cycs 200 week 12 - physical, infrastructure, and human resources security

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/35

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

36 Terms

1
New cards

logical security

protects computer-based data from software-based and communication-based threats

2
New cards

physical security

  • also infrastructure security

  • protects the information systems that contain data and the people who use, operate, and maintain the system

  • must prevent any type of physical access or intrusion that can compromise logical security

3
New cards

premises security

  • also known as corporate or facilities security

  • protects the people and property within an entire area, facility, or building(s), and is usually required by laws, regulations, and fiduciary obligations

  • provides perimeter security, access control, smoke and fire detection, fire suppression, some environment protection, and usually surveillance systems, alarms, and guards

4
New cards

physical security (in depth)

involves two complementary requirements:

  • prevent damage to physical infrastructure

    • concerns include information system hardware, physical facility, support facilities, and personnel

  • prevent physical infrastructure misuse that leads to the misuse or damage of protected information

    • vandalism, theft of equipment, theft by copying, theft of services, and unauthorized entry

5
New cards

physical security threats

  • environmental threats

  • technical threats

  • human-caused threats

6
New cards

characteristics of natural disasters

  • tornado

    • advance warning of potential; not site specific

    • remain at site

    • brief but intense

  • hurricane

    • significant advance warning

    • may require evacuation

    • hours to a few ddays

  • earthquake

    • no warning

    • may be unable to evacuate

    • brief duration; threat of continued aftershocks

  • ice storm/blizzard

    • several days warning generally expected

    • may be unable to evacuate

    • may last several days

  • lightning

    • sensors may provide minutes of warning

    • may require evacuation

    • brief but may recur

  • flood

    • several days warning generally expected

    • may be unable to evactuate

    • sit may be isolated for extended period

7
New cards

temp thresholds for damage to computing resources

disks, tapes, optical media, hard disk media, computer equipment, insulation, paper products can be damaged due to heat. starting at 38 degrees celcius to 177 degrees

8
New cards

water damage

  • primary danger is an electrical short

  • a pipe may burst from a fault in the line or from freezing

  • sprinkler systems set off accidentally

  • floodwater leaving a muddy residue and suspended material in the water

  • due diligence should be performed to ensure that water from as far as two floors above will not create a hazard

9
New cards

chemical, radiological, and biological hazards

  • pose a threat from intentional attack and from accidental discharge

  • discharges can be introduced through the ventilation system or open windows, and in the case of radiation, through perimeter walls

  • flooding can also introduce biological or chemical contaminants

10
New cards

technical threats

  • electrical power is essential to run equipment

    • power utility problems:

      • under-voltage

        • dips/brownouts/outages, interrupts service

      • over-voltage

        • surges/faults/lightening, can destroy chips

      • noise

        • on power lines, may interfere with device operation

electromagnetic interference (EMI)

  • noise along a power supply line, motors, fans, heavy equipment, other computers, cell phones, microwave relay antennas, nearby radio stations

  • noise can be transmitted through space as well as through power lines

  • can cause intermittent problems with computers

11
New cards

human-caused threats

  • less predictable, designed to overcome prevention measures, harder to deal with

  • unauthorized physical access

    • information assets are located in restricted areas

    • can lead to other threats such as theft, vandalism, or misuse

  • theft of equipment/data

    • eavesdropping and wiretapping

    • insider or outsider who has gained unauthorized access

  • vandalism of equipment

  • misuse of resources

12
New cards

physical security prevention and mitigation measures

  • use of cloud computing

  • inappropriate temp and humidity

    • environmental control equipment, power supply

  • fire and smoke

    • alarms, preventative measures, fire mitigatioin

    • smoke detectors, no smoking

  • water

    • manage lines, equipment location, cutoff sensors

  • other threats

    • appropriate technical counter-measures, limit dust entry, pest control

13
New cards

mitigation measures human-caused physical threats

physical access control

  • restrict building access

  • controlled areas patrolled or guarded

  • locks or screening measures at entry points

  • equip movable resources with a tracking device

  • power switch controlled by a security device

  • surveillance systems that provide recording and real-time remote viewing

14
New cards

recovery from physical security breaches

most essential element of recovery is redundancy

  • provides for recovery from loss of data

  • ideally all important data should be available off-site and updated as often as feasible

