lecture 2 physical security asst.prof. supakorn kungpisdan, ph.d. [email protected]
TRANSCRIPT
![Page 2: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/2.jpg)
Reference
M. E. Whitman and H. J. Mattord, Principles of Information Security, 3rd Edition, Thomson Course Technology, ISBN 1-4239-0177-0
2
NETE4630 Advanced Network Security and Implementation
![Page 3: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/3.jpg)
Learning Objectives
Discuss the relationship between threats to information security and physical security
Describe the key physical security considerations including fire control and surveillance systems
Identify critical physical environment considerations for computing facilities, including uninterruptible power supplies
3
NETE4630 Advanced Network Security and Implementation
![Page 4: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/4.jpg)
Introduction
Physical security addresses design, implementation, and maintenance of countermeasures that protect physical resources of an organization
Most controls can be circumvented if an attacker gains physical access
Physical security is as important as logical security
4
NETE4630 Advanced Network Security and Implementation
![Page 5: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/5.jpg)
Major Sources of Physical Loss
Sources Descriptions
Extreme temperature Heat, cold
Gases War gases, commercial vapors, humid or dry air, suspended particles
Liquids Water, chemicals
Living organisms Viruses, bacteria, people, animals, insects
Projectiles Tangible object in motion, powered objects
Movement Collapse, shearing, shaking, vibration, liquefaction, flow waves, separation, slide
Energy anomalies Electrical surge or failure, magnetism, static electricity, aging circuitry, radiation
5
NETE4630 Advanced Network Security and Implementation
![Page 6: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/6.jpg)
Community Roles in Physical Security
General management
responsible for facility security, draft security policy
IT management and professionals
responsible for environmental and access security
Information security management and professionals:
perform risk assessments and implementation reviews for security controls implemented by general management and IT management
6
NETE4630 Advanced Network Security and Implementation
![Page 7: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/7.jpg)
Physical Access Controls
Access controls for a building are operated by a group called Facility management
Secure facility: physical location engineered with controls designed to minimize risk of attacks from physical threats
Secure facility can take advantage of natural terrain, traffic flow, and degree of urban development; can complement these with protection mechanisms (fences, gates, walls, guards, alarms)
7
NETE4630 Advanced Network Security and Implementation
![Page 8: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/8.jpg)
Physical Access ControlsPhysical Security Controls
Walls, fencing, and gates
Guards
Dogs
ID cards and badges
Locks and keys
Mantraps
Electronic monitoring
Alarms and alarm systems
Computer rooms and wiring closets
Interior walls and doors
8
NETE4630 Advanced Network Security and Implementation
![Page 9: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/9.jpg)
Perimeter Security
What to examine: Natural boundaries at
the location Fences or walls around
the site The design of the outer
walls of a building Divisions and choke
points within a building
A series of mechanisms includes:
Fences Perimeter Intrusion
Detection and Assessment Systems (PIDAS)
Security lighting Closed-circuit television
(CCTV) Security guards and
guard dogs Warning signs and
notices
9
NETE4630 Advanced Network Security and Implementation
![Page 10: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/10.jpg)
PIDAS
Perimeter Intrusion Detection and Assessment Systems
PIDAS has sensors that detect intruders and feel vibrations along the fence
The system may produce false positives due to stray deer, high winds, or other natural events
10
NETE4630 Advanced Network Security and Implementation
![Page 11: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/11.jpg)
Physical Security ControlsWalls, Fencing, and Gates
Some of the oldest and most reliable methods of physical security
11
NETE4630 Advanced Network Security and Implementation
![Page 12: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/12.jpg)
12
Fencing
A fence with proper design and height can delay an intruder and work as a psychological barrier
A risk analysis should be performed to evaluate types of physical assets to be protected 4-foot fence will deter a casual trespasser 8-foot fence will keep a determined intruder out
Need to consider gauge and mesh size of the wire The smaller the mesh, the more difficult it is to climb The heavier the gauge, the more difficult it is to cut
NETE4630 Advanced Network Security and Implementation
![Page 13: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/13.jpg)
13
Gauge and Mesh
16G with 50mm vs 25 mm mesh
NETE4630 Advanced Network Security and Implementation
![Page 14: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/14.jpg)
Fencing (cont.)
