Académique Documents
Professionnel Documents
Culture Documents
Introduction
Introduction Primary consideration in physical security is that nothing should impede life safety goals.
Ex.: Dont lock the only fire exit door from the outside.
Safety: Deals with the protection of life and assets against fire, natural disasters, and devastating accidents. Security: Addresses vandalism, theft, and attacks by individuals.
Physical Security Planning Physical security, like general information security, should be based on a layered defense model. Layers are implemented at the perimeter and moving toward an asset.
10
11
12
Territorial Reinforcement
Creates physical designs that highlight the companys area of influence to give legitimate owners a sense of ownership. Accomplished through the use of walls, lighting, landscaping, etc.
13
Target hardening focuses on denying access through physical and artificial barriers (can lead to restrictions on use, enjoyment, and aesthetics of the environment).
14
15
16
17
Automatic door lock configuration: Fail safe: If a power disruption occurs, the door defaults to being unlocked. Fail secure: If a power disruption occurs, the door defaults to being locked.
18
Physical Security Planning Windows can also be used to promote physical security. Know the different types of glass:
Standard Tempered Acrylic Wired Laminated Solar Window Film Security Film
19
20
21
Power protection:
UPS Systems
Online UPS systems Standby UPS System
22
23
Power Loss
Fault Blackout
Power Degradation
Sag/dip Brownout Inrush Current
24
Environmental Issues
Positive Drains Static Electricity Temperature
25
26
27
28
Ventilation
Airborne materials and particle concentration must be monitored for inappropriate levels. Closed Loop Positive Pressurization
29
American Society for Testing and Materials (ASTM) is the organization that creates the standards that dictate how fire resistant ratings tests should be carried out and how to properly interpret results.
31
32
Types of Fire:
A: Common Combustibles
Elements: Wood products, paper, laminates Suppression: Water, foam
B: Liquid
Elements: Petroleum products and coolants Suppression: Gas, CO2, foam, dry powders
C: Electrical
Elements: Electrical equipment and wires Suppression: Gas, CO2, dry powders
D: Combustible Metals
Elements: magnesium, sodium, potassium Suppression: Dry powder
K: Commercial Kitchens
Elements: Cooking oil fires Suppression: Wet chemicals such as potassium acetate.
33
34
Know suppression agent properties and the types of fires that each suppression agent combats Know the types of fire extinguishers (A,B,C, D) that combat different types of fires
35
Types of Sprinklers
Wet Pipe Systems (aka Closed Head System) Dry Pipe Systems Preaction Systems Deluge Systems
36
Perimeter Security
The first line of defense is perimeter control at the site location, to prevent unauthorized access to the facility. Perimeter security has two modes:
Normal facility operation Facility closed operation
37
Perimeter Security
38
39
Perimeter Security Fences are first line of defence mechanisms. (Small Joke!)
Varying heights, gauge, and mesh provides security features (know them).
Barbed wire direction makes a difference.
40
Perimeter Security
41
Perimeter Security
42
Perimeter Security
Locks are inexpensive access control mechanisms that are widely accepted and used. Locks are considered delaying devices.
43
Device Locks
Cable locks, switch controls, slot locks, port controls, peripheral switch controls, cable traps
44
Perimeter Security
Lock Strengths:
Grade 1 (commercial and industrial use) Grade 2 (heavy duty residential/light duty commercial) Grade 3 (residential and consumer expendable)
Cylinder Categories
Low Security (no pick or drill resistance) Medium Security (some pick resistance) High Security (pick resistance through many different mechanismsused only in Grade 1 & 2 locks)
45
46
Perimeter Security
Continuous lighting: An array of lights that provide an even amount of illumination across an area. Controlled lighting: An organization should erect lights and use illumination in such a way that does not blind its neighbors or any passing cars, trains, or planes. Standby Lighting: Lighting that can be configured to turn on and off at different times so that potential intruders think that different areas of the facility are populated. Redundant or backup lighting: Should be available in case of power failures or emergencies. Response Area Illumination: Takes place when an IDS detects suspicious activities and turns on the lights within the specified area.
47
Perimeter Security
Surveillance Devices
These devices usually work in conjunction with guards or other monitoring mechanisms to extend their capacity. Know the factors in choosing CCTV, focal length, lens types (fixed v. zoom), iris, depth of field, illumination requirements
48
Perimeter Security Focal length: The focal length of a lens defines its effectiveness in viewing objects from a horizontal and vertical view.
The sizes of images that will be shown on a monitor along with the area that can be covered by one camera are defined by focal length.
Short focal length = wider angle views Long focal length = narrower views
49
Perimeter Security Depth of field: Refers to the portion of the environment that is in focus
Shallow depth of focus: Provides a softer backdrop and leads viewers to the foreground object Greater depth of focus: Not much distinction between objects in the foreground and background.
50
Perimeter Security
Intrusion Detection systems are used to detect unauthorized entries and to alert a responsible entity to respond. Know the different types of IDS systems (electro-mechanical v. volumetric) and changes that can be detected by an IDS system.
51
Perimeter Security
Physical Security
53
Physical Security
Resources
All in One Book (Shon Harris, 2005) Official (ISC) Guide to the CISSP CBK ((ISC), 2006)
54