Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


Physical Security

No description

Nick Flores

on 19 July 2014

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Physical Security

Physical Security
What you will learn
The Security Problem
No matter how impenetrable your firewalls and IDS are, if an attacker can gain physical access to your server, he's breaking in.

Most companies focus resources on securing information from internet based attacks.

All systems connected to the server are viable targets for accessing information.

Access Controls and Monitoring
Access control
control of doors and entry points

Types of Attacks
Open Ethernet ports.

PDA's and smartphones can be used as wireless bridges.

Any media that can be used to boot a computer into an OS that is not the computers original.
Drive imaging.

Denial of Service
Personnel ID Badges
Access Tokens
Multiple-Factor Authentication
Electromagnetic Interference
Two types of EMI
Narrowband - Electromagnetic energy with a small frequency band, sourced from a device designed to transmit in a specific band
Broadband - Covers a wider array of frequencies, sourced from general power use as power lines and electric motors
Chapter 8
EMI Shielding
Twists in unshielded, Category 5 cable resists EMI
Grounded Metal Computer Cases
Faraday Cage
Van Eck Emissions
Computer monitors and LCD screens produce electromagnetic radiation that can be remotely viewed with the right equipment.
Describe how physical security directly affects computer and network security.

Discuss steps that can be taken to help mitigate risks.

Identify the different types of fires and the various fire suppression systems designed to limit the damage caused by fires.

Explain electronic access controls and the principles of convergence
Physical Security Safeguards
Pros and Cons
hard to duplicate
assign to only certain individuals
programmed for certain access
doors prevent mantrap

tracked through software
can be programmed
magnets/circuits can dislodge
doors can malfunction
Types of Layered Access Controls
Finger Scan
Contactless Access Card
Bump Keys
- "all nines"
uses all notches to max depth
bouncing lock pins
nontraditional pin layout
Policies and procedures
Walls and guards
Secure/Hidden Doors
Magnetic/Circuit Lock Keys
Closed Circuit Television (CCTV)
Environmental Controls
Controlling a data center environment
Fire suppression
Electromagnetic interference (EMI)
Equipment control
place equipment evenly
hot aisle / cold aisle layout
intake fans for cold aisle
exhaust for opposite aisle
control airflow
properly secure valuable cables
no clutter
room environment control

Fire Suppression
Water-Based Fire Suppression
basic sprinkler system

Halon-Based Fire Suppression
halon interferes with chemical combustion
(i.e. fuel, oxygen, and high temperatures)
banned in 1994
mixes quickly with the air in room
dangerous to humans
linked to ozone depletion

Clean-Agent Fire Suppression
Carbon dioxide
attacks all 3 elements of a fire

Handheld Fire Extinguishers
Fire Detection Devices
View Table 8.1 page 197 for Types of Fire and Suppression Methods

Full transcript