14
NETE4630 Advanced Network Security and Implementation
![Page 15: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/15.jpg)
Gates
UL Standard 325 details requirements for gates with 4 classifications: Residential Class 1 Commercial Class 2 Industrial Class 3 Restricted Access Class
4
Bollards are made of concrete or steel and used to block vehicle traffic or to protect areas where pedestrians are entering or leaving buildings
15
NETE4630 Advanced Network Security and Implementation
![Page 16: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/16.jpg)
Guards
Guards have the ability to apply human reasoning
Most guards have clear Standard Operating Procedure (SOPs)
Need to have job references and be subjected to a background check
16
NETE4630 Advanced Network Security and Implementation
![Page 17: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/17.jpg)
Dogs
Guard dogs are keen to smell and hearing. They can detect intrusions that human guards cannot.
They can be placed in harm’s way when necessary to avoid risking the human life
17
NETE4630 Advanced Network Security and Implementation
![Page 18: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/18.jpg)
ID Cards and Badges
Ties physical security with information access control
ID card is typically concealed whereas name badge is visible
Serve as simple form of biometrics (facial recognition)
Should not be only means of control as cards can be easily duplicated, stolen, and modified
Tailgating occurs when unauthorized individual follows authorized user through the control
18
NETE4630 Advanced Network Security and Implementation
![Page 19: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/19.jpg)
Locks and Keys
Two types of locks: mechanical and electromechanical
Locks can also be divided into four categories: manual, programmable, electronic, biometric
Locks fail and alternative procedures for controlling access must be put in place
Locks fail in one of two ways:
Fail-safe lock: the lock fails and the door unlocks
Fail-secure lock: the lock fails and the door locks
19
Where to apply fail-safe or fail-secure locks?
NETE4630 Advanced Network Security and Implementation
![Page 20: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/20.jpg)
Locks and Keys (cont.)
20
NETE4630 Advanced Network Security and Implementation
![Page 21: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/21.jpg)
Mantrap
Small enclosure that has entry point and different exit point
Individual enters mantrap, requests access, and if verified, is allowed to exit mantrap into facility
Individual denied entry is not allowed to exit until security official overrides automatic locks of the enclosure
21
NETE4630 Advanced Network Security and Implementation
![Page 22: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/22.jpg)
Mantraps (cont.)
22
NETE4630 Advanced Network Security and Implementation
![Page 23: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/23.jpg)
Electronic Monitoring
Records events where other types of physical controls are impractical or incomplete
May use cameras with video recorders; includes closed-circuit television (CCT) systems
Drawbacks
Reactive; does not prevent access or prohibited activity
Recordings often are not monitored in real time; must be reviewed to have any value
23
NETE4630 Advanced Network Security and Implementation
![Page 24: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/24.jpg)
Alarms and Alarm Systems
Alarm systems notify when an event occurs
Detect fire, intrusion, environmental disturbance, or an interruption in services
Rely on sensors that detect event; e.g., motion detectors, smoke detectors, thermal detectors, glass breakage detectors, weight sensors, contact sensors, vibration sensors
24
NETE4630 Advanced Network Security and Implementation
![Page 25: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/25.jpg)
Alarm Sensor
Glass break sensor
Photoelectric sensor
Motion detection sensor(photoelectric infrared)
25
NETE4630 Advanced Network Security and Implementation
![Page 26: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/26.jpg)
Computer Rooms and Wiring Closets
Require special attention to ensure confidentiality, integrity, and availability of information
Logical controls easily defeated if attacker gains physical access to computing equipment
26
NETE4630 Advanced Network Security and Implementation
![Page 27: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/27.jpg)
Interior Walls and Doors
Information asset security sometimes compromised by construction of facility walls and doors
Facility walls typically either standard interior or firewall
High-security areas must have firewall-grade walls to provide physical security from potential intruders and improve resistance to fires
