security Partner
www.cyintegriti.com

More Related Content

What's hot

Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security Presentation
Wajahat Rajab
 

What's hot (20)

CISSP Chapter 1 BCP
CISSP Chapter 1 BCPCISSP Chapter 1 BCP
CISSP Chapter 1 BCP
 
CISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsCISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security Concepts
 
CISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - CryptographyCISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - Cryptography
 
CISSP Chapter 1 Risk Management
CISSP Chapter 1  Risk ManagementCISSP Chapter 1  Risk Management
CISSP Chapter 1 Risk Management
 
CISSP - Chapter 3 - CPU Architecture
CISSP - Chapter 3 - CPU ArchitectureCISSP - Chapter 3 - CPU Architecture
CISSP - Chapter 3 - CPU Architecture
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
Chapter 1 Security Framework
Chapter 1   Security FrameworkChapter 1   Security Framework
Chapter 1 Security Framework
 
Ch07 Access Control Fundamentals
Ch07 Access Control FundamentalsCh07 Access Control Fundamentals
Ch07 Access Control Fundamentals
 
Physical security
Physical securityPhysical security
Physical security
 
8 Access Control
8 Access Control8 Access Control
8 Access Control
 
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesCISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security Presentation
 
Physical security
Physical securityPhysical security
Physical security
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
An overview of access control
An overview of access controlAn overview of access control
An overview of access control
 
SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?
 
Physical Security In The Workplace
Physical Security In The WorkplacePhysical Security In The Workplace
Physical Security In The Workplace
 
Information security management system (isms) overview
Information security management system (isms) overviewInformation security management system (isms) overview
Information security management system (isms) overview
 
EDR vs SIEM - The fight is on
EDR vs SIEM - The fight is onEDR vs SIEM - The fight is on
EDR vs SIEM - The fight is on
 

Similar to CISSP - Chapter 3 - Physical security

CISSP week 26
CISSP week 26CISSP week 26
CISSP week 26
jemtallon
 
450052029-INDUSTRIAL-SECURITY-MANAGEMENT-ppt.ppt
450052029-INDUSTRIAL-SECURITY-MANAGEMENT-ppt.ppt450052029-INDUSTRIAL-SECURITY-MANAGEMENT-ppt.ppt
450052029-INDUSTRIAL-SECURITY-MANAGEMENT-ppt.ppt
mayovergel1
 
experience_and_perspective_of_security_installation.ppt
experience_and_perspective_of_security_installation.pptexperience_and_perspective_of_security_installation.ppt
experience_and_perspective_of_security_installation.ppt
PawachMetharattanara
 

Similar to CISSP - Chapter 3 - Physical security (20)

Physicalsecuritypresentation 130630193821-phpapp01
Physicalsecuritypresentation 130630193821-phpapp01Physicalsecuritypresentation 130630193821-phpapp01
Physicalsecuritypresentation 130630193821-phpapp01
 
Security measures
Security measuresSecurity measures
Security measures
 
CISSP week 26
CISSP week 26CISSP week 26
CISSP week 26
 
450052029-INDUSTRIAL-SECURITY-MANAGEMENT-ppt.ppt
450052029-INDUSTRIAL-SECURITY-MANAGEMENT-ppt.ppt450052029-INDUSTRIAL-SECURITY-MANAGEMENT-ppt.ppt
450052029-INDUSTRIAL-SECURITY-MANAGEMENT-ppt.ppt
 
Fire detection and alarm system
Fire detection and alarm systemFire detection and alarm system
Fire detection and alarm system
 
Fire detection and alarm system
Fire detection and alarm systemFire detection and alarm system
Fire detection and alarm system
 
experience_and_perspective_of_security_installation.ppt
experience_and_perspective_of_security_installation.pptexperience_and_perspective_of_security_installation.ppt
experience_and_perspective_of_security_installation.ppt
 
Physical security primer - JURINNOV - Eric Vanderburg
Physical security primer - JURINNOV - Eric VanderburgPhysical security primer - JURINNOV - Eric Vanderburg
Physical security primer - JURINNOV - Eric Vanderburg
 
Smart building
Smart buildingSmart building
Smart building
 
ch.9.pptx
ch.9.pptxch.9.pptx
ch.9.pptx
 
Use of hand tools
Use of hand toolsUse of hand tools
Use of hand tools
 
FDA-Fire detection and alarm system
FDA-Fire detection and alarm systemFDA-Fire detection and alarm system
FDA-Fire detection and alarm system
 
Firefighting & HVAC.pdf
Firefighting & HVAC.pdfFirefighting & HVAC.pdf
Firefighting & HVAC.pdf
 
Physical security
Physical securityPhysical security
Physical security
 
Fire Alarm ... Design, Components, Applications
Fire Alarm ... Design, Components, ApplicationsFire Alarm ... Design, Components, Applications
Fire Alarm ... Design, Components, Applications
 
