Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
You can change this under Settings & Account at any time.
Transcript of Physical Security
What you will learn
The Security Problem
No matter how impenetrable your firewalls and IDS are, if an attacker can gain physical access to your server, he's breaking in.
Most companies focus resources on securing information from internet based attacks.
All systems connected to the server are viable targets for accessing information.
Access Controls and Monitoring
control of doors and entry points
Types of Attacks
Open Ethernet ports.
PDA's and smartphones can be used as wireless bridges.
Any media that can be used to boot a computer into an OS that is not the computers original.
Denial of Service
Personnel ID Badges
Two types of EMI
Narrowband - Electromagnetic energy with a small frequency band, sourced from a device designed to transmit in a specific band
Broadband - Covers a wider array of frequencies, sourced from general power use as power lines and electric motors
Twists in unshielded, Category 5 cable resists EMI
Grounded Metal Computer Cases
Van Eck Emissions
Computer monitors and LCD screens produce electromagnetic radiation that can be remotely viewed with the right equipment.
Describe how physical security directly affects computer and network security.
Discuss steps that can be taken to help mitigate risks.
Identify the different types of fires and the various fire suppression systems designed to limit the damage caused by fires.
Explain electronic access controls and the principles of convergence
Physical Security Safeguards
Pros and Cons
hard to duplicate
assign to only certain individuals
programmed for certain access
doors prevent mantrap
tracked through software
can be programmed
magnets/circuits can dislodge
doors can malfunction
Types of Layered Access Controls
Contactless Access Card
- "all nines"
uses all notches to max depth
bouncing lock pins
nontraditional pin layout
Policies and procedures
Walls and guards
Magnetic/Circuit Lock Keys
Closed Circuit Television (CCTV)
Controlling a data center environment
Electromagnetic interference (EMI)
place equipment evenly
hot aisle / cold aisle layout
intake fans for cold aisle
exhaust for opposite aisle
properly secure valuable cables
room environment control
Water-Based Fire Suppression
basic sprinkler system
Halon-Based Fire Suppression
halon interferes with chemical combustion
(i.e. fuel, oxygen, and high temperatures)
banned in 1994
mixes quickly with the air in room
dangerous to humans
linked to ozone depletion
Clean-Agent Fire Suppression
attacks all 3 elements of a fire
Handheld Fire Extinguishers
Fire Detection Devices
View Table 8.1 page 197 for Types of Fire and Suppression Methods