Doors allowing access to high security rooms should be evaluated
Recommended that push or crash bars be installed on computer rooms and closets
27
NETE4630 Advanced Network Security and Implementation
![Page 28: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/28.jpg)
Fire Security and Safety
Most serious threat to safety of people who work in an organization is possibility of fire
Fires account for more property damage, personal injury, and death than any other threat
Imperative that physical security plans examine and implement strong measures to detect and respond to fires
28
NETE4630 Advanced Network Security and Implementation
![Page 29: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/29.jpg)
Fire Detection and Response
Fire suppression systems: devices installed and maintained to detect and respond to a fire
Deny an environment of heat, fuel, or oxygen
Water and water mist systems
Carbon dioxide systems
Soda acid systems
Gas-based systems
29
NETE4630 Advanced Network Security and Implementation
![Page 30: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/30.jpg)
Fire Detection
Fire detection systems fall into two general categories: manual and automatic
Part of a complete fire safety program includes individuals that monitor chaos of fire evacuation to prevent an attacker accessing offices
There are three basic types of fire detection systems: thermal detection, smoke detection, flame detection
30
NETE4630 Advanced Network Security and Implementation
![Page 31: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/31.jpg)
Fire Suppression
Systems consist of portable, manual, or automatic apparatus
Portable extinguishers are rated by the type of fire: Class A, Class B, Class C, Class D
Installed systems apply suppressive agents; usually either sprinkler or gaseous systems
31
NETE4630 Advanced Network Security and Implementation
![Page 32: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/32.jpg)
Gaseous Emission Systems
Until recently, two types of systems: carbon dioxide and Halon
Carbon dioxide robs a fire of oxygen supply
Halon is clean but has been classified as an ozone-depleting substance; new installations are prohibited
Alternative clean agents include FM-200, Inergen, carbon dioxide, FE-13 (trifluromethane)
32
NETE4630 Advanced Network Security and Implementation
![Page 33: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/33.jpg)
Failure of Supporting Utilities and Structural Collapse
Supporting utilities (heating, ventilation, and air conditioning; power; water; and others) have significant impact on continued safe operation of a facility
Each utility must be properly managed to prevent potential damage to information and information systems
33
NETE4630 Advanced Network Security and Implementation
![Page 34: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/34.jpg)
Heating, Ventilation, and Air Conditioning
Areas within heating, ventilation, and air conditioning (HVAC) systems that can cause damage to information systems include:
Temperature
Humidity
Static electricity
34
NETE4630 Advanced Network Security and Implementation
![Page 35: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/35.jpg)
Ventilation Shafts
While ductwork is small in residential buildings, in large commercial buildings it can be large enough for an individual to climb though
If vents are large, security can install wire mesh grids at various points to compartmentalize the runs
35
NETE4630 Advanced Network Security and Implementation
![Page 36: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/36.jpg)
Uninterruptible Power Supply (UPS)
In case of power outage, UPS is backup power source for major computer systems
36
NETE4630 Advanced Network Security and Implementation
![Page 37: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/37.jpg)
Emergency Shutoff
Important aspect of power management is the need to be able to stop power immediately should a current represent a risk to human or machine safety
Most computer rooms and wiring closets are equipped with an emergency power shutoff
37
NETE4630 Advanced Network Security and Implementation
![Page 38: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/38.jpg)
Water Problems
Lack of water poses problem to systems, including functionality of fire suppression systems and ability of water chillers to provide air-conditioning
Surplus of water, or water pressure, poses a real threat (flooding, leaks)
Very important to integrate water detection systems into alarm systems that regulate overall facilities operations
38
NETE4630 Advanced Network Security and Implementation
![Page 39: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/39.jpg)
Structural Collapse
Unavoidable forces can cause failures of structures that house organization
