Physical Security
Physical Security
Objectives
Understand the conceptual need for physical security Identify threats to information security that are unique to physical security Describe the key physical security considerations for selecting a facility site Identify physical security monitoring components Recognize the essential elements of physical access control within the scope of facilities management Understand the importance of fire safety programs to all physical security programs
Objectives (continued)
Describe the components of fire detection and response Understand the impact of service interruptions of supporting utilities Understand the technical details of uninterruptible power supplies and how they are used to increase availability of information assets Discuss critical physical environment considerations for computing facilities Discuss the countermeasures used against the physical theft of computing devices
Introduction
Physical security addresses design, implementation, and maintenance of countermeasures that protect physical resources of an organization. Most controls can be circumvented if attacker gains physical access
Introduction (continued)
Seven major sources of physical loss
Extreme temperature
Gases Liquids Living organisms Projectiles
Movement
Energy anomalies
Introduction (continued)
Community roles
Serve as simple form of biometrics (facial recognition) Should not be only means of control as cards can be easily duplicated, stolen, and modified Tailgating occurs when unauthorized individual follows authorized user through the control
Locks fail and alternative procedures for controlling access must be put in place
Locks fail in one of two ways
Fail-safe lock
Fail-secure lock
Mantraps
Small enclosure that has entry point and different exit point Individual enters mantrap, requests access, and if verified, is allowed to exit mantrap into facility Individual denied entry is not allowed to exit until security official overrides automatic locks of the enclosure
Mantrap
Electronic Monitoring
Records events where other types of physical controls are impractical or incomplete May use cameras with video recorders; includes closed-circuit television (CCT) systems
Drawbacks
Reactive; do not prevent access or prohibited activity
Recordings often not monitored in real time; must be reviewed to have any value
Rely on sensors that detect event; e.g., motion detectors, smoke detectors, thermal detectors, glass breakage detectors, weight sensors, contact sensors, vibration sensors
Imperative that physical security plans examine and implement strong measures to detect and respond to fires
Gas-based systems
Fire Detection
Fire detection systems fall into two general categories: manual and automatic
Part of a complete fire safety program includes individuals that monitor chaos of fire evacuation to prevent an attacker accessing offices There are three basic types of fire detection systems: thermal detection, smoke detection, flame detection
Fire Suppression
Systems consist of portable, manual, or automatic apparatus
Portable extinguishers are rated by the type of fire: Class A, Class B, Class C, Class D Installed systems apply suppressive agents; usually either sprinkler or gaseous systems
Halon is clean but has been classified as ozonedepleting substance; new installations are prohibited
Alternative clean agents include FM-200, Inergen, carbon dioxide, FE-13 (trifluromethane)
Filtration
Humidity
Static electricity
Ventilation Shafts
While ductwork is small in residential buildings, in large commercial buildings it can be large enough for individual to climb though If vents are large, security can install wire mesh grids at various points to compartmentalize the runs
Emergency Shutoff
Important aspect of power management is the need to be able to stop power immediately should current represent a risk to human or machine safety
Most computer rooms and wiring closets equipped with an emergency power shutoff
Water Problems
Lack of water poses problem to systems, including functionality of fire suppression systems and ability of water chillers to provide air-conditioning
Surplus of water, or water pressure, poses a real threat (flooding; leaks) Very important to integrate water detection systems into alarm systems that regulate overall facilities operations
Structural Collapse
Unavoidable forces can cause failures of structures that house organization Structures designed and constructed with specific load limits; overloading these limits results in structural failure and potential injury or loss of life Periodic inspections by qualified civil engineers assists in identifying potentially dangerous structural conditions
Interception of Data
Three methods of data interception
Direct observation
Interception of data transmission Electromagnetic interception U.S. government developed TEMPEST program to reduce risk of electromagnetic radiation (EMR) monitoring
Many mobile computing systems have corporate information stored within them; some are configured to facilitate users access into organizations secure computing facilities
Telecommuting: computing using telecommunications including Internet, dial-up, or leased point-to-point links Employees may need to access networks on business trips; telecommuters need access from home systems or satellite offices To provide secure extension of organizations internal networks, all external connections and systems must be secured
Downside includes high expense, loss of control over individual components, and level of trust that must be placed in another company Social engineering: use of people skills to obtain information from employees that should not be released
Inventory Management
Computing equipment should be inventoried and inspected on a regular basis Classified information should also be inventoried and managed
Physical security of computing equipment, data storage media and classified documents varies for each organization
Summary
Threats to information security that are unique to physical security