SlideShare ist ein Scribd-Unternehmen logo
1 von 50
Author
Richard Kibbey
Presented by:
Amna Jalil (04)
CDC 8th National Biosafety Symposium,
Atlanta, Georgia, 2004
Overview of the security concepts and the
systems
 Need of security expert
 One’s own organization
 Full or part-time contractor
Security is the degree of resistance to, or
protection from, harm. It applies to
any vulnerable and valuable asset,
such as a person, community, nation,
or organization (Biosafety labs)
Consist of equipment, policies
and procedures that support
each of the elements of security
Clear Zones
Barriers
Lighting
Shrouds
Locks
Electronic Security Systems
Guard forces
30 feet clear zone --- from the protectable
object or facility
Void of
 Trash receptables
 Ashtrays
 dumpsters
 Restrict, deny or channel pedestrian or
vehicular traffic
 Not necessarily impenetrable – increase the
probability to detect people & vehicles –
trying to get illegal access
Significant deterrent – potential intruders
Enhances visibility for routine patrols &
general staff
Permanent lightening – adequate
illumination to
 Entry points
 Pathways
 Parking lots
Activated by Sensors – activate the lights
when penetrated
Can activated by
 Timers
 Manually
◊ Often neglected component
◊ Support deterrence & delay by providing
concealment from chance and direct
surveillance
◊ Purpose – limit visibility from unauthorized
sources
◊ Simple – darkened windows, curtains
◊ Complex – walls, coverings even shrubbery
Many shapes and forms
Single hasp lock to very complex systems
Include:
 Standard key lock
 Combination lock
 Cipher lock
 Card access control systems including swipe card lock
and biometric
Can be tied in electronic security system
• Come in three flavors
Access Control Systems
Security Surveillance
Intrusion Detection Systems (IDS)
ACCESS CONTROL SYSTEMS
Devices designed to limit access --- site,
building, room or container
Simple – swipe access system
Complex -- biometrics
SECURITY SURVEILLANCE
Most common – CCTV
When choosing CCTV
 Resolution power and image quality
 Color or black & white
 Zoom capability
 Transmission mode
INTRUSION DETECTION SYSTEMS (IDS)
Identify unauthorized entry
Connected to monitoring system – fall into 3
categories
1. Local alarm system – when IDS breached–
sounds an alarm for a local security officer
2. 24-hour central station – usually
commercially operated – when get alarm,
they contact local police
3. Propriety alarm systems – controlled and
monitored within the facility
Response forces
Balance between use of security technology &
properly trained security staff
Elements of security systems are the rings –
around the resource need to be protected
Each ring supported by security equipments
and procedures – deter, detect or support
defeating an adversary by being applied on
one or more rings of security
Rings of
Security
Deter
Detect
Assess
Delay
Respond
Deny
Prevention of action through a fear of
unacceptable consequences
Psychological state
Perception of security system – from outside
look
If PTE feels fear – move to other place
Let’s keep them away from here
o Determination and transmission that an event
has occurred
o Use of technology – increases capability
Analysis of an event by a person directly
onsite or via technology
Now-a-days – CCTV systems
Necessary --- determination of the validation
of alarm & appropriate response
Ability of physical or psychological barriers to
restrict movement
Purpose – allow time for an appropriate
response – make impossible for intruder to
continue
Level of reaction required to counter an
intrusion
Response forces
 Unarmed security guards or staff
 Local police
High level – dedicated armed forces – nuclear
storage areas
Ability to oppose or negate the effects of an
action
Final chance to defeat an adversary
To avoid the Probable threat element (PTE)
Hypothetical Scenario
Four Field members of some terrorist agency
meet in the Baltimore in December 2002
 2 from New york
 2 from Fort Worth
Their Mission: Steal biological material---
used in bioterror attack on US food supply
Hypothetical Scenario
March 2003 --- Black Angus restaurant
Atlanta – target selection
 Pre-selection Operations --- 3 locations
• Centers for Disease Control and
Prevention in AtlantaCDC
• U.S. Army Medical Research Institute
of Infectious Diseases in MarylandUSAMRIID
• Plum Island Animal Disease Center
in Long Island, New YorkPlum Island
 Identification of weaknesses in security – to
exploit
Find a location with
 Poor lighting
 Weak CCTV system
 Inconsistent access control system
Began from April to June 2003
Observations were recorded and discovered
 New alarm systems at CDC
 High-tech TV systems– throughout complex
 Barriers – movement hindrance
Assessment
Security components – hindered proposed
operation
Occurred from July to August 2003
Problems were similar to CDC
 Many lights & security structures
 Barriers
 Access control procedures
Assessment
Location was too difficult
August through September 2003
Many weaknesses were found
 Numerous gaps in security
 Doors left open for ventilation
 Some windows left open overnight
 Alarms and door sensors not operational
 Poor lighting
 Inadequate and broken CCTV
Assessment
Plum Island was selected as target
◊ From September to December 2003
◊ Found a route of entry – A window – left
unlocked most evenings
◊ Daily operations were observer and target
selection was made
Attack was conducted early in January 2004
1 person – at vehicle – half a mile away
3 persons – entered building from window
Gained access – cutting hole in drywall
Took several vials of hoof and mouth virus
and exited
Whole operation took 70 minutes
Understanding Security Basics: A Tutorial on Security Concepts and Technology

