IS08-Physical Security

IS08-Physical Security - Physical and Environmental...

Info iconThis preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon
Physical and Environmental Security Pintu R Shah
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
In this unit. . • Introduction • Physical security Threats and measures • Perimeter security Pintu R Shah MPSTME SVKM's NMIMS • Environmental issues 2
Background image of page 2
Introduction • The Physical Security domain addresses the threats, vulnerabilities, and countermeasures that can be utilized to physically protect an enterprise’s resources and sensitive information. • These resources include personnel, the facility in which they work, and the data, equipment, support systems, Pintu R Shah MPSTME SVKM's NMIMS and media with which they work. • Physical security often refers to the measures taken to protect systems, buildings, and their related supporting infrastructure against threats that are associated with the physical environment. • Physical computer security can also be defined as the process used to control personnel, the physical plant, equipment, and data involved in information processing. 3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Physical security objectives First line of defense Facility location and construction Physical security risks, threats and ountermeasures Pintu R Shah MPSTME SVKM's NMIMS countermeasures Electrical issues and countermeasures Perimeter protection mechanisms Physical intrusion detection Fire prevention, detection and suppression 4
Background image of page 4
Threats to Physical Security • The triad of Confidentiality, Availability, and Integrity is at risk in the physical environment and must be protected. Examples of risks to C.I.A. include the following: – Interruptions in providing computer services.availability – Physical damage.Availability Pintu R Shah MPSTME SVKM's NMIMS Unauthorized disclosure of information.Confidentiality – Loss of control over system.Integrity – Physical theft.Confidentiality, Integrity, and Availability • Examples of threats to physical security are as follows: – Emergencies – Natural disasters – Human intervention 5
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Controls for Physical Security • Administrative Controls • Physical Controls • Technical Controls. Pintu R Shah MPSTME SVKM's NMIMS 6
Background image of page 6
Administrative Controls • Administrative controls, as opposed to physical or technical controls, can be thought of as the area of physical security protection that benefits from the proper administrative steps. • These steps encompass proper emergency procedures, Pintu R Shah MPSTME SVKM's NMIMS personnel control (in the area of Human Resources), proper planning, and policy implementation. • We will look at the following various elements of
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 8
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 28

IS08-Physical Security - Physical and Environmental...

This preview shows document pages 1 - 8. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online