Access Controls: Computer Security Covers A Lot of Territory: Locking Your Server and Telecommunications
Access Controls: Computer Security Covers A Lot of Territory: Locking Your Server and Telecommunications
Computer security covers a lot of territory: locking your server and telecommunications
rooms, locking your machine, protecting your login accounts with strong passwords,
using file protection and adhering to a regular backup schedule to keep your data from
being destroyed, encrypting network communications lines, and using special shields to
keep electromagnetic emanations from leaking out of your computer (TEMPEST). But
when people talk about computer security, they usually mean what is called computer
system security, which is a fancy way of saying data protection.
The selection of a site for information technology equipment is the first consideration in
planning and preparing for the installation. Determine whether a new site is to be
constructed or alterations are to be performed on an existing site.
This section provides specific information on building location, structure, and space
requirements for present and future needs.
Utilities
Power and communication facilities must be available in the quantities required for
operation. If these are inadequate, contact the utility company to determine if additional
services can be made available.
Exposure to hazards
Pollution, flooding, radio or radar interference, and hazards caused by nearby industries
can cause problems to information technology equipment and recorded media. Any
indication of exposure in these areas should be recognized and included in the planning
of the installation.
PHYSICAL SECURITY OF PC
The first step in security is considering the physical security of the PC. Maintenance of physical
security depends on the location and the budget.
The second step is the factors related to physical stability that include the power supply,
physical location of the computer, room temperature, etc. Failure of anyone of the above said
factors leads the computer into risks.
There is a good chance that your home PC is one of the most expensive things in your home, or if you
have got a laptop, it is likely to be the most expensive thing you carry in a bag.
Although your insurance policy may cover the costs of replacing hardware if it’s stolen, there is nothing
that money can do to retrieve precious or personal data. So physical security is as important as software
security.
Reliable electrical power is required for the proper functioning of your data processing
equipment.
IBM® information technology equipment requires a reliable electrical power source that
is free from interference or disturbance. Electrical power companies generally supply
power of sufficient quality. The Power quality, Voltage and frequency limits, Power load,
and Power source topics provide the guidance and specifications needed to meet the
requirements of the equipment. Qualified personnel must ensure that electrical power
distribution system is safe and meets local and national codes. They must also ensure
that the voltage measured at the power receptacle is within the specified tolerance for
the equipment. In addition, a separate power feeder is required for items such as
lighting and air conditioning. A properly installed electrical power system will help to
provide for reliable operation of your IBM equipment.
Computers are nothing but electronic machines with the ability to perform functions
which we tell them to do or which for they are trained for.
Computers work for us as we program them. They do our work. They perform those
works with the help of various devices.
In doing all the above process energy in the form of electricity is consumed or i should
say utilised. The energy is then converted into heat energy and heat is produced. To
control this heat, we need to cool down the system. For cooling purpose air conditioners
are installed in computer labs.
But the true danger lies in how this heat can impact your vital equipment. High heat levels place
your equipment in considerable danger, threatening damage to hardware and software at worst,
but even at best the heat can reduce system efficiency and drastically impact performance.
The Benefits of Computer Room Air
Conditioning
A proper server room or computer room system is designed with your structure’s unique
needs in mind, including monitoring systems, humidity control options, and even more.
This offers a complete package that works hard to protect everything that makes your
business tick. The advantages include:
Protection for equipment and critical data. By keeping cool air circulated in accordance
with your space’s needs, you’re guaranteed complete protection for hardware and software,
reducing the risks of down time.
Improved productivity and compute system lifespans. Computer systems that retain
optimal cool temperature ranges work faster and more efficiency, and this drastically
reduces general wear and tear.
Optimized low humidity levels. Humidity can be even more dangerous for your systems
than heat, but with a proper cooling system in place you’ve got nothing at all to worry about.
Even on the worst Chicago summer days!