Weitere ähnliche Inhalte

Andere mochten auch

Obesity: Lifestyle or Genetics?
Obesity: Lifestyle or Genetics?Obesity: Lifestyle or Genetics?
Obesity: Lifestyle or Genetics?devinoconnell26
 
Obesity project
Obesity projectObesity project
Obesity project_olive
 
Presentation 1 Zambrano
Presentation 1 ZambranoPresentation 1 Zambrano
Presentation 1 ZambranoManito Mojito
 
Texas childhood obesity prevention policy evaluation
Texas childhood obesity prevention policy evaluationTexas childhood obesity prevention policy evaluation
Texas childhood obesity prevention policy evaluationBikeTexas
 
Obesity Project
Obesity ProjectObesity Project
Obesity ProjectVance Kite
 
Obesity Around the World Project
Obesity Around the World Project Obesity Around the World Project
Obesity Around the World Project whartonerica
 
Genetic influence on obesity
Genetic influence on obesityGenetic influence on obesity
Genetic influence on obesityNeha Dronamraju
 
Overweight and obesity in children and adolescents
Overweight and obesity in children and adolescentsOverweight and obesity in children and adolescents
Overweight and obesity in children and adolescentsPrab Tumpati
 
Ids final project - Ashley Hampton
Ids final project - Ashley HamptonIds final project - Ashley Hampton
Ids final project - Ashley HamptonAshley Hampton
 
The Economics of Genetically Modified Food Labeling
The Economics of Genetically Modified Food LabelingThe Economics of Genetically Modified Food Labeling
The Economics of Genetically Modified Food LabelingKelsey Feeg
 
Managing childhood obesity
Managing childhood obesityManaging childhood obesity
Managing childhood obesityRhennings
 
Project 2 obesity
Project 2 obesityProject 2 obesity
Project 2 obesityexs111
 
0615 draft childhood obesity
0615 draft childhood obesity0615 draft childhood obesity
0615 draft childhood obesityventresco123
 
EPODE - Preventing childhood obesity in communities - Mr Christophe Roy
EPODE - Preventing childhood obesity in communities - Mr Christophe RoyEPODE - Preventing childhood obesity in communities - Mr Christophe Roy
EPODE - Preventing childhood obesity in communities - Mr Christophe Roysafefood
 
Obesity Around the World Project
Obesity Around the World Project Obesity Around the World Project
Obesity Around the World Project whartonerica
 
Obesity: Lifestyle or Genetics?
Obesity: Lifestyle or Genetics?Obesity: Lifestyle or Genetics?
Obesity: Lifestyle or Genetics?devinoconnell26
 
Obesity among school students
Obesity among school studentsObesity among school students
Obesity among school studentsDFC2011
 
Reducing Obesity in the United States
Reducing Obesity in the United StatesReducing Obesity in the United States
Reducing Obesity in the United StatesRob8GPYE
 

Andere mochten auch (20)

Obesity: Lifestyle or Genetics?
Obesity: Lifestyle or Genetics?Obesity: Lifestyle or Genetics?
Obesity: Lifestyle or Genetics?
 
