chapter-09 - Learning Objectives Upon completion of this...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Principles of Information Security, 2nd Edition 2 Learning Objectives Upon completion of this material, you should be able to: Understand the conceptual need for physical security Identify threats to information security that are unique to physical security Describe the key physical security considerations for protecting a computer facility (Physical access and fire safety) Define organizational community roles relative to physical security Understand the importance of fire safety programs to physical security programs
Background image of page 2
Principles of Information Security, 2nd Edition 3 Learning Objectives (continued) Understand the impact of service interruptions of supporting utilities Discuss uninterruptible power supplies and how they are used to increase availability of information assets Outline the risks and associated countermeasures pertaining to portable/mobile computing devices
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Principles of Information Security, 2nd Edition 4 Introduction Physical Security addresses design, implementation, and maintenance of countermeasures that protect physical resources of an organization. Most controls can be circumvented if attacker gains physical access (i.e.,Tailgater, leaving/losing your badge or office keys, failing to lock your computer) Physical security is as important as logical security
Background image of page 4
Principles of Information Security, 2nd Edition 5 Introduction (continued) Seven major sources of physical loss Extreme temperature (heat and cold) Gases (military, commercial, toxic fumes) Liquids (water, chemicals, humidity/condensation) Living Organisms ( humans, animals, insects, viruses, bacteria) Projectiles (powered objects) Movement (vibrations, shearing, separation, slide, etc) Energy Anomalies (electrical surge or failure, magnetism, static electricity, electromagnetic, radiation; solar flares)
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Principles of Information Security, 2nd Edition 6 Introduction (continued) Organizational Community Roles: General Management : responsible for facility corporate governance, utilization, allocation, modifications/refurbishments, maintenance, budgeting, safety, and security. IT Management and Professionals : responsible for tactical and operational aspects regarding IT spaces relative to governance, environmental, and access security Information Security Management and Professionals : perform risk assessments and implementation reviews
Background image of page 6
Principles of Information Security, 2nd Edition 7 Physical Access Controls Secure Facility : physical location engineered with controls designed to minimize risk of attacks from physical threats Secure facility can take advantage of natural terrain, traffic flow, and degree of urban development; can complement these with protection mechanisms (fences, gates, walls, guards, alarms)
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Principles of Information Security, 2nd Edition 8 Controls for Protecting the Secure Facility Walls, fencing, and gates Guards Dogs ID Cards and badges Locks and keys
Background image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 52

chapter-09 - Learning Objectives Upon completion of this...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online