Physical Security: Muhammad Wajahat Rajab
Physical Security: Muhammad Wajahat Rajab
C Electrical fires such as computers and Inert Gas, CO2 (Note: Most
electronics important step: Turn off
electricity first!)
D Special fires, such as chemical, metal Dry Powder (May require
total immersion or other
special techniques)
K Commercial kitchen fire Wet Chemicals
Fire suppression
• Carbon Dioxide, Foam, Inert Gas and Dry Powder
Extinguishers DISPLACE Oxygen to suppress a fire
• CO2 is a risk to humans (Because of oxygen
displacement)
• Water suppresses the temperature required to
sustain a fire
Fire suppression - Halon
• Halon banned for new systems under 1987 Montreal
Protocol on substances that deplete the Ozone Layer
– Began implementation of ban in 1992
– Any new installations of fire suppression systems must use
alternate options
– EU requires removal of Halon from most applications
• Halon replacements:
– FM200
– Water
Fire suppression - Water
• Wet Pipe
– Always contains water
– Most popular
– 165°F Fuse Melts
– Can freeze in winter
– Pipe breaks can cause floods
• Dry Pipe
– No water in pipe
– Preferred for computer installations
– Water held back by clapper
– Air blows out of pipe, water flows
Fire Suppression – Water (2)
• Deluge
– Type of dry pipe
– Water discharge is large
– Not recommended for computer installations
• Preaction
– Most recommended for computer room
– Combines both dry and wet Pipes
– Water released into pipe first then after fuse melts in
nozzle the water is dispersed
HVAC
• Heating, Ventilation, and Air Conditioning
• Usually the focal point for Environmental Controls
• You need to know who is responsible for HVAC in
your building
• Clear escalation steps need to be defined well in
advance of an environmental threatening incident
HVAC issues
• Are computerized components involved?
• Does it maintain appropriate temperature and
humidity levels and air quality?
– Ideal Temperature = 70° to 74° F
– Ideal Humidity = 40% to 60%
• Maintenance procedures should be documented
More physical controls
Elements of physical security
• Badges
• Restricted Areas
• Lights
• Dogs
• CCTV
• Locks
• Access Control
• Barriers
• Security Forces
• Fences
• Intrusion Detection Systems
Functions of physical security
• Deter
• Detect
• Delay
• Respond
Perimeter protection
• Perimeter security controls are the first line of
defense
• Protective barriers – Natural or structural
– Natural barriers
• Terrains that are difficult to cross
• Landscaping (Shrubs, Trees, Spiny shrubs)
– Structural barriers
• Fences, Gates, Bollards, Facility Walls
Fences
• Know These Fencing Heights:
– 3 ft – 4 ft high Deters casual trespassers
– 6 ft – 8 ft high Too hard to climb easily
– 8 ft high with
3 strands of
barbed wire Deters intruders
• Types of fencing
– Chain link
– Barbed wire
– Barbed tape or Concertina wire
Fences (2)
This is at least
• Chain link… 8 Feet
– 6 feet tall (Excluding top guard)
– 8 feet tall (With top guard)
– 2 inch openings or less
– Reach within 2 inches of
ground or on soft ground
should be below the surface
– Be sure vegetation or adjacent
structures do not bridge over
the fence
Fences (3)
• Barbed wire
Fences (4)
• Concertina wire
Gates, Bollards, Barriers
Intrusion detection & surveillance
• Perimeter Intrusion Detection Systems
– Sensors that detect access into the area
• Photoelectric
• Ultrasonic
• Microwave
• Passive infrared (PIR)
• Pressure sensitive (Dry contact switch)
– Surveillance Devices
• Closed-Circuit Television (CCTV)
Motion detectors
• Wave Pattern
– Generates a frequency wave pattern
• Capacitance
– Monitors an electrical field around an object
• Audio Detectors
– Monitors any abnormal sound wave generation
– Lots of false alarms
CCTV
• A television transmission system that uses cameras
to transmit pictures to connected monitors
• CCTV levels:
– Detection: The ability to detect the presence of an object
– Recognition: The ability to determine the type of object
(animal, blowing debris, crawling human)
– Identification: The ability to determine the object details
(person, large rabbit, small deer, tumbleweed)
CCTV components
• Camera
– Fixed, Zoom
– Pan, Tilt
• Transmission Media
– Coax Cable
– Fiber Cable
– Wireless
• Monitor
CCTV deployment features
• Cameras high enough to • Camera system tied to
avoid physical attack alarm system
• Cameras distributed to • Number and quality of
include blind areas video frames increased
• Appropriate Lenses during alarm event
• Pan, Tilt, Zoom (PTZ) as • Regular service of
required moving parts
• Ability to be recorded • Cleaning lenses
CCTV application guidelines
• Understand the facility’s total surveillance
requirements
• Determine the size of the area to be monitored
– Depth, Height, and Width
– Ensures proper camera lens specifications
• Lighting is important – Different lamps and lighting
provide various levels of effectiveness
– ‘Contrast’ between the object and background
– For outdoor use, the US army specifies the automatically
adjusted Iris feature
CCTV legal & practical implications
• Storage implications of recorded data
• Video tapes must be stored to prevent deterioration
• Digital records must be maintained to assert integrity
• Human rights and privacy implications in recording
people
• Requirements to blur/pixelate individuals other than
accused!