Comfort for employees. Even more important than the computers and devices,
employees that work closely with them must be kept comfortable in order to stay healthy
and productive. The conditions of poorly equipped computer rooms are often completely
unacceptable, posing considerable risks.
Fire suppression systems for server rooms and data centres are essential to the server room
itself. A fire suppression system will automatically extinguish a fire without the need of human
intervention. Fire suppression systems for data centres must be suitable for clean air
environments, as server rooms and data centres are mostly occupied by personnel.
The designs standards for Fire suppression systems for server rooms and data centres are
carried out with strict guidelines, as the fire suppression agents used can be dangerous if not
designed correctly.
The most common sources of fires in data centers are the electrical system or the hardware.
Breakdowns in insulation and the resultant short circuiting can lead to intense heat that can melt
materials or cause a fire. Computer room fires are often small or smoldering, with little effect on the
temperatures in the room. Because the smoke itself can impact the computer hardware, it is necessary
to employ a detection system that is sensitive to smoke and other products of combustion rather than
temperature. The specific detection and extinguishing system is dependent on the specific design and
exposures of the individual data center area. NFPA 75 states:
5-2: Automatic detection equipment shall be installed to provide early warning of fire. The equipment
used shall a be listed smoke detection type. Each installation shall be engineered for the specific area to
be protected, giving due consideration to air currents and patterns within the space and shall be
installed and maintained in accordance with NFPA 72E, Standard on Automatic Fire Detectors.
2-4.3a: An automatic detection and extinguishing system shall be installed in the space below the raised
floor.
A passive suppression system reacts to detected hazards with no manual intervention. The most
common forms of passive suppression are sprinkler systems or chemical suppression systems. Sprinkler
systems can be flooded (wet pipe) or pre-action (dry pipe). A flooded system incorporates pipes that are
full at all times, allowing the system to discharge immediately upon threat detection. A pre-action
system will flood the sprinkler pipes upon an initial detection, but will have a delay before actual
discharge. Chemical total flooding systems work by suffocating the fire within the controlled zone. The
suppression chemical most often found in data centers is Halon 1301. Halon is being eliminated in favor
of the more environmentally friendly FM200 or various forms of water suppression. Carbon dioxide
suppression systems are also used, but can be a concern due to operator safety issues in the instance of
a discharge. These can be used independently, or in combination depending on the exposures in the
room, local ordinances and insurance requirements.
The ideal system would incorporate both a gas system and a pre-action water sprinkler system in the
ambient space. The gas suppression systems are friendlier to the hardware in the event of a discharge.
Water sprinklers often cause catastrophic and irreparable damage to the hardware, whereas the
hardware in a room subjected to a gas discharge can often be brought back on-line soon after the room
is purged. Gas systems are, however, "one-shot" designs. If the fire is not put out in the initial discharge,
there is no second chance. The gas system cannot be reused until it is recharged or connected to a back-
up source. Water systems can continue to address the fire until it has been brought under control. While
this is more likely to damage the hardware, it is also a more secure means of protecting the building
structure. Water suppression systems are often preferred or mandated by building owners or insurance
companies. Water systems are also highly recommended in areas containing a high level of combustible
materials use or storage. The decision of what means of fire suppression to utilize must incorporate
numerous factors including the mission and criticality of the data center operations.
Halon 1301 fire suppression gas is no longer in production, as of January 1994, and may be subject to
punative tariffs under certain circumstances. Alternate gasses, such as FM-200, are available. FM-200
requires a slightly higher gas concentration than Halon 1301 (7% versus 5%), but is similar in
effectiveness and has none of the environmental side-effects that led to the banning of Halon 1301.
Manual means of fire suppression system discharge should also be installed. These should take the form
of manual pull stations at strategic points in the room. In areas where gas suppression systems are used,
there is normally also a means of manual abort for the suppression system. In designs where it is
necessary to hold the abort button to maintain the delay in discharge, it is essential that a means of
communication is available within reach.
