Chapter 3: Physical Security : at The End of The Unit, The Students Should Be Able To
Chapter 3: Physical Security : at The End of The Unit, The Students Should Be Able To
Physical security encompasses the design, implementation, and maintenance of countermeasures that
protect the physical resources of an organization, including the people, hardware, and supporting system
elements and resources that control information in all its states (transmission, storage, and processing).
Most technology-based controls can be circumvented if an attacker gains physical access to the devices
being controlled. In other words, if it is easy to steal the hard drives from a computer system, then the
information on those hard drives is not secure. Therefore, physical security is just as important as logical
security to an information security program.
Physical Security
There are a number of physical security controls that an organization’s communities of interest should
consider when implementing physical security inside and outside the facility. Some of the major controls
are:
6. Mantraps
A common enhancement for locks in high security areas is the mantrap.
A mantrap is a small enclosure that has separate entry and exit points.
7. Electronic monitoring
Electronic monitoring includes closed-circuit television (CCT) systems.
CCT systems collect constant video feeds, while others rotate input from a number of
cameras, sampling each area in turn.
8. Alarms and alarm systems
Closely related to monitoring are the alarm systems that notify people or systems when a
predetermined event or activity occurs.
Alarms can detect a physical intrusion or other untoward event.
Motion detectors detect movement within a confined space and are either active or
passive.
Thermal detectors measure rates of change in the ambient temperature in the room.
3. The flame detector is a sensor that detects the infrared or ultraviolet light produced by an open
flame.
Fire is one of the most dangerous events possible; somewhere in the world, one occurs every
minute of every day. While fire can be our friend in some instances, it can be our worst enemy
when it’s uncontrolled and allowed to continue through a building.
The field of fire detection has advanced to where smoke detectors and alarm devices have
combined to become life-safety systems. The purpose of an automatic fire-alarm system is to
detect an occurrence, alert the control panel and proper authorities, and notify the occupants to
take action.
Extra Functions
Your fire-detection system can also:
Discharge clean agent fire-suppression systems in computer rooms or clean rooms.
Activate deluge fire systems in aircraft hangers or similarly dangerous areas.
Open a dry pipe sprinkler system for a pre-action suppression system.
Be used for notification of other events, such as severe weather, terrorism, bomb threats,
hazardous chemical incidents, evacuation, etc.
Monitor carbon-monoxide detectors.
*Keep in mind that there are a number of specialized detection devices designed to increase life safety
and reduce the potential for unwanted or nuisance alarms. There are also qualified professionals who can
provide valuable assistance in reviewing the circumstances of your operation and provide guidance and
recommendations for your needs.
FIRE SUPPRESSION
Fire Suppression are used to extinguish or prevent the spread of fire in a building. Suppression
systems use a combination of dry chemicals and/or wet agents to suppress equipment fires.
Fire suppression systems work by releasing a gas or mixture of gasses into the air, generally
with the aim of reducing the amount of oxygen in the air that feeds the flames. The clean agent,
such as CO2, is often stored a distance away from the area it will be protecting.
3. Ventilation shafts
In fact, with moderate security precautions, these shafts can be completely eliminated as a
security vulnerability. In most new buildings, the ducts to the individual rooms are no larger than
12 inches in diameter and are flexible, insulated tubes.
In most new buildings, the ducts to the individual rooms are no larger than 12 inches in diameter
and are flexible, insulated tubes. The size and nature of the ducts precludes most people from
using them, but access may be possible via the plenum. If the ducts are much larger, the security
team can install wire mesh grids at various points to compartmentalize the runs.
INTERCEPTION OF DATA
Three methods of data interception
1. Direct observation, requires that an individual be close enough to the information to breach
confidentiality.
2. Interception of data transmissions, has become easier in the age of the internet. If attackers can
access the media transmitting the data, they needn’t be anywhere near the source of the
information
3. Electromagnetic interception, sounds like it could be from a Star Trek episode. For decades,
scientists have known that electricity moving through cables emits electromagnetic signals (EM).
ACTIVITIES
Activity 2.
Assume that you have converted part of an area of general office space into a server room.
Describe the factors you would consider when planning for each of the following:
a. Walls and doors
b. Physical access control
c. Fire detection
d. Fire suppression
e. Heating, ventilating, and air-conditioning
f. Power quality and distribution
Case Exercises
Amy walked into her office cubicle and sat down. The entire episode with the blond man had taken
well over two hours of her day. Plus, the police officers had told her the district attorney would also be
calling to make an appointment to speak to her, which meant she would have to spend even more time
dealing with this incident. She hoped her manager would understand.
Questions:
1. Based on this case study, what security awareness and training documents and
posters had an impact in this event?
2. Do you think that Amy should have done anything differently? What would you have
done in the situation in which she found herself?
Activity 1
1. What is physical security? What are the primary threats to physical security? How are they made
manifest in attacks against the organization?
2. What are the roles of IT, security, and general management with regard to physical security?
3. How does physical access control differ from the logical access control described in earlier
chapters? How is it similar?
Activity 2.
Assume that you have converted part of an area of general office space into a server room. Describe the
factors you would consider when planning for each of the following:
a. Walls and doors
c. Fire detection
d. Fire suppression
Case Exercises
Questions:
1. Based on this case study, what security awareness and training documents and posters had an
impact in this event?
2. Do you think that Amy should have done anything differently? What would you have done in the
situation in which she found herself?