CH 09
CH 09
Learning Objectives
Upon completion of this material, you should be able to:
Discuss the relationship between information security and physical security Describe key physical security considerations, including fire control and surveillance systems Identify critical physical environment considerations for computing facilities, including uninterruptible power supplies
Introduction
Physical security addresses design, implementation, and maintenance of countermeasures that protect physical resources of an organization Most controls can be circumvented if an attacker gains physical access Physical security is as important as logical security
Introduction (contd.)
Seven major sources of physical loss:
Extreme temperature Gases Liquids Living organisms Projectiles Movement Energy anomalies
Introduction (contd.)
Community roles
General management: responsible for facility security IT management and professionals: responsible for environmental and access security Information security management and professionals: perform risk assessments and implementation reviews
Serve as simple form of biometrics (facial recognition) Should not be only means of control as cards can be easily duplicated, stolen, and modified Tailgating occurs when unauthorized individual follows authorized user through the control
Principles of Information Security, Fourth Edition 8
11
12
13
14
15
17
18
19
20
22
23
24
25
26
27
28
29
Figure 9-5 Types of uninterruptible power supplies9 Source: Courtesy of American Power Conversion Corporation
Principles of Information Security, Fourth Edition 30
31
32
Water Problems
Lack of water poses problem to systems, including functionality of fire suppression systems and ability of water chillers to provide air-conditioning Surplus of water, or water pressure, poses a real threat (flooding, leaks) Very important to integrate water detection systems into alarm systems that regulate overall facilities operations
33
Structural Collapse
Unavoidable forces can cause failures of structures that house organization Structures designed and constructed with specific load limits; overloading these limits results in structural failure and potential injury or loss of life Periodic inspections by qualified civil engineers assist in identifying potentially dangerous structural conditions
34
35
Interception of Data
Three methods of data interception:
Direct observation Interception of data transmission Electromagnetic interception
U.S. government developed TEMPEST program to reduce risk of electromagnetic radiation (EMR) monitoring
36
37
38
39
Social engineering: use of people skills to obtain information from employees that should not be released
Principles of Information Security, Fourth Edition 41
Inventory Management
Computing equipment should be inventoried and inspected on a regular basis Classified information should also be inventoried and managed Physical security of computing equipment, data storage media, and classified documents varies for each organization
42
Summary
Threats to information security that are unique to physical security Key physical security considerations in a facility site Physical security monitoring components Essential elements of access control Fire safety, fire detection, and response Importance of supporting utilities, especially use of uninterruptible power supplies Countermeasures to physical theft of computing devices
Principles of Information Security, Fourth Edition 43