BS2 group assignment
BS2 group assignment BS2 group assignment
BS2 group assignment
 
Bs powerpoint slides
Bs powerpoint slidesBs powerpoint slides
Bs powerpoint slides
 
UNIT-V FIRE SAFETY INSTALLATION
UNIT-V    FIRE SAFETY INSTALLATIONUNIT-V    FIRE SAFETY INSTALLATION
UNIT-V FIRE SAFETY INSTALLATION
 
UNIT-5.pptx
UNIT-5.pptxUNIT-5.pptx
UNIT-5.pptx
 
Unit iii (3.1)
Unit iii (3.1)Unit iii (3.1)
Unit iii (3.1)
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 

CISSP - Chapter 3 - Physical security

  • 2. Secure Facility Plan • Critical Path Analysis: • Systematic effort to identify relationships between mission-critical applications, processes • When performing this analysis technology convergence should be taken into consideration • Technology Convergence: • Tendency of various technologies, solutions, utilities and systems to evolve and merge over time The primary goal of the plan should be to protect human life. Life safety goals should take precedence over all other types of goals
  • 3. Threats to an organization • 4 Main threats categories to an organization are • Natural environmental threats • Flood, earthquakes etc • Supply system threats • Power distribution failure, communications interruption • Manmade threats • Unauthorized access, fraud, theft, errors, accidents • Socio-political threats • Strikes, war, violence, terrorist attack
  • 4. Physical Security Program Goals • Prevention through Deterrence • Fence, security guard, dogs • Damage reduction through Delay • Security layer, barriers • Anomaly Detection • CCTV, smoke detectors, alarms • Incident Analysis • Response to detect events, triage • Response to Incident • Fire suppression, emergency response, Law enforcement notification
  • 5. Crime Prevention through Environmental Design • Discipline that outlines how proper design of physical environment can reduce crime by directly affecting human behavior • Three main strategies of CPTED are • Natural access control • Natural surveillance • Natural territorial reinforcement • Best physical security approach is to build an environment from a CPTED approach and apply target hardening principles on top of the design • Target Hardening • Focusses on denying access through physical and artificial barriers • It can lead to restrictions on the use and aesthetics of an environment.
  • 6. Natural Access control • Guidance of people entering/leaving a space by placement of doors, fences, lighting and even landscaping • Clear line of sight, transparency via glass • Creation of security zones, layering different security levels and applying specific controls per zone • Create barriers • Natural – cliff, river, hill • Manmade – highway; railway line • Artificial - fences, closing streets
  • 7. Natural Surveillance • Can take place through • Organized means (security guards) • Mechanical means (CCTV) • Natural strategies (clear line of sight, low landscaping) • Main objective is to give the maximum visibility to activity areas thereby preventing malicious actions
  • 8. Natural Territorial Reinforcement • Creates physical designs that emphasizes the companies physical sphere of influence so legitimate users feel a sense of ownership • Can be implemented through, fence, landscaping, sing-boards, flags • Goal is to create a sense of dedicated community
  • 9. Construction Material Light frame material • Composed of untreated lumber that is combustible during fire • Provides least amount of protection • Used to build houses • Fire survival rate is 30 minutes Heavy Timber • The material must be at least 4 inches in thickness • Denser wood is used and are fastened with metal bolts • Fire survival rate is 1 hour • Commonly used for office building Incombustible material • Provides higher level of protection against combustion, but loses its strength under extreme temperature • Eg: Steel Fire-resistance material • Construction material is fire retardant • Steel rods are cased inside a concrete wall and support beams • Provides the most protection against fire and forced entry attempts
  • 10. Entry Points • They are the weakest section of the structure; made of doors and windows • In doors the weakness lies within the frames, hinges and door material • The door and surrounding walls and ceilings should also provide the same level of strength
  • 11. Door Types • Hollow-core: • Can be easily penetrated by cutting or kicking them • Should not be used in exterior places • Solid-core: • Stronger than hollow-core, has a higher fire rating and protection from forced entry • Can be used externally • Bulletproof doors • Bullet-resistant and bulletproof material is sandwiched between wood or steel • High protection areas can have bullet proof doors
  • 12. Door Types • Turnstile • Form of door that prevents more than one person entering at a time • Coupled with security guards/access control helps prevent un-authorized entry into facility • Can prevent tailgating • Mantrap • A set of double doors often protected by a guard • The first door is provided access for entry, once the person passes the first door and enters, the first door closes; the person has to authenticate again at the second door to get access • This prevents piggybacking and tailgating
  • 13. Window types Standard Common type, cheapest and lowest protection Tempered Glass is heated and suddenly cooled to increase its integrity and strength Acrylic A type of plastic, polycarbonate acrylics are stronger than normal acrylic Wired A mesh of wire is embedded between the glass; prevents the glass from shattering Laminated Plastic layer is placed between the glasses; helps increase its strength Security Film Transparent film is applied to the glass to increase strength and obscure visibility
