review for Physical Security for Systems (Week 4)
This measures are designed to prevent unauthorized access, theft, damage, and tampering of computer systems and the sensitive data they contain
Physical security
Data centers house servers, storage devices, and networking equipment that store and process sensitive data.
Protecting Data Centers
Physical security measures are essential for safeguarding office spaces and workstations where employees access and use digital assets. Access control systems, locks, and security badges restrict entry to authorized personnel only, reducing the risk of unauthorized access to computers and data
Securing Workplaces
Physical security helps prevent theft of physical devices that contain sensitive information, such as laptops, smartphones, and removable storage media
Preventing Physical Theft
Physical security measures, including backup power systems, environmental controls, and fire suppression systems, help ensure the continuous operation of data centers and IT infrastructure
Ensuring Business Continuity
Physical security extends to the _____________, such as fiber optic or copper cables
Protecting Communication Lines
Access controls, including key cards, biometrics, and smart locks, ensure that only authorized individuals can enter secure areas or gain physical access to devices
Managing Physical Access
____________ provide real-time visibility into physical spaces, allowing security personnel to detect and respond to security incidents promptly
Surveillance and Monitoring
Proper ____________, such as temperature and humidity regulation, protect servers and storage devices from environmental factors that could lead to hardware failure and data loss
Environmental Controls
____________ systems can detect unauthorized physical access or tampering attempts, triggering alarms or alerts for rapid response.
Physical Intrusion Detection
Managing the entry and movement of visitors within an organization's premises is essential for maintaining security. Visitor logs, badges, and escort policies are part of physical security practices.
Visitor and Crowd Management
Physical security measures can include strategies for disaster recovery, such as off-site backups and secure storage of critical data, to ensure data can be recovered in case of physical disasters like fires or floods
Disaster Recovery
A strategy aimed at discouraging potential threats or malicious actors from attempting unauthorized actions, intrusions, or security breaches
SECURITY LAYERS
Deterence
Focused on slowing down or impeding unauthorized individuals or threats from accessing secured areas, assets, or information.
SECURITY LAYERS
Delay
such as turnstiles, gates, or security checkpoints, create a physical barrier that forces individuals to slow down and undergo identity verification or screening before entering secured areas
DELAY
Controlled access points
These are locks, reinforced doors, and security barriers (like bollards) that are meant to delay unauthorized access attempts. These measures make it more challenging for intruders to breach physical barriers quickly
DELAY
Locks and Barriers
__________ around a facility or property can serve as a delay measure, making it more difficult for intruders to breach perimeter defenses
DELAY
Security Fencing
Secure areas within a building designed to provide temporary protection during emergencies. They are usually equipped with reinforced walls and communication systems to delay threats.
DELAY
Safe rooms
Structures like bollards, gates, and barricades that are designed to prevent vehicles from ramming into secured areas, adding an additional layer of delay and protection.
DELAY
Vehicle Barriers
These areas are designed to delay unauthorized access to valuable assets, documents, or data. They often have multiple layers of security, including reinforced walls and access controls.
DELAY
Vaults and Secure Storage
Well-defined control measures that require authentication, authorization, and verification before granting access thus introduce delay in the entry process.
DELAY
Access Control Procedures
concentrates on locating and warning security systems or employees of potential threats.
SECURITY LAYERS
Detection
_________, including CCTV (Closed-Circuit Television) systems, are widely used for monitoring and recording activities in and around secured areas
DETECTION
Surveillance Cameras
They use sensors, alarms, or sensors placed at entry points, doors, windows, and other vulnerable areas to trigger alerts when unauthorized access is detected
DETECTION
Intrusion Detection Systems
Access control systems generate logs that record entry and exit activities.
DETECTION
Access Control Logs
__________, such as fingerprint scanners or facial recognition technology, can detect and verify the identity of individuals attempting to access secured areas
DETECTION
Biometric systems
Can detect movement within specific areas, triggering alarms or alerts when unauthorized movement is detected
DETECTION
Motion Sensors
These sensors monitor ______ conditions, such as temperature, humidity, and gas levels.
DETECTION
Environmental Sensors
This measures, such as fences, gates, and barriers, can include sensors that detect breaches or attempts to scale or tamper with physical barriers.
DETECTION
Perimeter Security
Audio sensors can pick up unusual sounds or patterns, such as glass breaking or loud noises, and trigger alerts
DETECTION
Sound Detection
________systems can track the movement of tagged assets or individuals within a secured area, helping identify unauthorized access or movement.
DETECTION
Radio Frequency Identification
Human observation and patrols by security personnel can play a crucial role in detection
DETECTION
Security Personnel
_________ or panic buttons can be used by individuals to discreetly signal for assistance when facing a threat
DETECTION
Duress alarms
Proactive and continuing procedure used as part of physical security enforcement with the goal of identifying and analyzing potential security risks and weaknesses
SECURITY LAYERS
Assessment
The steps are done to address a security breach, incident, or threat in order to ameliorate the situation and safeguard resources, people, and information
SECURITY LAYERS
Response
This can lead to the ruin of critical hardware components, such as servers, networking equipment, and storage devices
PHYSICAL SECURITY THREATS
Physical damage
Happens when there is physical damage to computers, special gadgets or telecommunications cables or power lines.
PHYSICAL SECURITY THREATS
This is a common phenomenon in physical security breaches, such as unauthorized access to data centers or server rooms, can lead to data theft.
PHYSICAL SECURITY THREATS
Physical Theft
It is due to physical security lapses may be the result of unauthorized individuals gaining access to computer systems or data centers. Once inside, they may tamper with hardware components, insert malicious hardware devices thus compromising the integrity of the system
PHYSICAL SECURITY THREATS
Loss of system integrity
These threats are typically beyond an organization's control and include various environmental events and phenomena like natural disasters (flooding, earthquakes, tsunamis, hurricanes, cyclones, wildfires, etc.), extreme weather threats, pandemics, etc.
CATEGORIES
Natural environmental threats
The risks that can derail computer operations like in power outages, communication interruptions and ventilation disruptions
CATEGORIES
Supply system threats
The threats are perpetuated by people with varying reasons for doing so such as thieves, disgruntled employees, fraudsters, thrill seekers, revengers, terrorists, sabotages, crackers, etc
CATEGORIES
Manmade threats
Risks posed by people whose motives are mainly due to strife, politics, strikes, riots, civil disobedience, vendetta, hate, racism, exclusivism, ideology, state religion, persecution, wars, rebellion, etc.
CATEGORIES
Politically motivated threats