Obesity project
Obesity projectObesity project
Obesity project
 
Presentation 1 Zambrano
Presentation 1 ZambranoPresentation 1 Zambrano
Presentation 1 Zambrano
 
Texas childhood obesity prevention policy evaluation
Texas childhood obesity prevention policy evaluationTexas childhood obesity prevention policy evaluation
Texas childhood obesity prevention policy evaluation
 
Obesity Project
Obesity ProjectObesity Project
Obesity Project
 
Obesity Around the World Project
Obesity Around the World Project Obesity Around the World Project
Obesity Around the World Project
 
Genetic influence on obesity
Genetic influence on obesityGenetic influence on obesity
Genetic influence on obesity
 
Overweight and obesity in children and adolescents
Overweight and obesity in children and adolescentsOverweight and obesity in children and adolescents
Overweight and obesity in children and adolescents
 
Ids final project - Ashley Hampton
Ids final project - Ashley HamptonIds final project - Ashley Hampton
Ids final project - Ashley Hampton
 
The Economics of Genetically Modified Food Labeling
The Economics of Genetically Modified Food LabelingThe Economics of Genetically Modified Food Labeling
The Economics of Genetically Modified Food Labeling
 
Managing childhood obesity
Managing childhood obesityManaging childhood obesity
Managing childhood obesity
 
Project 2 obesity
Project 2 obesityProject 2 obesity
Project 2 obesity
 
Food Report 2011
Food Report 2011Food Report 2011
Food Report 2011
 
0615 draft childhood obesity
0615 draft childhood obesity0615 draft childhood obesity
0615 draft childhood obesity
 
EPODE - Preventing childhood obesity in communities - Mr Christophe Roy
EPODE - Preventing childhood obesity in communities - Mr Christophe RoyEPODE - Preventing childhood obesity in communities - Mr Christophe Roy
EPODE - Preventing childhood obesity in communities - Mr Christophe Roy
 
Obesity Around the World Project
Obesity Around the World Project Obesity Around the World Project
Obesity Around the World Project
 
Obesity: Lifestyle or Genetics?
Obesity: Lifestyle or Genetics?Obesity: Lifestyle or Genetics?
Obesity: Lifestyle or Genetics?
 
Obesity among school students
Obesity among school studentsObesity among school students
Obesity among school students
 
5a Rayner Obesity
5a  Rayner  Obesity5a  Rayner  Obesity
5a Rayner Obesity
 
Reducing Obesity in the United States
Reducing Obesity in the United StatesReducing Obesity in the United States
Reducing Obesity in the United States
 

Ähnlich wie Understanding Security Basics: A Tutorial on Security Concepts and Technology

Operations SecurityWeek 5Incident Management, Investigatio.docx
Operations SecurityWeek 5Incident Management, Investigatio.docxOperations SecurityWeek 5Incident Management, Investigatio.docx
Operations SecurityWeek 5Incident Management, Investigatio.docxcherishwinsland
 
Accident Investigation Training- Safety First!
Accident Investigation Training- Safety First!Accident Investigation Training- Safety First!
Accident Investigation Training- Safety First!davidhongwei
 
Physical access control
Physical access controlPhysical access control
Physical access controlAhsin Yousaf
 
ICT-security-Lesson-4.pdf
ICT-security-Lesson-4.pdfICT-security-Lesson-4.pdf
ICT-security-Lesson-4.pdfasdfg hjkl
 
Decision-Making Support in Biometric-Based Physical Access Control Systems
Decision-Making Support in Biometric-Based Physical Access Control SystemsDecision-Making Support in Biometric-Based Physical Access Control Systems
Decision-Making Support in Biometric-Based Physical Access Control SystemsSahithiKotha2
 
Automatic flood detection and warning device a prototype
Automatic flood detection and warning device a prototypeAutomatic flood detection and warning device a prototype
Automatic flood detection and warning device a prototypeShaina Mavreen Villaroza
 
Basic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpageBasic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpagenakomuri
 
The Six Stages of Incident Response
The Six Stages of Incident Response The Six Stages of Incident Response
The Six Stages of Incident Response Darren Pauli
 
Supply Chain Security
Supply Chain SecuritySupply Chain Security
Supply Chain Securityguest031790
 