  • 14. Equipment Failure • Establishing SLA with vendor is essential • SLA defines the response time the vendor will provide in the event of an equipment failure • MTTF – Mean time to Failure • Typical functional life time of the device given a specific operating environment • MTTR – Mean time to Repair • Average length of time required to perform a repair on the device • MTBF – Mean time between Failure • Estimation of time between the first and any subsequent failures
  • 15. Datacentre security • Datacenter, server rooms, wiring closets should be located in the core of the facility • Wiring closets in a multistory building should be placed directly above or below each other; this helps easier connectivity of wires across the building • Access to DC should be via only one door; if additional doors are there, they should function as one- way exit doors • DC should not be located in the basement or upper floors of a building • Should be located well above the ground level • Data processing center should be constructed as one room rather than different individual rooms • Should have positive air pressure ~ no contaminants can be sucked into the room • Water detectors should be placed under raised floors and on dropped ceilings • HVAC system should be implemented for temperature and humidity control
  • 16. Media storage security - Safe • Safes are commonly used to store media • Passive locking safes can detect if someone attempts to tamper with it, in which case extra internal bolts will fall into place to ensure it cannot be compromised • Thermal locking safes can identify temperature changes and implement additional locks Wall Safe Embedded into the wall and easily hidden Floor Safe Embedded into the floor and easily hidden Chests Stand alone safe Depositories Safes with slots, allows valuables to be slipped in Vaults Safes that are large enough to allow walk-in
  • 17. Access control • Smartcards: • Security ID with embedded magnetic strip, bar code, or integrated circuit chip. • Can process information or store reasonable amount of data in memory • Can be used in multifactor authentication for better protection • Vulnerable to physical security attacks • Memory cards • Machine readable ID cards with memory sticks • Can hold small amount of data in memory but cannot process it • Memory cards are easy to copy or duplicate • Proximity readers • Passive device, or transponder that can be used to control physical access • A passive device, typically worn by an individual alters the magnetic field generated by the reader which is detected and processed
  • 18. Motion Detectors • A device that senses movement or sound in a specific area Type Operation Infrared Monitors for significant changes in infrared lighting pattern of a monitored area Heat-based Monitors for significant changes in heat levels of a monitored area Wave pattern Transmits low ultrasonic frequency signal and monitors for significant changes in the reflected patters Capacitance Monitors the changes in electrical or magnetic field surrounding a monitored object Photoelectric Monitors visible light levels in a monitored area Passive audio Listens for abnormal sounds in monitored area
  • 19. Electric Power – Power Protection • Power can be protected in 3 ways • UPS, Power line conditioners, backup sources • UPS: Battery packs that can range in size and capacity • Online UPS – • uses AC voltage to charge the batteries, uses inverter to change the DC output from the batteries to AC form • Normal power always passes through them, hence it detects power failure much faster • Constantly provide power from their own inverters, even when the electric power is in proper use • Standby UPS • Stays inactive until electric power failure • Has sensors to detect a power failure and the load is switched to the battery pack
  • 20. Electric Power – Power Issues • Clean power: • Power supply does not contain any interference or voltage fluctuation • Interference can be via EMI or RFI • EMI (Noise): • Can be created by difference in the 3 wires: neutral, hot, ground and the magnetic field they create • Common mode noise: generated by difference in power between hot and ground • Traverse mode noise: generated by difference in power between hot and neutral • Lightning and electrical motors can induce EMI • RFI • Can be caused by anything that creates radio waves • Fluorescent lighting is one of the main causes of RFI within buildings today
  • 21. Electric Power – Problems Power Excess Spike Momentary high voltage Surge Prolonged high voltage Degradation Sag/dip Momentary low voltage Brownout Prolonged low voltage In-rush current Initial surge of current required to start load Power Loss Fault Momentary power outage Blackout Prolonged power outage Interference Transient A short duration of line noise disturbance Noise Stead interfering power disturbance or fluctuation
  • 22. Emanation Security • Preventing unauthorized intercept of EMI or RF signals from the devices • TEMPEST is used to protect against emanation leaks • TEMPEST countermeasures include Farady cage, white noise, control zones • Faraday Cage: • A closed enclosure with external metal mesh that fully surrounds the enclosure absorbing EM signals • They are quite effective in blocking EM signals • White Noise: • Broadcasting false traffic at all times to mask and hide presence of real emanations • Most effective when created around the perimeter of an area so that it is broadcast to protect the internal area where emanations may be needed • Control Zones • Implementation of zones such that the emanations are controlled within the environment; can use faraday cage or white noise in those zones
