DOC PREVIEW
UTD CS 6V81 - Physical (Environmental) Security

This preview shows page 1-2-3-19-20-38-39-40 out of 40 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011Domain AgendaSite Location ConsiderationsThreats to Physical SecurityThreat Sources and ControlsSlide 6Perimeter and Building Boundary ProtectionsFencesControlled Access PointsPerimeter Intrusion Detection SystemsTypes of LightingAccess and Visitor Logs and More Rigorous forms of LoggingClosed Circuit Television (CCTV)Guards and Guard StationsSlide 15DoorsBuilding Entry Point ProtectionTypes of LocksLock AttacksLock ControlsOther Electronic Physical ControlsWindows and Entry PointsIntrusion Detection Systems (IDS)Escorts and Visitor ControlAccess LogsSlide 26Equipment RoomData Processing FacilityCommunications and PowerWork AreaEquipment ProtectionEnvironmental ControlsFire ProtectionMaterials and Suppression AgentsFlooding Area CoverageTypes of Electrical Power FaultsLoss of Electrical PowerHeating Ventilation Air Condition (HVAC)Other Infrastructure ThreatsKey Performance IndicatorsDr. Bhavani ThuraisinghamThe University of Texas at Dallas (UTD)June 2011Physical (Environmental) SecurityDomain Agenda•Site and Facility Design Criteria•Perimeter Security •Building and Inside Security•Secure Operational AreaSite Location Considerations•Emergency services•Hazards/ threats•AdjacencyThreats to Physical Security•National / environmental•Utility systems•Human-made/ political eventsThreat Sources and ControlsThreat•Thef•Espionage•Dumpster diving•Social engineering•Shoulder surfing•HVAC accessControls•Locks•Background checks•Disposal procedures•Awareness•Screen filters•Motion sensors in ventilation ductsDomain Agenda•Site and Facility Design Criteria•Perimeter Security •Building and Inside Security•Secure Operational AreaPerimeter and BuildingBoundary Protections•First line of defense•Protective barriers–Natural–StructuralFences•Federal, state or local codes may apply•Parking should not be allowed near fencesControlled Access Points•Gates are the minimum necessary layer•BollardsPerimeter Intrusion Detection Systems•Detect unauthorized access into an area–Electronic ‘eyes’•Note that some perimeters IDSs can function inside the perimeter as well.Types of Lighting•Continuous lighting•Trip lighting•Standby lighting•Emergency exit lighting•Emergency egress lightingAccess and Visitor Logs and More Rigorous forms of LoggingABC CompanyEntrance:___________________ Date:________________Name Institution Name of Person VisitingTime In Time OutClosed Circuit Television (CCTV)•CCTV Capability Requirements–Detection–Recognition–Identification•Mixing Capabilities•Virtual CCTV SystemsGuards and Guard Stations•Guards–Deterrent–Possible liability•Guard stationsDomain Agenda•Site and Facility Design Criteria•Perimeter Security •Building and Inside Security•Secure Operational AreaDoors•Isolation of critical areas•Lighting of doorways•Contact devices•GuidelinesBuilding Entry Point Protection•Locks•Lock components–Body–Strike–Strike plates–Key–CylinderTypes of Locks•Something you have – Keyed•Something you know – Combinations•Something you are - BiometricLock Attacks•Lock picking•Lock bumpingLock Controls•Lock and key control system•Key control procedures•Change combinations•Fail–Sof–Secure–SafeOther Electronic Physical Controls•Card access•Biometric access methodsWindows and Entry Points•Standard plate glass•Tempered glass•Acrylic materials•Polycarbonate windows•Entry pointsIntrusion Detection Systems (IDS)•Closed circuit television•Sensors and monitorsEscorts and Visitor Control•Visitor access control best practices–Picture identity–Photographs–Enclosed area–Authorized escortAccess Logs•Computerized log•Closed circuit TVDomain Agenda•Site and Facility Design Criteria•Perimeter Security •Building and Inside Security•Secure Operational AreaEquipment Room•Perimeter enclosure•Controls•PolicyData Processing Facility•Small devices threat•Server room•Mainframes•StorageCommunications and Power•Wireless access points•Network access control•Utility and power roomsWork Area•Operators•System administrators•Restricted work areasEquipment Protection•Inventory•Locks and tracing equipment•Data encryption•Disabling I/O portsEnvironmental ControlsSystem•Electric power•HBAC•Water / plumbing•Gas•RefrigerationThreat•Loss of power•Overheating•Flood / dripping•Explosion•LeakageFire Protection•Prevention – reduce causes•Detection – alert occupants•Suppression – contain or extinguishMaterials and Suppression AgentsType Suppression AgentsCommon combustibles Water, foam, dry chemicalsCombustible liquids Inter gas, CO2, foam, dry chemicalsElectrical Inert gas, CO2, dry chemicalsCombustible metals Dry powdersCooking media (fats) Wet chemicalsFlooding Area Coverage•Water – sprinkler systems•Gas – Halon/CO2/Argon systems•Best practices for systems•Portable extinguishersTypes of Electrical Power Faults•Complete loss of power•Power degradation•Interference (noise)•GroundingLoss of Electrical Power•UPS•Generators•Goals of power•Power controlsHeating Ventilation Air Condition (HVAC)•Location•Positive pressure•MaintenanceOther Infrastructure Threats•Gas leakage•Water threatsKey Performance Indicators•# of physical security incidents detected•# of false positives for


View Full Document

UTD CS 6V81 - Physical (Environmental) Security

Documents in this Course
Botnets

Botnets

33 pages

Privacy

Privacy

27 pages

Privacy

Privacy

27 pages

Load more
Download Physical (Environmental) Security
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Physical (Environmental) Security and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Physical (Environmental) Security 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?