Annual ed risk and safety2 2010
Annual ed risk and safety2 2010Annual ed risk and safety2 2010
Annual ed risk and safety2 2010capstonerx
 
Biorisk Management 2020.pptx
Biorisk Management 2020.pptxBiorisk Management 2020.pptx
Biorisk Management 2020.pptxDrafafMahmoud2
 
Concept of physical protection and its principals
Concept of physical protection and its principalsConcept of physical protection and its principals
Concept of physical protection and its principalsRasheed Abbasi
 
Physical Protection Systems
Physical Protection SystemsPhysical Protection Systems
Physical Protection SystemsDavid Santiago
 
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental ControlsPACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental ControlsPace IT at Edmonds Community College
 

Ähnlich wie Understanding Security Basics: A Tutorial on Security Concepts and Technology (20)

Chapter008
Chapter008Chapter008
Chapter008
 
Operations SecurityWeek 5Incident Management, Investigatio.docx
Operations SecurityWeek 5Incident Management, Investigatio.docxOperations SecurityWeek 5Incident Management, Investigatio.docx
Operations SecurityWeek 5Incident Management, Investigatio.docx
 
Accident Investigation Training- Safety First!
Accident Investigation Training- Safety First!Accident Investigation Training- Safety First!
Accident Investigation Training- Safety First!
 
THE THREE DIMENSION-BASED PHYSICAL ACCESS CONTROL DETECTION SYSTEM, THE NATUR...
THE THREE DIMENSION-BASED PHYSICAL ACCESS CONTROL DETECTION SYSTEM, THE NATUR...THE THREE DIMENSION-BASED PHYSICAL ACCESS CONTROL DETECTION SYSTEM, THE NATUR...
THE THREE DIMENSION-BASED PHYSICAL ACCESS CONTROL DETECTION SYSTEM, THE NATUR...
 
Physical access control
Physical access controlPhysical access control
Physical access control
 
403 10
403 10403 10
403 10
 
ICT-security-Lesson-4.pdf
ICT-security-Lesson-4.pdfICT-security-Lesson-4.pdf
ICT-security-Lesson-4.pdf
 
Decision-Making Support in Biometric-Based Physical Access Control Systems
Decision-Making Support in Biometric-Based Physical Access Control SystemsDecision-Making Support in Biometric-Based Physical Access Control Systems
Decision-Making Support in Biometric-Based Physical Access Control Systems
 
Automatic flood detection and warning device a prototype
Automatic flood detection and warning device a prototypeAutomatic flood detection and warning device a prototype
Automatic flood detection and warning device a prototype
 
accident-inv-by-SECO.ppt
accident-inv-by-SECO.pptaccident-inv-by-SECO.ppt
accident-inv-by-SECO.ppt
 
Basic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpageBasic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpage
 
The Six Stages of Incident Response
The Six Stages of Incident Response The Six Stages of Incident Response
The Six Stages of Incident Response
 
Supply Chain Security
Supply Chain SecuritySupply Chain Security
Supply Chain Security
 
Annual ed risk and safety2 2010
Annual ed risk and safety2 2010Annual ed risk and safety2 2010
Annual ed risk and safety2 2010
 
Biorisk Management 2020.pptx
Biorisk Management 2020.pptxBiorisk Management 2020.pptx
Biorisk Management 2020.pptx
 
Concept of physical protection and its principals
Concept of physical protection and its principalsConcept of physical protection and its principals
Concept of physical protection and its principals
 
Physical Protection Systems
Physical Protection SystemsPhysical Protection Systems
Physical Protection Systems
 
Intro
IntroIntro
Intro
 
Network Security
Network Security Network Security
Network Security
 
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental ControlsPACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
 

Mehr von Amna Jalil

Scanning Electron Microscope (SEM)
Scanning Electron Microscope (SEM)Scanning Electron Microscope (SEM)
Scanning Electron Microscope (SEM)Amna Jalil
 
Advantages and disadvantages of GM crops
Advantages and disadvantages of GM cropsAdvantages and disadvantages of GM crops
Advantages and disadvantages of GM cropsAmna Jalil
 
