2.7 Physical Security Controls Flashcards
protect vulnerable building areas. Security [this] act as both a physical and visual barrier. They are varied in their shapes, sizes, and designs. [this] and security [this] protect lives and property by creating a controlled traffic setting. • Prevent access – There are limits to the prevention • Channel people through a specific access point – And keep out other things – Allow people, prevent cars and trucks • Identify safety concerns – And prevent injuries • Can be used to an extreme – Concrete barriers / bollards – Moats
Barricades / bollards
a defined space that provides security by using two or more doors, with each door able to operate independently, and that permits an officer to observe those who pass through the space.
• All doors normally unlocked
– Opening one door causes others to lock
• All doors normally locked
– Unlocking one door prevents others from being
unlocked
• One door open / other locked
– When one is open, the other cannot be unlocked
• One at a time, controlled groups
– Managed control through an area
Access control vestibules
a system designed to detect intrusion, such as unauthorized entry, into a building or other areas such as a home or school. • Circuit-based – Circuit is opened or closed – Door, window, fence – Useful on the perimeter • Motion detection – Radio reflection or passive infrared – Useful in areas not often in use • Duress – Triggered by a person - The big red button
Alarms
• Clear and specific instructions – Keep people away from restricted areas – Consider visitors • Consider personal safety – Fire exits – Warning signs – Chemicals – Construction – Medical resources • Informational – In case of emergency, call this number
Signs
the act of observing a scene or scenes and looking for specific behaviors that are improper or that may indicate the emergence or existence of improper behavior.
• CCTV (Closed circuit television)
– Can replace physical guards
• Camera features are important
– Motion recognition can alarm and alert when
something moves
– Object detection can identify a license plate or
person’s face
• Often many different cameras
– Networked together and recorded over time
Video surveillance
concealing what would be an important facility behind what is normally seen in a particular area. If you’re in an industrial area this looks like a building that could be a warehouse, it might be a small workplace, or it could possibly be a data center. Of course, you wouldn’t put signs telling people that the data center is here and looking at this there doesn’t seem to be any type of visual cue that tells us that inside of this building is a data center. • Conceal an important facility in plain sight – Blends in to the local environment • Protect a data center – No business signs – No visual clues – Surround it with a water feature – Install a guard gate – Planters out front are bollards
Industrial camouflage
Guards and access lists: • Security guard – Physical protection at the reception area of a facility – Validates identification of existing employees – Provides guest access • ID badge – Picture, name, other details – Must be worn at all times • Access list – Physical list of names – Enforced by security guard • Maintains a visitor log
Guards and access lists
a person employed to protect a building against intruders or damage. They patrol and inspect property against fire, theft, vandalism, terrorism, and illegal activity. Their job is to monitor people and buildings in an effort to prevent crime. • Two-person integrity/control – Minimize exposure to an attack – No single person has access to a physical asset • Robot sentries – Monitoring – Rounds / Periodic checks – An emerging technology
Guards
the measurement and statistical analysis of people’s unique physical and behavioral characteristics. The technology is mainly used for identification and access control or for identifying individuals who are under surveillance.
• Biometric authentication
– Fingerprint, retina, voiceprint
• Usually stores a mathematical representation
of your biometric
– Your actual fingerprint isn’t usually saved
• Difficult to change
– You can change your password
– You can’t change your fingerprint
• Used in very specific situations
– Not foolproof
Biometrics
digital security systems that ensure authorized access to your building. They ensure only authorized personnel are entering your building while keeping unauthorized personnel out. • Conventional - Lock and key • Deadbolt - Physical bolt • Electronic - Keyless, PIN • Token-based – RFID badge, magnetic swipe card, or key fob • Biometric - Hand, fingers or retina • Multi-factor - Smart card and PIN
Door access controls
a security cable with a lock which is used to attach Portable IT Equipment to a fixture. locks that can secure laptops, desktop computers, weapons, audio equipment, sporting equipment and much more. • Temporary security – Connect your hardware to something solid • Cable works almost anywhere – Useful when mobile • Most devices have a standard connector – Reinforced notch • Not designed for long-term protection – Those cables are pretty thin
Cable locks
also known as USB condoms, restrict hackers from accessing your phone's data. With [these], the physical data lines that run through the cords in public charging kiosks, which hackers use to install malicious code on your phone or steal your data, are taken out of the equation. • Don’t connect to unknown USB interfaces – Even if you need a quick charge – Prevent “juice jacking” • Use a USB data blocker – Allow the voltage, reject the data • Use your power adapter – Avoid the issue entirely
USB data blocker
[this] that intended to deter or detect intrusions or other criminal activity occurring on a property or site. It can also be used to increase a feeling of safety. [this] is integral to crime prevention through environmental design. • More [this] means more security – Attackers avoid [this] – Easier to see when lit – Non IR cameras can see better • Specialized design – Consider overall light levels – [this] angles may be important – Facial recognition – Avoid shadows and glare
Proper lighting
the process of isolating a node of a computer cluster or protecting shared resources when a node appears to be malfunctioning. • Build a perimeter – Usually very obvious – May not be what you’re looking for • Transparent or opaque – See through the fence (or not) • Robust – Difficult to cut the fence • Prevent climbing – Razor wire – Build it high
Fencing
designed specifically for protecting sensitive electronic equipment from a fire. With fast-acting suppression technology, these systems minimize the damage, clean-up, and downtime.
• Electronics require unique responses to fire
– Water is generally a bad thing
• Detection
– Smoke detector, flame detector, heat detector
• Suppress with water
– Where appropriate
• Suppress with chemicals
– Halon - No longer manufactured
– Destroys ozone
– Commonly replaced with Dupont FM-200
Fire suppression