Physical (And Environmental) Security
Physical (And Environmental) Security
Physical (And Environmental) Security
Environmental)
Security
Threats to physical
security
Natural
Physical security
fundamentals
Life
Planning Process
Threats should be classified as internal or
external.
Risk analysis should be taken on a physical
aspect.
Planning Process
The planning and security program should
include the following goals.
Deterrence fences, guards, signs
Reducing/Avoiding damage by Delaying
attackers slow down the attackers (locks,
guards, barriers)
Detection motion sensors, smoke detectors
Incident assessment response of guards,
and determination of damage level
Response procedures fire suppression, law
enforcement notification etc
Planning process
Idea is to avoid having a physical security
violation in the first place!
If
If
Target Hardening ()
Focuses on denying access through
physical and artificial barriers. (alarms,
locks, fences). Target hardening can
lead to restrictions on the use,
enjoyment and aesthetics of an
environment.
Target
Hardening
CPTED
Crime Prevention Through Environmental
Design The idea is that proper design
of a physical environment can reduce
crime by directly affecting human
behaviour.
CPTED provides guidance in loss and crime
CPTED
CPTED
CPTED NZ National
Guidelines
.
http://www.justice.govt.nz/publications/publication
s-archived/2005/national-guidelines-for-crime-preve
ntion-through-environmental-design-in-nz/part-1-sev
en-qualities-of-safer-places/documents/cpted-part-1
.pdf
CPTED NZ National
Guidelines
CPTED NZ National
Guidelines
CPTED guidelines
Examples
Hedges and planters should not be more than
76 cm tall.
Data centre should be at the centre of a facility.
Street furniture should encourage people to sit
and watch what is going around them.
Landscaping should not provide places to hide.
Put CCTV camera in plain view so criminals are
aware they are being watched and recorded.
Be able to determined what type of physical
countermeasure are influenced by CPTED
CPTED (Natural
Surveillance)
Natural Surveillance attempts to
discourage criminals by providing
many ways for others to observe
potential criminal behaviour.
Examples:
Benches
Parks and other public areas
CPTED (Territorial
Reinforcement)
Creating a space that emphasises an
organisations sphere of influence so
employees feel ownership of that
space. The idea is that they will
protect the environment (report
suspicious activities, never directly
intervene). It can also make
criminals feel vulnerable or feel that
they do not belong there.
Security Zones
Zones
Facilities
When building a new facility there are several
considerations
Visibility
Surrounding area and external entities
Crime rate
Proximity to police, medical and fire stations
Accessibility
Roads/access
Traffic
Proximity to airports etc.
Natural
disasters
or rain)
Construction
Different considerations need to be
considered when building a facility
depending on what the facility is
trying to protect and. For example (if
documents are stored, fire-resistant
materials should be used)
Entry Points
Entry
All
Doors
Fire
Man Trap
Windows
There are different type of windows that you
should know about
Standard glass residential home/easily
broken
Tempered glass glass that is heated and
then suddenly cooled. 5-7x stronger than
regular glass
Acrylic glass (plexiglass/lexan) stronger
than regular glass, but gives off toxic fumes
if burnt.
(more)
Windows
Glass
Computer Room
Computer rooms are where important servers
and network equipment is stored.
Equipment should be placed in locked racks.
Computer rooms should be near the centre of
the building, and should be above ground,
but not too high that it would be difficult to
access by emergency crews
Strict access control should be enabled.
They should only have 1 access door, though
they might have to have multiple fire doors
(more)
Computer Room
Computer
pressure
There should be an easy to access
emergency off switch
Portable fire extinguishers
Smoke/fire sensors should be under
raised floors.
Water sensors should be under raised
floors and on ceilings
(more)
Computer Room
Temperature
CR
Protecting Assets
Organisations must protect from theft. Theft of laptops is a
big deal especially if private information is on the laptop
(Confidentiality, Legal).
You should understand best practices in regards to physically
protecting things from being stolen.
Inventory all laptops including serial number
Use disk encryption on laptops
Do not check luggage when flying
Never leave a laptop unattended
Install tracking software on laptops (low jack type software)
Password protect the BIOS (See next slide)
(more)
BIOS
BIOS
Protecting Assets
You should also be aware of the types of
safes that exist
Wall safe
Floor safe
Chest (stand alone)
Depositories (safes with slots)
Vaults (walk in safes)
Internal Support
Systems
Power is critically important for data
processing we will talk about some
different power issues and concerns to
be aware off.
Interference
electromagnetic that can create noise.
(motors can generate fields)
Radio Frequency Interference
fluorescent lights
(see next slide for visualisation)
Shortage
Sag/dip momentary low voltage
Brownout prolonged low voltage
Loss
Fault momentary outage
Black out
Power
UPS
(need visualisation)
Online
Standby
Environmental Issues
Improper environments can cause damage to
equipment or services
Water and Gas
Make sure there are shutoff valves and that they
have positive drains (flow out instead of in,
why?)
Humidity
Humidity must not be too high or too low
Low static
High rust/corrosion
Hygrometer measures humidity
(more)
Environmental Issues
Static
processing areas
Dont use carpeting in data centres
Wear anti-static straps when working
inside computers.
Environmental Issues
Temperature
Ventilation
should be closed loop (re-circulating)
Positive pressure
If a fire is detected HVAC should be immediately turned off.