Thermal Stress and the Heat Shock Response in Microbes
Thermal Stress and the Heat Shock Response in MicrobesThermal Stress and the Heat Shock Response in Microbes
Thermal Stress and the Heat Shock Response in MicrobesAmna Jalil
 
Color Blindness
Color BlindnessColor Blindness
Color BlindnessAmna Jalil
 
Stem Cell Research & Related Ethical Issues
Stem Cell Research & Related Ethical IssuesStem Cell Research & Related Ethical Issues
Stem Cell Research & Related Ethical IssuesAmna Jalil
 
Human Genomic DNA Isolation Methods
Human Genomic DNA Isolation MethodsHuman Genomic DNA Isolation Methods
Human Genomic DNA Isolation MethodsAmna Jalil
 
Virus Transmission
Virus TransmissionVirus Transmission
Virus TransmissionAmna Jalil
 
Effect of UV Rays on the Colonial & Cellular Morphology and Catalase Activity...
Effect of UV Rays on the Colonial & Cellular Morphology and Catalase Activity...Effect of UV Rays on the Colonial & Cellular Morphology and Catalase Activity...
Effect of UV Rays on the Colonial & Cellular Morphology and Catalase Activity...Amna Jalil
 
Nexavar (Sorafenib)
Nexavar (Sorafenib)Nexavar (Sorafenib)
Nexavar (Sorafenib)Amna Jalil
 
Bioinformatics
BioinformaticsBioinformatics
BioinformaticsAmna Jalil
 
Survey of Different Factors Causing Obesity & Prevalence of Different Related...
Survey of Different Factors Causing Obesity & Prevalence of Different Related...Survey of Different Factors Causing Obesity & Prevalence of Different Related...
Survey of Different Factors Causing Obesity & Prevalence of Different Related...Amna Jalil
 
Adenosine deaminase (ADA) Gene Therapy
Adenosine deaminase (ADA) Gene TherapyAdenosine deaminase (ADA) Gene Therapy
Adenosine deaminase (ADA) Gene TherapyAmna Jalil
 
Control of Microorganisms by Lowering pH (by Adding Organic Acids)
Control of Microorganisms by Lowering pH (by Adding Organic Acids)Control of Microorganisms by Lowering pH (by Adding Organic Acids)
Control of Microorganisms by Lowering pH (by Adding Organic Acids)Amna Jalil
 
Yeast Artificial Chromosomes (YACs)
Yeast Artificial Chromosomes (YACs)Yeast Artificial Chromosomes (YACs)
Yeast Artificial Chromosomes (YACs)Amna Jalil
 
Effect of UV Rays & Photoreactivation on the Colonial Morphology and Catalase...
Effect of UV Rays & Photoreactivation on the Colonial Morphology and Catalase...Effect of UV Rays & Photoreactivation on the Colonial Morphology and Catalase...
Effect of UV Rays & Photoreactivation on the Colonial Morphology and Catalase...Amna Jalil
 
Effect of UV Rays on the Colonial & Cellular Morphology and Catalase Activity...
Effect of UV Rays on the Colonial & Cellular Morphology and Catalase Activity...Effect of UV Rays on the Colonial & Cellular Morphology and Catalase Activity...
Effect of UV Rays on the Colonial & Cellular Morphology and Catalase Activity...Amna Jalil
 
Yeast Artificial Chromosome (YAC)
Yeast Artificial Chromosome (YAC)Yeast Artificial Chromosome (YAC)
Yeast Artificial Chromosome (YAC)Amna Jalil
 

Mehr von Amna Jalil (20)

Scanning Electron Microscope (SEM)
Scanning Electron Microscope (SEM)Scanning Electron Microscope (SEM)
Scanning Electron Microscope (SEM)
 
Advantages and disadvantages of GM crops
Advantages and disadvantages of GM cropsAdvantages and disadvantages of GM crops
Advantages and disadvantages of GM crops
 
Genomics
GenomicsGenomics
Genomics
 
Thermal Stress and the Heat Shock Response in Microbes
Thermal Stress and the Heat Shock Response in MicrobesThermal Stress and the Heat Shock Response in Microbes
Thermal Stress and the Heat Shock Response in Microbes
 