  • can use bath encrypted remote backup

  • for critical situations a remote hot-site that os ready to take over operation instantly can be created

physical equipment damage recovery

  • depends on nature of damage and cleanup

  • may need disaster recovery specialists

15
New cards

physical and logical security integration

  • numerous detection and prevention devices

  • more effective if there is a central control

  • integrate automated physical and logical security functions

    • use a single ID card

    • single-step card enrolment and termination

    • central ID-management system

    • unified event monitoring and correlation

16
New cards

benefits to organizations (security awareness, training, and education programs)

  • improving employee behaviour

  • increasing employee accountability

  • mitigating liability for employee behaviour

  • complying with regulations and contractual obligations

17
New cards

human factors

employee behaviour is a critical concern in ensuring the security of computer systems and information assets

principal problems associated with employee behaviour are:

  • erros and omissions

  • fraud

  • actions by disgruntled employees

18
New cards

awareness

  • seeks to inform and focus an employee’s attention on security issues within the organization

    • aware of their responsibilities for maintaining security and the restrictions on their actions

    • users understand the importance of security for the well-being of the organization

    • promote enthusiasm and management buy-in

  • program must be tailored to the needs of the organization and target audience

  • must continually promote the security message to employees in a variety of ways

  • should provide a security awareness policy document to all employees

19
New cards

training

  • designed to teach people the skills to perform their IT-related tasks more securely

    • what people do and how they should do it

  • general users

    • focus is good computer security practices

  • programmers, developers, system maintainers

    • develop a security mindset in the developer

  • management-level

    • how to make tradeoffs involving security risks, costs, benefits

  • executive-level

    • risk management goals, measurement, leadership

20
New cards

education

  • most in depth program

  • targeted at security professionals whose jobs require expertise in security

  • fits into employee career development category

  • often provided by outside sources

    • college courses

    • specialized training programs

21
New cards

employment practices and policies

  • managing personnel with potential access is an essential part of information security

  • employee involvement:

    • unwittingly aid in the commission of a violation by failing to follow proper procedures

    • forgetting security considerations

    • not realizing that they are creating a vulnerability

    • knowingly violate controls or procedures

22
New cards

security in the hiring process

  • to ensure that employees, contractors and third party users understand their responsibilities, and are suitable for the roles they are considered for, and to reduce the risk of theft, fraud or misuse of facilities.

  • need appropriate background checks and screening

    • investigate accuracy of details

  • for highly sensitive positions:

    • have an investigation agency do a background check

    • criminal record and credit check

23
New cards

termination of employment

  • termination security objectives:

    • ensure employees, contractors, and third party users exit organization or change employment in an orderly manner

    • the return of all equipment and the removal of all access rights are completed

  • critical actions:

    • remove name from all authorized access lists

    • inform guards that ex-employee general access is not allowed

    • remove personal access codes, change physical locks and lock combinations, reprogram access card systems

    • recover all assets, including employee ID, portable USB storage devices, documents, and equipment

    • notify by memo or email appropriate departments

24
New cards

email and internet use policies

  • organizations are incorporating specific email and internet use policies into their security policy document

concerns for employers:

  • work time consumed in non-word-related activities

  • computer and communications resources may be consumed, compromising the mission that the IT resources are designed to support

  • risk of importing malware

  • possibility of harm, harassment, inappropriate online conduct

25
New cards

security incident response

response procedures to incidents are an essential control for most orgs.

  • procedures need to reflect possible consequences of an incident on the organization and allow for a suitable response

  • developing procedures in advance can help avoid panic

benefits of having incident response capability

  • systematic incident response

  • quicker recovery to minimize loss, theft, disruption of service

  • use information gained during incident handling to better prepare for future incidents

  • dealing properly with legal issues that may arise during incidents

26
New cards

triage function

goal!

  • ensure that all information destined for for the incident handling service is channeled through a single focal point

  • commonly achieved by advertising the triage function as the single point of contact for the whole incident handling service

responds to incoming information by:

  • requesting additional information in order to categorize the incident

  • notifying the various parts of the enterprise or constituency about the vulnerability and shares information about how to fix or mitigate the vulnerability

  • identifies the incident as either new or part of an ongoing incident and passes this information on to the incident handing response function

27
New cards

responding to incidents

knowt flashcard image
28
New cards

documenting incidents

  • should immediately follow a response to an incident

    • identify what vulnerability led to its occurence

    • how this might be addressed to prevent the incident in the future

    • details of the incident and the response taken

    • impact on the organization’s systems and their risk profile

29
New cards
30
New cards
31
New cards
32
New cards
33
New cards
34
New cards
35
New cards
36
New cards