SlideShare ist ein Scribd-Unternehmen logo
1 von 39
Physical Security Assessment
Basic Concepts of a Physical Security Assessment Daniel R. Finger MPA, CPP, CHPA Physical Security Specialist
Why Do Assessment? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why Do Assessments? (Cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Three Requirements for a Security Issue Opportunity Motive Means
Definition: Risk Assessment ,[object Object],[object Object]
Evaluation ,[object Object],[object Object],[object Object]
Protection ,[object Object],[object Object],[object Object]
Risk Management Framework ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Common Oversights of Security Directors ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Major Categories ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Potential Pitfalls ,[object Object],[object Object],[object Object],[object Object]
Security Master Plan ,[object Object],[object Object]
Joint Commission Security Standards ,[object Object],[object Object]
Identification of Practices ,[object Object],[object Object],[object Object],[object Object]
Performance Elements ,[object Object],[object Object],[object Object],[object Object]
Performance Elements (Cont.) ,[object Object],[object Object],[object Object]
Performance Elements (Cont.) ,[object Object],[object Object],[object Object],[object Object]
Security Management Program ,[object Object]
Physical Survey ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Physical Security Examples ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Physical Security Examples (Cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Physical Security Examples (Cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Infrastructure ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CPTED ,[object Object],[object Object],[object Object],[object Object],[object Object]
CPTED Actors ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key CPTED Concepts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
CPTED Benefits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Traffic Calming ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Fencing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Lighting ,[object Object],[object Object],[object Object],[object Object],[object Object]
Lighting (Cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Summary ,[object Object],[object Object]
[object Object],[object Object]
KRAA Security Services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
KRAA Security Information Services Security End to End + Multi-Layer = Complete  Firewall Public Internet Access Remote Sites Main Site Workstations Application Servers Web Servers Database Servers Email Servers ,[object Object],[object Object],Vulnerability Defense ,[object Object],[object Object],[object Object],[object Object],Intrusion Defense ,[object Object],[object Object],[object Object],[object Object],[object Object],Network Defense ,[object Object],[object Object],[object Object],[object Object],User Defense ,[object Object],[object Object],[object Object],Email Defense ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],System Defense ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

7. physical sec
7. physical sec7. physical sec
7. physical sec
7wounders
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
Wajahat Rajab
 
Access_Control_Systems_and_methodology
Access_Control_Systems_and_methodologyAccess_Control_Systems_and_methodology
Access_Control_Systems_and_methodology
Arti Ambokar
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
R_Yanus
 
Security Presentation
Security PresentationSecurity Presentation
Security Presentation
Gerhard Peens
 

Was ist angesagt? (20)

Physical security
Physical securityPhysical security
Physical security
 
7. physical sec
7. physical sec7. physical sec
7. physical sec
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
8 Access Control
8 Access Control8 Access Control
8 Access Control
 
Physical Security.ppt
Physical Security.pptPhysical Security.ppt
Physical Security.ppt
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Integrated Security management final.ppt
Integrated Security management final.pptIntegrated Security management final.ppt
Integrated Security management final.ppt
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
 
Physical Security.ppt
Physical Security.pptPhysical Security.ppt
Physical Security.ppt
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
Access_Control_Systems_and_methodology
Access_Control_Systems_and_methodologyAccess_Control_Systems_and_methodology
Access_Control_Systems_and_methodology
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Security Presentation
Security PresentationSecurity Presentation
Security Presentation
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
6 Physical Security
6 Physical Security6 Physical Security
6 Physical Security
 
SECURITY AWARENESS
SECURITY AWARENESSSECURITY AWARENESS
SECURITY AWARENESS
 
Security Training Incident Investigation And Report Writing.Ppt
Security Training Incident Investigation And Report Writing.PptSecurity Training Incident Investigation And Report Writing.Ppt
Security Training Incident Investigation And Report Writing.Ppt
 
Physical Security
Physical SecurityPhysical Security
Physical Security
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 

Ähnlich wie Physical Security Assessment

Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of security
ciso_insights
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
Nicholas Davis
 
Information security background
Information security backgroundInformation security background
Information security background
Nicholas Davis
 
1. security management practices
1. security management practices1. security management practices
1. security management practices
7wounders
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
abhichowdary16
 
9142019 Originality Reporthttpsucumberlands.blackboar.docx
9142019 Originality Reporthttpsucumberlands.blackboar.docx9142019 Originality Reporthttpsucumberlands.blackboar.docx
9142019 Originality Reporthttpsucumberlands.blackboar.docx
blondellchancy
 
Dancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehDancyrityshy 1foundatioieh
Dancyrityshy 1foundatioieh
Anne Starr
 

Ähnlich wie Physical Security Assessment (20)

Insider threat kill chain
Insider threat   kill chainInsider threat   kill chain
Insider threat kill chain
 
Testing
TestingTesting
Testing
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of security
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
 
Information security background
Information security backgroundInformation security background
Information security background
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber security
 
RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™
 
1. security management practices
1. security management practices1. security management practices
1. security management practices
 
Incident Response
Incident Response Incident Response
Incident Response
 
Ca world 2007 SOC integration
Ca world 2007 SOC integrationCa world 2007 SOC integration
Ca world 2007 SOC integration
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
 
Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 
9142019 Originality Reporthttpsucumberlands.blackboar.docx
9142019 Originality Reporthttpsucumberlands.blackboar.docx9142019 Originality Reporthttpsucumberlands.blackboar.docx
9142019 Originality Reporthttpsucumberlands.blackboar.docx
 
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management II
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
Dancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehDancyrityshy 1foundatioieh
Dancyrityshy 1foundatioieh
 
Enterprise incident response 2017
Enterprise incident response   2017Enterprise incident response   2017
Enterprise incident response 2017
 
ASSE Safety 2016: Ed Sattar Speaks about Operational Risk and Regulatory Chan...
ASSE Safety 2016: Ed Sattar Speaks about Operational Risk and Regulatory Chan...ASSE Safety 2016: Ed Sattar Speaks about Operational Risk and Regulatory Chan...
ASSE Safety 2016: Ed Sattar Speaks about Operational Risk and Regulatory Chan...
 

Physical Security Assessment