Chapter 9

Chapter 9 - Learning Objectives Upon completion of this...

Info iconThis preview shows pages 1–12. Sign up to view the full content.

View Full Document Right Arrow Icon
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Principles of Information Security, 3rd Edition 2 Learning Objectives Upon completion of this material, you should be able to: Discuss the relationship between threats to information security and physical security Describe the key physical security considerations including fire control and surveillance systems Identify critical physical environment considerations for computing facilities, including uninterruptible power supplies
Background image of page 2
Principles of Information Security, 3rd Edition 3 Introduction Physical security addresses design, implementation, and maintenance of countermeasures that protect physical resources of an organization. Most controls can be circumvented if attacker gains physical access Physical security is as important as logical security
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Principles of Information Security, 3rd Edition 4 Introduction (continued) Seven major sources of physical loss Extreme temperature Gases Liquids Living organisms Projectiles Movement Energy anomalies
Background image of page 4
Principles of Information Security, 3rd Edition 5 Introduction (continued) Community roles General management: responsible for facility security IT management and professionals: responsible for environmental and access security Information security management and professionals: perform risk assessments and implementation reviews
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Principles of Information Security, 3rd Edition 6 Physical Access Controls Secure facility: physical location engineered with controls designed to minimize risk of attacks from physical threats Secure facility can take advantage of natural terrain, traffic flow, and degree of urban development; can complement these with protection mechanisms (fences, gates, walls, guards, alarms)
Background image of page 6
Principles of Information Security, 3rd Edition 7 Physical Security Controls Walls, fencing, and gates Guards Dogs ID cards and badges Locks and keys
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Principles of Information Security, 3rd Edition 8 Physical Security Controls (continued) Mantraps Electronic monitoring Alarms and alarm systems Computer rooms and wiring closets Interior walls and doors
Background image of page 8
Principles of Information Security, 3rd Edition 9 ID Cards and Badges Ties physical security with information access control ID card is typically concealed Name badge is visible Serve as simple form of biometrics (facial recognition) Should not be only means of control as cards can be easily duplicated, stolen, and modified Tailgating occurs when unauthorized individual follows authorized user through the control
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Principles of Information Security, 3rd Edition 10 Locks and Keys Two types of locks: mechanical and electromechanical Locks can also be divided into four categories: manual, programmable, electronic, biometric Locks fail and alternative procedures for controlling access must be put in place Locks fail in one of two ways Fail-safe lock Fail-secure lock
Background image of page 10
Principles of Information Security, 3rd Edition 11 Figure 9-1
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 12
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

Page1 / 41

Chapter 9 - Learning Objectives Upon completion of this...

This preview shows document pages 1 - 12. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online