Professional Documents
Culture Documents
Physical Security
From (ISC)2 Candidate Information
Bulletin:
Physical Security
From (ISC)2 Candidate Information
Bulletin:
Introduction
Interruption of services
Theft
Physical damage
Unauthorized disclosure
Loss of system integrity
Introduction
Threats fall into many categories:
Natural environmental threats (e.g., floods,
fire)
Supply system threats (e.g., power outages,
communication interruptions)
Manmade threats (e.g., explosions,
disgruntled employees, fraud)
Politically motivated threats (e.g., strikes,
riots, civil disobedience)
Introduction
Primary consideration in physical
security is that nothing should impede
life safety goals.
10
11
12
Territorial Reinforcement
Creates physical designs that
highlight the companys area of
influence to give legitimate owners a
sense of ownership.
Accomplished through the use of
walls, lighting, landscaping, etc.
13
14
15
17
Standard
Tempered
Acrylic
Wired
Laminated
Solar Window Film
Security Film
19
20
21
Power protection:
UPS Systems
Online UPS systems
Standby UPS System
22
Ground
Noise
Transient Noise
Inrush Current
Clean Power
EMI
RFI
23
Power Loss
Fault
Blackout
Power Degradation
Sag/dip
Brownout
Inrush Current
24
Environmental Issues
Positive Drains
Static Electricity
Temperature
25
26
27
Environmental Issues:
Temperature
Ventilation
Airborne materials and particle
concentration must be monitored for
inappropriate levels.
Closed Loop
Positive Pressurization
29
31
Types of Fire:
A: Common Combustibles
B: Liquid
C: Electrical
D: Combustible Metals
K: Commercial Kitchens
34
Water
Halon and halon substitutes
Foams
Dry Powders
CO2
Soda Acid
Types of Sprinklers
Wet Pipe Systems (aka Closed Head
System)
Dry Pipe Systems
Preaction Systems
Deluge Systems
36
Perimeter Security
37
Perimeter Security
Perimeter Security
Protection services can be provided by:
39
Perimeter Security
Fences are first line of defence
mechanisms. (Small Joke!)
Varying heights, gauge, and mesh
provides security features (know them).
Barbed wire direction makes a
difference.
40
Perimeter Security
41
Perimeter Security
Gates have 4 distinct types:
42
Perimeter Security
43
Perimeter Security
Types of Locks
Mechanical Locks
Combination Locks
Cipher Locks (aka programmable locks)
Smart locks
Device Locks
44
Perimeter Security
Lock Strengths:
Grade 1 (commercial and industrial use)
Grade 2 (heavy duty residential/light duty
commercial)
Grade 3 (residential and consumer expendable)
Cylinder Categories
Low Security (no pick or drill resistance)
Medium Security (some pick resistance)
High Security (pick resistance through many
different mechanismsused only in Grade 1 & 2
locks)
45
Perimeter Security
Lighting
Know lighting terms and types of lighting to
use in different situations (inside v. outside,
security posts, access doors, zones of
illumination)
It is important to have the correct lighting
when using various types of surveillance
equipment.
Lighting controls and switches should be in
protected, locked, and centralized areas.
46
Perimeter Security
Continuous lighting: An array of lights that provide an even
amount of illumination across an area.
Controlled lighting: An organization should erect lights and
use illumination in such a way that does not blind its neighbors
or any passing cars, trains, or planes.
Standby Lighting: Lighting that can be configured to turn on
and off at different times so that potential intruders think that
different areas of the facility are populated.
Redundant or backup lighting: Should be available in case
of power failures or emergencies.
Response Area Illumination: Takes place when an IDS detects
suspicious activities and turns on the lights within the specified
area.
47
Perimeter Security
Surveillance Devices
These devices usually work in
conjunction with guards or other
monitoring mechanisms to extend
their capacity.
Know the factors in choosing CCTV,
focal length, lens types (fixed v.
zoom), iris, depth of field, illumination
requirements
48
Perimeter Security
Focal length: The focal length of a
lens defines its effectiveness in viewing
objects from a horizontal and vertical
view.
The sizes of images that will be shown
on a monitor along with the area that
can be covered by one camera are
defined by focal length.
Short focal length = wider angle views
Long focal length = narrower views
49
Perimeter Security
Depth of field: Refers to the portion of
the environment that is in focus
Shallow depth of focus: Provides a
softer backdrop and leads viewers to
the foreground object
Greater depth of focus: Not much
distinction between objects in the
foreground and background.
50
Perimeter Security
Perimeter Security
Physical Security
Deterrence
Delay
Detection
Assessment
Response
53
Physical Security
Resources
All in One Book (Shon Harris, 2005)
Official (ISC) Guide to the CISSP CBK
((ISC), 2006)
54