Structures designed and constructed with specific load limits; overloading these limits results in structural failure and potential injury or loss of life
Periodic inspections by qualified civil engineers assist in identifying potentially dangerous structural conditions
39
NETE4630 Advanced Network Security and Implementation
![Page 40: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/40.jpg)
Maintenance of Facility Systems
Physical security must be constantly documented, evaluated, and tested
Documentation of facility’s configuration, operation, and function should be integrated into disaster recovery plans and operating procedures
Testing helps improve the facility’s physical security and identify weak points
40
NETE4630 Advanced Network Security and Implementation
![Page 41: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/41.jpg)
Interception of Data
Three methods of data interception:
Direct observation
Interception of data transmission
Electromagnetic interception
U.S. government developed TEMPEST program to reduce risk of electromagnetic radiation (EMR) monitoring
41
NETE4630 Advanced Network Security and Implementation
![Page 42: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/42.jpg)
Mobile and Portable Systems
With the increased threat to information security for laptops, handhelds, and PDAs, mobile computing requires more security than average in-house system
Many mobile computing systems have corporate information stored within them; some are configured to facilitate user’s access into organization’s secure computing facilities
42
NETE4630 Advanced Network Security and Implementation
![Page 43: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/43.jpg)
Mobile and Portable Systems (cont.)
Controls support security and retrieval of lost or stolen laptops
CompuTrace software, stored on laptop; reports to a central monitoring center
Burglar alarms made up of a PC card that contains a motion detector
43
NETE4630 Advanced Network Security and Implementation
![Page 44: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/44.jpg)
Special Considerations for Physical Security Threats
Develop physical security in-house or outsource?
Many qualified and professional agencies
Benefit of outsourcing includes gaining experience and knowledge of agencies
Downside includes high expense, loss of control over individual components, and level of trust that must be placed in another company
Social engineering: use of people skills to obtain information from employees that should not be released
44
NETE4630 Advanced Network Security and Implementation
![Page 45: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/45.jpg)
Inventory Management
Computing equipment should be inventoried and inspected on a regular basis
Classified information should also be inventoried and managed
Physical security of computing equipment, data storage media, and classified documents varies for each organization
45
NETE4630 Advanced Network Security and Implementation
![Page 46: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/46.jpg)
Physical Security in ISO27001A.9 Physical and Environmental Security
A9.1 Secure areas A9.1.1 Physical security perimeter A9.1.2 Physical entry control A9.1.3 Securing offices, rooms, and facilities A9.1.4 Protecting against external and environmental
threats A9.1.5 Working in secure areas A9.1.6 Public access, delivery and loading areas
46
NETE4630 Advanced Network Security and Implementation
![Page 47: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/47.jpg)
Physical Security in ISO27001A.9 Physical and Environmental Security (cont.)
A9.2 Equipment security A9.2.1 Equipment siting and protection A9.2.2 Supporting utilities A9.2.3 Cabling security A9.2.4 Equipment maintenance A9.2.5 Security of equipment off-promises A9.2.6 Secure disposal of re-use of equipment A9.2.7 Removal of property
47
NETE4630 Advanced Network Security and Implementation
![Page 48: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/48.jpg)
Summary
Threats to information security that are unique to physical security
Key physical security considerations in a facility site Physical security monitoring components Essential elements of access control Fire safety, fire detection, and response Importance of supporting utilities, especially use of
uninterruptible power supplies Countermeasures to physical theft of computing
devices
48
NETE4630 Advanced Network Security and Implementation
![Page 49: Lecture 2 Physical Security Asst.Prof. Supakorn Kungpisdan, Ph.D. supakorn@mut.ac.th](https://reader035.vdocuments.net/reader035/viewer/2022062407/56649e625503460f94b5eea2/html5/thumbnails/49.jpg)
Questions?Next lecture: Data-link Layer Security
NETE4630 Advanced Network Security and Implementation