  • 23. HVAC • Humidity should be between 40 to 60 % for Datacenter • High humidity will cause corrosion • Low humidity will cause static electricity Damaging Temperature Component 175F Computer systems 100F Magnetic storage devices 350F Paper products Static voltage Possible damage 40 Sensitive circuits and electronic components 1500 Data stored in hard drives 2000 Abrupt system shutdown
  • 24. Fire Prevention, Detection and Suppression • Fire Prevention • Training employees of fire safety • Supplying right equipment and ensuring their working condition • Storing combustible material in a proper manner • Fire Detection • Fire detectors placed at strategic points to detect smoke/fire • Fire Suppression Systems • Use of suppression agent to put out a fire
  • 25. Stages of Fire Stage 1 – Incipient stage Initial Stage, only air ionization, no smoke Stage 2 – Smoke stage Smoke is visible from the point of ignition Stage 3 – Flame stage Flame can be seen with naked eye Stage 4 – Heat stage Fire is considerably higher • The earlier the fire is detected, the easier it is to be extinguished
  • 26. Fire Detection • Smoke Activated • Good early warning devices • Photoelectric device • Detects variation in light intensity – produces a beam of light and if the light is obstructed an alarm is produced • Heat Activated • Fixed temperate: Alarm is generated when a particular temperate us reached • Rate-of-raise: alarm is generated when temperature raises over time • Rate-of-raise temperature sensors usually provide a quicker warning that fixed-temperature sensors but they are prone to false positives
  • 27. Fire Suppression Fire Class Type of Fire Elements Suppression Method A Common Combustible Wood, paper Water, Foam B Liquid Oil and coolants Gas, CO2, Foam, Dry Powder C Electrical Wires, Electrical equipment's Gas, CO2, Dry Powder D Metals Magnesium, sodium, potassium Dry powder • CO2 should be used only in unattended areas • There should a delay mechanism before CO2 is released • FM200 is the approved replacement for Halon gas • Dry powder like potassium bicarbonate, calcium carbonate interrupt the chemical combustion of fire • Dry powder like mono-ammonium phosphate melts and low temperature and excludes oxygen from fuel
  • 28. Water based Fire Suppression Type Functionality comment Wet-pipe It is always full of water, usually discharged by temperature control sensors Also called closed head systems Water may freeze in colder temperatures A damage in nozzle or pipe can result in leak Dry Pipe Water is not stored in pipe, instead contains compressed air. Opening the water valve cause water to fill the pipes and discharge Best suited for colder climates Preaction Combination of wet and dry pipe; water is not held in pipes until fire is detected; it is released only after the sprinkler head activation triggers are melted by sufficient heat; Used in data processing equipment's Deluge Another form of dry pipe system that uses larger pipes and can deliver significantly larger volume of water Inappropriate for environments that contain electronic equipments
  • 29. Gas Suppression • More effective than water suppression systems • Gas discharge systems removes oxygen in the air and hence should not be used in environments were people are located • Halon is an effective gas suppression system, but it degrades environment and hence is since banned • Effective replacement for Halon are • FM200 • NAF-S-III • Argon • Inergen
  • 30. Intrusion Alarm Alarm Operation Deterrent Alarms that trigger deterrent actions; goal is to make intrusion attempts more difficult Repellent Alarms that trigger sound or light; goal is to discourage intruders Notification Alarm Alarms that trigger notifications to security analyst; they are silent from attacker perspective but gives warning signals to security team Category Operation Local Alarm System Must broadcast an audible alarm signal that can be heard within 400feet; for a local alarm to be effective security guards should be stationed nearby Central Station Alarm is silent locally, but offsite monitor agents are notified; Auxiliary system Can be added to either local or centralized system, notification is sent to emergency services including fire, police and medical teams
  • 31. Motion Detectors Type Operation Infrared Monitors for significant changes in the IR lighting pattern of a monitored area Heat-based Monitors for significant change in the heat levels in a monitored area Wave pattern Transmits a consistent low ultrasonic or high micros-wave frequency signal into a monitored area and monitors for significant changes in the reflected pattern Capacitance Senses changes in the EM signals or magnetic fields surrounding a monitored object Photoelectric Senses changes in the visible light levels for the monitored area. Usually deployed in internal rooms that have no windows and are kept dark Passive Audio Listens for abnormal sounds in the monitored area
  • 32. Karthikeyan Dhayalan MD & Chief Security Partner www.cyintegriti.com

Editor's Notes

  1. How presentation will benefit audience: Adult learners are more interested in a subject if they know how or why it is important to them. Presenter’s level of expertise in the subject: Briefly state your credentials in this area, or explain why participants should listen to you.
  2. How presentation will benefit audience: Adult learners are more interested in a subject if they know how or why it is important to them. Presenter’s level of expertise in the subject: Briefly state your credentials in this area, or explain why participants should listen to you.