Portable fire extinguishers should also be placed strategically throughout the room. These should be
unobstructed, and should be clearly marked. Labels should be visible above the tall computer
equipment from across the room. Appropriate tile lifters should be located at each extinguisher station
to allow access to the subfloor void for inspection, or to address a fire.
Identify critical software applications and data and the hardware required to run them. Using
standardized hardware will help to replicate and reimage new hardware. Ensure that copies
of program software are available to enable re-installation on replacement equipment.
Prioritize hardware and software restoration.
Document the IT disaster recovery plan as part of the business continuity plan. Test the
plan periodically to make sure that it works.
Businesses large and small create and manage large volumes of electronic information or
data. Much of that data is important. Some data is vital to the survival and continued
operation of the business. The impact of data loss or corruption from hardware failure,
human error, hacking or malware could be significant. A plan for data backup and
restoration of electronic information is essential.
IT Recovery Strategies
Recovery strategies should be developed for Information technology (IT) systems,
applications and data. This includes networks, servers, desktops, laptops, wireless devices,
data and connectivity. Priorities for IT recovery should be consistent with the priorities for
recovery of business functions and processes that were developed during the business
impact analysis. IT resources required to support time-sensitive business functions and
processes should also be identified. The recovery time for an IT resource should match
the recovery time objective for the business function or process that depends on the IT
resource.
Information technology systems require hardware, software, data and connectivity. Without
one component of the “system,” the system may not run. Therefore, recovery strategies
should be developed to anticipate the loss of one or more of the following system
components:
Some business applications cannot tolerate any downtime. They utilize dual data centers
capable of handling all data processing needs, which run in parallel with data mirrored or
synchronized between the two centers. This is a very expensive solution that only larger
companies can afford. However, there are other solutions available for small to medium
sized businesses with critical business applications and data to protect.
A backup site or work area recovery site is a location where an organization can relocate
following a disaster, such as fire, flood, terrorist threat or other disruptive event. This is an integral
part of the disaster recovery plan and wider business continuity planning of an organization.
A backup, or alternate, site can be another data center location operated by the organization, or
contracted via a company that specializes in disaster recovery services. In some cases, one
organization will have an agreement with a second organization to operate a joint backup site. In
addition, an organization may have a reciprocal agreement with another organization to set up a
warm site at each of their data centers.
There are three types of backup sites, including cold sites, warm sites, and hot sites. The differences
between the types are determined by the costs and effort required to implement each.
Obviously these terms do not refer to the temperature of the backup site. Instead, they refer
to the effort required to begin operations at the backup site in the event of a disaster.
A cold backup site is little more than an appropriately configured space in a building.
Everything required to restore service to your users must be procured and delivered to the
site before the process of recovery can begin. As you can imagine, the delay going from a
cold backup site to full operation can be substantial.
A warm backup site is already stocked with hardware representing a reasonable facsimile of
that found in your data center. To restore service, the last backups from your off-site
storage facility must be delivered, and bare metal restoration completed, before the real
work of recovery can begin.
Hot backup sites have a virtual mirror image of your current data center, with all systems
configured and waiting only for the last backups of your user data from your off-site storage
facility. As you can imagine, a hot backup site can often be brought up to full production in
no more than a few hours.
o A mutual agreement with another organization to share data center facilities in the
event of a disaster
Each approach has its good and bad points. For example, contracting with a disaster
recovery firm often gives you access to professionals skilled in guiding organizations
through the process of creating, testing, and implementing a disaster recovery plan. As you
might imagine, these services do not come without cost.
Using space in another facility owned and operated by your organization can be essentially
a zero-cost option, but stocking the backup site and maintaining its readiness is still an
expensive proposition.
Crafting an agreement to share data centers with another organization can be extremely
inexpensive, but long-term operations under such conditions are usually not possible, as the
host's data center must still maintain their normal production, making the situation strained
at best.
In the end, the selection of a backup site is a compromise between cost and your
organization's need for the continuation of production.