Color Blindness
Color BlindnessColor Blindness
Color Blindness
 
Chromosomes
Chromosomes Chromosomes
Chromosomes
 
Stem Cell Research & Related Ethical Issues
Stem Cell Research & Related Ethical IssuesStem Cell Research & Related Ethical Issues
Stem Cell Research & Related Ethical Issues
 
Human Genomic DNA Isolation Methods
Human Genomic DNA Isolation MethodsHuman Genomic DNA Isolation Methods
Human Genomic DNA Isolation Methods
 
Virus Transmission
Virus TransmissionVirus Transmission
Virus Transmission
 
Effect of UV Rays on the Colonial & Cellular Morphology and Catalase Activity...
Effect of UV Rays on the Colonial & Cellular Morphology and Catalase Activity...Effect of UV Rays on the Colonial & Cellular Morphology and Catalase Activity...
Effect of UV Rays on the Colonial & Cellular Morphology and Catalase Activity...
 
Nexavar (Sorafenib)
Nexavar (Sorafenib)Nexavar (Sorafenib)
Nexavar (Sorafenib)
 
Bioinformatics
BioinformaticsBioinformatics
Bioinformatics
 
Survey of Different Factors Causing Obesity & Prevalence of Different Related...
Survey of Different Factors Causing Obesity & Prevalence of Different Related...Survey of Different Factors Causing Obesity & Prevalence of Different Related...
Survey of Different Factors Causing Obesity & Prevalence of Different Related...
 
Adenosine deaminase (ADA) Gene Therapy
Adenosine deaminase (ADA) Gene TherapyAdenosine deaminase (ADA) Gene Therapy
Adenosine deaminase (ADA) Gene Therapy
 
Control of Microorganisms by Lowering pH (by Adding Organic Acids)
Control of Microorganisms by Lowering pH (by Adding Organic Acids)Control of Microorganisms by Lowering pH (by Adding Organic Acids)
Control of Microorganisms by Lowering pH (by Adding Organic Acids)
 
Yeast Artificial Chromosomes (YACs)
Yeast Artificial Chromosomes (YACs)Yeast Artificial Chromosomes (YACs)
Yeast Artificial Chromosomes (YACs)
 
RNA Splicing
RNA SplicingRNA Splicing
RNA Splicing
 
Effect of UV Rays & Photoreactivation on the Colonial Morphology and Catalase...
Effect of UV Rays & Photoreactivation on the Colonial Morphology and Catalase...Effect of UV Rays & Photoreactivation on the Colonial Morphology and Catalase...
Effect of UV Rays & Photoreactivation on the Colonial Morphology and Catalase...
 
Effect of UV Rays on the Colonial & Cellular Morphology and Catalase Activity...
Effect of UV Rays on the Colonial & Cellular Morphology and Catalase Activity...Effect of UV Rays on the Colonial & Cellular Morphology and Catalase Activity...
Effect of UV Rays on the Colonial & Cellular Morphology and Catalase Activity...
 
Yeast Artificial Chromosome (YAC)
Yeast Artificial Chromosome (YAC)Yeast Artificial Chromosome (YAC)
Yeast Artificial Chromosome (YAC)
 

Kürzlich hochgeladen

ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 

Kürzlich hochgeladen (20)

ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 

Understanding Security Basics: A Tutorial on Security Concepts and Technology

  • 2. CDC 8th National Biosafety Symposium, Atlanta, Georgia, 2004
  • 3.
  • 4. Overview of the security concepts and the systems  Need of security expert  One’s own organization  Full or part-time contractor
  • 5. Security is the degree of resistance to, or protection from, harm. It applies to any vulnerable and valuable asset, such as a person, community, nation, or organization (Biosafety labs)
  • 6. Consist of equipment, policies and procedures that support each of the elements of security
  • 8. 30 feet clear zone --- from the protectable object or facility Void of  Trash receptables  Ashtrays  dumpsters
  • 9.
  • 10.
  • 11.  Restrict, deny or channel pedestrian or vehicular traffic  Not necessarily impenetrable – increase the probability to detect people & vehicles – trying to get illegal access
  • 12.
  • 13. Significant deterrent – potential intruders Enhances visibility for routine patrols & general staff Permanent lightening – adequate illumination to  Entry points  Pathways  Parking lots
  • 14. Activated by Sensors – activate the lights when penetrated Can activated by  Timers  Manually
  • 15.
  • 16. ◊ Often neglected component ◊ Support deterrence & delay by providing concealment from chance and direct surveillance ◊ Purpose – limit visibility from unauthorized sources ◊ Simple – darkened windows, curtains ◊ Complex – walls, coverings even shrubbery
  • 17.
  • 18. Many shapes and forms Single hasp lock to very complex systems Include:  Standard key lock  Combination lock  Cipher lock  Card access control systems including swipe card lock and biometric Can be tied in electronic security system
  • 19.
  • 20.
  • 21. • Come in three flavors Access Control Systems Security Surveillance Intrusion Detection Systems (IDS)
  • 22. ACCESS CONTROL SYSTEMS Devices designed to limit access --- site, building, room or container Simple – swipe access system Complex -- biometrics
  • 23.
  • 24. SECURITY SURVEILLANCE Most common – CCTV When choosing CCTV  Resolution power and image quality  Color or black & white  Zoom capability  Transmission mode
  • 25.
  • 26.
  • 27. INTRUSION DETECTION SYSTEMS (IDS) Identify unauthorized entry Connected to monitoring system – fall into 3 categories 1. Local alarm system – when IDS breached– sounds an alarm for a local security officer 2. 24-hour central station – usually commercially operated – when get alarm, they contact local police
  • 28. 3. Propriety alarm systems – controlled and monitored within the facility
  • 29. Response forces Balance between use of security technology & properly trained security staff
  • 30.
  • 31.
  • 32. Elements of security systems are the rings – around the resource need to be protected Each ring supported by security equipments and procedures – deter, detect or support defeating an adversary by being applied on one or more rings of security
  • 34.
  • 35. Prevention of action through a fear of unacceptable consequences Psychological state Perception of security system – from outside look If PTE feels fear – move to other place Let’s keep them away from here
  • 36. o Determination and transmission that an event has occurred o Use of technology – increases capability
  • 37. Analysis of an event by a person directly onsite or via technology Now-a-days – CCTV systems Necessary --- determination of the validation of alarm & appropriate response
  • 38. Ability of physical or psychological barriers to restrict movement Purpose – allow time for an appropriate response – make impossible for intruder to continue
  • 39. Level of reaction required to counter an intrusion Response forces  Unarmed security guards or staff  Local police High level – dedicated armed forces – nuclear storage areas
  • 40. Ability to oppose or negate the effects of an action Final chance to defeat an adversary
  • 41. To avoid the Probable threat element (PTE) Hypothetical Scenario Four Field members of some terrorist agency meet in the Baltimore in December 2002  2 from New york  2 from Fort Worth Their Mission: Steal biological material--- used in bioterror attack on US food supply
  • 43. March 2003 --- Black Angus restaurant Atlanta – target selection  Pre-selection Operations --- 3 locations • Centers for Disease Control and Prevention in AtlantaCDC • U.S. Army Medical Research Institute of Infectious Diseases in MarylandUSAMRIID • Plum Island Animal Disease Center in Long Island, New YorkPlum Island
  • 44.  Identification of weaknesses in security – to exploit Find a location with  Poor lighting  Weak CCTV system  Inconsistent access control system
  • 45. Began from April to June 2003 Observations were recorded and discovered  New alarm systems at CDC  High-tech TV systems– throughout complex  Barriers – movement hindrance Assessment Security components – hindered proposed operation
  • 46. Occurred from July to August 2003 Problems were similar to CDC  Many lights & security structures  Barriers  Access control procedures Assessment Location was too difficult
  • 47. August through September 2003 Many weaknesses were found  Numerous gaps in security  Doors left open for ventilation  Some windows left open overnight  Alarms and door sensors not operational  Poor lighting  Inadequate and broken CCTV Assessment Plum Island was selected as target
  • 48. ◊ From September to December 2003 ◊ Found a route of entry – A window – left unlocked most evenings ◊ Daily operations were observer and target selection was made
  • 49. Attack was conducted early in January 2004 1 person – at vehicle – half a mile away 3 persons – entered building from window Gained access – cutting hole in drywall Took several vials of hoof and mouth virus and exited Whole operation took 70 minutes