Fire prevention
Its obvious that you should have fire
prevention, detection and suppression
systems. Which types you use depends on
the environment.
Fire detection systems
Smoke activated (using a photoelectrical
device)
Heat activated
Rate of rise sensors
Fixed temperature sensors
Fire suppression ()
A fire needs fuel, oxygen and high
temperatures to burn. There are
many different ways to stop
combustion
fuel soda acid (remove fuel)
oxygen carbon dioxide (removes
oxygen)
Temperature water (reduces
temperature)
Chemical combustion gas (interferes
Fire Suppression
Different fire suppression types based
on class of fire
A
B
C
D
(well
Fire Suppression
A Common Combustibles
Use for: Wood, paper, laminates
Uses water or foam as suppression
agent
B Liquid
Use for: gas or oil fires
Use: Gas (CO2), foam, dry powders
Fire Suppression
C Electrical
Use on: electrical equipment and
wires
Uses: Gas, CO2, dry powder
D Combustible metals
Use on: combustible metals (sodium,
potassium)
Uses: dry powder
Sprinkler Heads
The thermal linkage is
often a small glass tube
with colored liquid that is
designed to shatter at a
fixed temperature.
The fire will heat the
Thermal Linkage to its
break point, at which
point the water in the
pipe will flow freely
through the opening at a
high pressure. The
pressure of the water
Automatic fire
suppression
Sprinklers
Wet Pipe high pressure water in pipe directly
above sprinkler heads
Automatic fire
suppression
Automatic fire
suppression
ceiling.
Know the term
Cables run in the Plenum area MUST be
Plenum
Perimeter security
Perimeter security is concerned with protecting the outside
of your facility. Ensuring that there is no un-authorised
physical access. Perimeter security can implement
multiple controls to keep the facility secure
Some controls that are used that we will look at are
Locks
Personnel access controls
Fencing
Lighting
Bollards
Surveillance devices
Intrusion detection systems
Guard dogs
Perimeter Security
Locks purpose of locks is to DELAY
intruders, until they can be detected
and apprehended. There are multiple
types of locks that we will talk about
Mechanical
Combination locks
Cipher locks
Locks
Mechanical
(image)
Tumbler
Warded Lock
Tumbler Lock
Pick
Lock Picking
Locks
Combination
key, turn
Cipher Lock*
Cipher Lock
Cipher locks electronic locks
Advantages:
Combination can be changed
Combination can be different for
different people
Can work during different times of day
Can have override codes
Subtype of Override Code is an emergency
code
Device Locks
Device
Switch Lock
locks
physically lock into
the expansion
slots to physically
secure systems.
Device Locks
Port
controls block
access to floppy or
USB ports
Cable
traps lock
down cables from
being unplugged and
removed.
Personnel access
controls
There are different technologies to
grant access to a building.
User activated a user does
something (swipe cards, biometrics)
Proximity devices/transponders a
system recognizes the presence of
an object. (Electronic access control
tokens) is a generic term for
proximity authentication systems)
Fencing
Can deter and delay intruders
Fences 1 metre high only deter casual
trespassers
Fences 1.8-2.1 m high are considered
too high to climb easily
Fences 2.4 m high should are
considered serious.
(more)
Fencing
Fencing best practices
Fences should be a first line of defence.
Critical areas should have fences of 2,4
metres .
Bollards
Bollards
Bollards are small concrete pillars,
sometimes containing lights or flowers.
They are used to stop people from
driving through a wall, often put
between a building and parking lot.
They can be arranged to form a natural
path for walking.
Lighting
Lighting is obviously important in
perimeter security. It decreases the
probability of criminal activity.
Each light should cover its own zone
Surveillance
Surveillance systems are a detective
control. Generally these are CCTV
systems.
CCTV systems consist of
Cameras
Transmitters
Receivers
Recording systems
Surveillance
Most camera are charged coupled
devices that takes light from a lens
and turns it into an electrical signal.
There are two types of lenses in CCTV
camera
Fixed focal length
Variable focus length (zoom lens)
We will define focal length next slide
(more)
Focal Length
Focal Length = The distance from the
surface of a lens or mirror to its focal
point.
short
Depth of Field
Depth of field = Depth of field is the range of
distance within the subject that is
acceptably sharp
large
sharp
short depth of field = something is
specifically "focused" on where everything
else is fuzzy.
(see next slide)
Depth of Field
Surveillance
Focal Length - If you dont have a CCTV
camera that can change, you must pick an
appropriate focal length for your application.
Generally you should have cameras with
auto-irises that can adjust to how bright the
outside conditions are
Zoom lenses allow you to change
PTZ cameras (pan, tilt, zoon)
Intrusion Detection
Systems
IDS (physical IDS, NOT network IDS)
help detect the physical presence of
an intruder.
Can be multiple types.
Electromechanical IDS
Electromechanical
traditional types,
determine a opening
of a window by a
break in connectivity.
Vibration sensors are
also
electromechanical
Pressure pads are
also
electromechanical
Photoelectric IDS
Photoelectri
c uses
light beams
to detect
when
something
crosses the
beam.
IDS
Acoustical
provide a
dynamic response,
guards can make
decisions based on
the situation, which
most other IDS
cannot.
Dogs highly
useful in detecting
intruders and