Professional Documents
Culture Documents
Security
Chapter Three
Physical Security
The Physical (Environmental) Security domain
addresses the threats, vulnerabilities, and
countermeasures
that
can
be
utilized
to
These resources
and
the
data,
equipment,
support
Physical Security
The candidate will be expected to know the
elements involved in choosing a secure site,
its design and configuration, and the methods
for securing the facility against unauthorized
access, theft of equipment and information,
and the environmental and safety measures
needed to protect people, the facility, and its
resources.
3
Introduction
Threats to physical security include:
1.
2.
3.
4.
5.
Interruption of services
Theft
Physical damage
Unauthorized disclosure
Loss of system integrity
Introduction
Threats fall into many categories:
1. Natural environmental threats (e.g.,
floods, fire)
2. Supply system threats (e.g., power
outages, communication interruptions)
3. Manmade threats (e.g., explosions,
disgruntled employees, fraud)
4. Politically motivated threats (e.g.,
strikes, riots, civil disobedience)
5
Introduction
Primary consideration in physical
security is that nothing should impede
life safety goals.
Ex.:
10
11
12
13
14
facility site:
15
http://whatis.techtarget.com/definition/mantrap--int
erlocking-door-controller-.html
16
17
Standard
Tempered
Acrylic
Wired
Laminated
Solar Window Film
Security Film
http://www.youtube.com/watch?v=vYdVK3B
qPfk
18
19
20
21
22
23
24
http://www.esdflooring.com/
25
26
27
28
29
Types of Fire:
A: Common Combustibles
B: Liquid
C: Electrical
D: Combustible Metals
K: Commercial Kitchens
32
Water
Halon and halon substitutes
Foams
Dry Powders
CO2
Soda Acid
34
Perimeter Security
Protection services can be provided
by:
Access Control Mechanisms
Physical Barriers
Intrusion Detection
Assessment
Response
Deterrents
35
Perimeter Security
Fences are first line of defence
mechanisms. (Small Joke!)
Varying heights, gauge, and mesh
provides security features (know
them).
Barbed wire direction makes a
difference.
36
Perimeter Security
37
Perimeter Security
38
Perimeter Security
Locks are inexpensive access control
mechanisms that are widely
accepted and used.
Locks are considered delaying
devices.
39
Perimeter Security
Types of Locks
Mechanical Locks
Warded & Tumbler
Combination Locks
Cipher Locks (aka programmable locks)
Smart locks
Device Locks
Cable locks, switch controls, slot locks,
port controls, peripheral switch controls,
cable traps
40
Perimeter Security
Lock Strengths:
Grade 1 (commercial and industrial use)
Grade 2 (heavy duty residential/light duty
commercial)
Grade 3 (residential and consumer expendable)
Cylinder Categories
Low Security (no pick or drill resistance)
Medium Security (some pick resistance)
High Security (pick resistance through many
different mechanismsused only in Grade 1 & 2
locks)
41
Perimeter Security
Lighting
Know lighting terms and types of lighting to
use in different situations (inside v. outside,
security posts, access doors, zones of
illumination)
It is important to have the correct lighting
when using various types of surveillance
equipment.
Lighting controls and switches should be in
protected, locked, and centralized areas.
42
Perimeter Security
Continuous lighting: An array of lights that provide
an even amount of illumination across an area.
Controlled lighting: An organization should erect
lights and use illumination in such a way that does not
blind its neighbors or any passing cars, trains, or
planes.
Standby Lighting: Lighting that can be configured to
turn on and off at different times so that potential
intruders think that different areas of the facility are
populated.
Redundant or backup lighting: Should be available
in case of power failures or emergencies.
Response Area Illumination: Takes place when an IDS
detects suspicious activities and turns on the lights
within the specified area.
43
Perimeter Security
Surveillance Devices
These devices usually work in conjunction
with guards or other monitoring
mechanisms to extend their capacity.
Know the factors in choosing CCTV, focal
length, lens types (fixed v. zoom), iris,
depth of field, illumination requirements
44
Perimeter Security
Focal length: The focal length of a
lens defines its effectiveness in viewing
objects from a horizontal and vertical
view.
The sizes of images that will be shown
on a monitor along with the area that
can be covered by one camera are
defined by focal length.
Short focal length = wider angle views
Long focal length = narrower views
45
Perimeter Security
Depth of field: Refers to the portion of
the environment that is in focus
Shallow depth of focus: Provides a
softer backdrop and leads viewers to
the foreground object
Greater depth of focus: Not much
distinction between objects in the
foreground and background.
46
Perimeter Security
Intrusion Detection systems are used
to detect unauthorized entries and to
alert a responsible entity to respond.
Know the different types of IDS
systems (electro-mechanical v.
volumetric) and changes that can be
detected by an IDS system.
47
Perimeter Security
Patrol Force and Guards
Use in areas where critical reasoning skills
are required
48
Physical Security
Final Concept to Guide in Assessing
Physical Security Issues on Exam:
Deterrence
Delay
Detection
Assessment
Response
49