Lighting
• Provides a deterrent to intruders
• Makes detection likely if entry attempted
• Should be used with other controls such as fences,
patrols, alarm systems, CCTV
• Critical protected buildings should be illuminated up
to 8 feet high, with 2 foot-candle power!
Types of lighting
• Continuous Lighting (Most Common)
– Glare Projection
– Flood Lighting
• Trip Lighting
• Standby Lighting
• Movable (Portable)
• Emergency Lighting
Locks
• Locks are considered delay devices only
• Defeated by force and/or the proper tools
• Never be considered stand-alone method of security
• Types of locks…
Key in knob-locks
Dead bolt locks
Mortise locks
Padlocks
Combination locks
Keyless and smart locks
Lock security measures
• Key control procedures
– Restrict issue of keys on a long-term basis to outside
maintenance or janitorial personnel
– Keep a record of all issued keys
– Investigate the loss of all keys
• When in doubt, rekey the affected locks
– Use as few master keys as possible
– Issue keys on a need-to-go basis
– Remember – Keys are a single-factor authentication
mechanism that can be lost, stolen, or copied!
• (Use 2-factor methods for more secure areas)
Compartmentalized area
• Location where sensitive equipment is stored and
where sensitive information is processed
– Must have a higher level of security controls!
Portable device security
• Laptops, PDAs, Etc.
– Protect the device
– Protect the data in the device
• Examples:
– Locking the cables
– Tracing software
– Encryption software
– PIN Protection for PDAs
– Inventory system
Alarm systems
• Local alarm systems
– Alarm sounds locally and must be protected from
tampering and audible for at least 400 feet
• Central station units
– Monitored 7x24 and signaled over leased lines – Usually
within < 10 minutes travel time
– Private security firms
• Proprietary systems
– Similar to central but owned and operated by customer
Alarm systems (2)
• Auxiliary station systems
– Systems that ring at local fire or police stations
• Line supervision
– Alarm sounds when alarm transmission medium detects
tampering
Drills, testing and maintenance
Drills
• Keep everyone aware of their responsibilities
• Focus on building evacuation exercises
Testing
• Employ physical penetration testing
• Identify weak entry points
• Keep findings documented
• Keep checklists to ensure consistency
Maintenance
• Monitor the maintenance
• Contractually bound the contractors
– Audit services provided
• Proper change and configuration management
Data destruction
• Data Destruction and Reuse…
– Degaussing or overwriting usually destroys most data
– Normal formatting does not destroy the data
– Format or overwrite 7 times (Mil-Spec)
– Consider shredding hard drives, other portable media
– Paper records = Confetti shred or burn!
Questions
Question 1
• Under what conditions would the use of a "Class C"
hand-held fire extinguisher be preferable to the use
of a "Class A" hand-held fire extinguisher?
A. Procedural controls
B. Hardware devices
C. Electronic systems
D. Personnel
Question 2
• Which of the following is the most costly
countermeasure to reducing physical security risks?
A. Procedural controls
B. Hardware devices
C. Electronic systems
D. Personnel
Question 3
• Which type of fire extinguisher is most appropriate
for an information processing facility?
A. Type A
B. Type B
C. Type C
D. Type D
Question 3
• Which type of fire extinguisher is most appropriate
for an information processing facility?
A. Type A
B. Type B
C. Type C
D. Type D
Question 4
• Which of the following floors would be most
appropriate to locate information processing
facilities in a 6-stories building?
A. Basement
B. Ground floor
C. Third floor
D. Sixth floor
Question 4
• Which of the following floors would be most
appropriate to locate information processing
facilities in a 6-stories building?
A. Basement
B. Ground floor
C. Third floor
D. Sixth floor
Thank you!