4 Week
4 Week
4 Week
(4th Week)
Outline
• 4. Management ıssues
—4.1. IT Security Management and Risk
Assessment
—4.2. IT Security Controls, Plans and Procedures
—4.3. Physical and Infrastructure Security
—4.4. Human Resources Security
—4.5. Security Auditing
4.3. Physical and Infrastructure Security
4.3. Outline
• Overview
• Physical Security Threats
• Physical Security Prevention and Mitigation
Measures
• Recovery from Physical Security Breaches
• Example: A Corporate Physical Security
Policy
• Integration of Physical and Logical Security
Physical and Infrastructure
Security
Logical security
•Protects computer-based data from software-based and communication-based threats
Physical security
•Also called infrastructure security
•Protects the information systems that contain data and the people who use, operate,
and maintain the systems
•Must prevent any type of physical access or intrusion that can compromise logical
security
Premises security
•Also known as corporate or facilities security
•Protects the people and property within an entire area, facility, or building(s), and is
usually required by laws, regulations, and fiduciary obligations
•Provides perimeter security, access control, smoke and fire detection, fire suppression,
some environmental protection, and usually surveillance systems, alarms, and guards
Physical Security
Overview
• Protect physical assets that support the storage and
processing of information
Concerns include
information system
Prevent damage to
hardware, physical
physical infrastructure
facility, support facilities,
Involves two and personnel
complementary
requirements: Prevent physical Includes vandalism, theft
infrastructure misuse that of equipment, theft by
leads to the misuse or copying, theft of
damage of protected services, and
information unauthorized entry
Physical Security Threats
Physical situations and occurrences
that threaten information systems:
•Environmental threats
•Technical threats
•Human-caused threats
Characteristics of Natural Disasters
1200 2200
2100
1100
2000
1900
1000
Fire Temperature, ºC
Fire Temperature, ºF
1800
900 1700
1600
800 1500
1400
700 1300
1200
600 1100
1000
500
900
800
400
1 2 3 4 5 6 7 8
Duration, hours
Critical
equipment
should be
Technical
connected to an
emergency
power source
Threats
(like a generator)
To deal with
electromagnetic
interference (EMI) a
combination of filters
and shielding can be
used
Mitigation Measures
Human-Caused Physical
Threats
Physical access control
• Restrict building access
• Controlled areas patrolled or guarded
• Locks or screening measures at entry points
• Equip movable resources with a tracking device
• Power switch controlled by a security device
• Intruder sensors and alarms
• Surveillance systems that provide recording and real-time remote viewing
Recovery from
Physical Security Breaches
Physical equipment
damage recovery
• Depends on nature of damage
Most essential element of and cleanup
recovery is redundancy • May need disaster recovery
• Provides for recovery from loss of specialists
data
• Ideally all important data should
be available off-site and updated as
often as feasible
• Can use batch encrypted remote
backup
• For critical situations a remote hot-
site that is ready to take over
operation instantly can be created
Physical and Logical Security
Integration
• Numerous detection and prevention devices
• More effective if there is a central control
• Integrate automated physical and logical
security functions
• Use a single ID card
• Single-step card enrollment and termination
• Central ID-management system
• Unified event monitoring and correlation
& maintenance
& registration
Card issuance
management
Key
Logical Access Control
Logical
I&A Authorization resource
Authorization
data
I&A = Identification and Authentication
Card reader
/writer LEGEND
Shapes
Direction of information flow
PIV card Processes
Biometric Shading
reader PIV system subsystem
Optional
biometric Certificate Vending, e-purse and
reader authority other applications
Access
Camera control Smartcard
system reader
Card
printer
Optional
Smartcard biometric
programmer reader Human resources
database
Active directory
Ex clusion
PKI CAK+ BI O– A
C
BI O
B
CH UI D + VI S CAK
Room housing
C
Fe nce d- in t r a de se cr e t s
a r e a cont a ining Building housing
a num be r of la b spa ce a nd ot he r
buildings B se nsit ive a r e a s
Fa cilit y se r vice s
HQ Adm in
Buildings
Visit or A
Re gist r a t ion
( b) Ex a m ple Use