Unit_5_p1_tech_7350_ - TECH 7350 – Managing Information Security The Graduate School of Management at the University of Dallas TECH 7350 MANAGING

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: TECH 7350 – Managing Information Security The Graduate School of Management at the University of Dallas TECH 7350 MANAGING INFORMATION MANAGING INFORMATION SECURITY SECURITY Sandra Blanke, Ph.D., CISSP The Graduate School of Management at the University of Dallas Unit 5 Unit 5 Chapter 6 Part 1: Chapter 6 Part 1: Physical Security Physical Security 2 Learning Objectives ¡ Administrative, technical, and physical controls ¡ Facility location, construction, and management ¡ Physical security risks, threats, and countermeasures ¡ Electric power issues and countermeasures ¡ Fire prevention, detection, and suppression ¡ Intrusion detection systems 3 Physical Security TECH 7350 – Managing Information Security The Graduate School of Management at the University of Dallas 4 Physical Security Protects ¡ Physical Security is Designed to Protect: ¡ People ¡ Data ¡ Equipment ¡ Systems ¡ Facility ¢ Physical Security Vulnerabilities: ¡ Physical Destruction ¡ Intruders ¡ Environmental Issues ¡ Employee misusing privileges 5 Physical Security Law Suits ¡ Many thefts and deaths could be prevented if all organizations were to implement physical security in an organized, mature and holistic manner. ¢ Some examples of items companies have been sued for pertaining to improper physical security implementations and maintenance include: ¡ An apartment complex does not respond to a report of a broken lock – subsequently a woman is raped by an intruder ¡ Bushes are growing to close to an ATM – individual attacked ¡ Underground garage unlit – employee attacked ¡ Gas station outside lock broken – female customer killed ¡ Convenience store signs & posters block windows – giving thief a way to hide the crime going on inside 6 Physical Security Threats ¡ When security professionals look at physical security, they are concerned with how people physically enter an environment: ¢ The threats the organization faces falls into these categories: ¡ Natural environmental threats (Floods, earthquakes, storms) ¡ Supply system threats – Power distribution outages, communications interruptions, natural energy interruptions including (water, stream, gas) ¡ Manmade Threats – Unauthorized access by explosion, angry employees, employee accidents & errors, fraud, theft, vandalism ¡ Politically motivated threats (strikes, riots, civil disobedience, terrorist attacks & bombings) TECH 7350 – Managing Information Security The Graduate School of Management at the University of Dallas 7 “Protect human life above all else” Protect your fellow humans, be your brother’s keeper and then run!! Physical Security 8 Layered Defense Model ¡ Physical controls should work in a tiered architecture ¢ If one layer fails, other layers will protect the assets ¡ Fence, Facility walls, access control card, security guard, IDS, locked computer cases and safes ¡ Physical Security will protect: ¢ Availability of Company Resources ¢ Integrity of the assets and environment...
View Full Document

This note was uploaded on 02/20/2011 for the course TECH 7350 taught by Professor Lee during the Spring '11 term at University of Arkansas for Medical Sciences.

Page1 / 10

Unit_5_p1_tech_7350_ - TECH 7350 – Managing Information Security The Graduate School of Management at the University of Dallas TECH 7350 MANAGING

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online