You are on page 1of 43

Faculty of Computing and Informatics

Succeed We Must
Lecture 4: Physical Security
 Physical Security Concern
Computer Security Research Group

 Introduction
 Physical Security Controls
 Controls for protecting the secure facility
 Maintenance of Facility Systems
 Interception of Data
 Mobile and Portable Systems
 Remote Computing Security
 Special Considerations for Physical
Security Threats
 Inventory Management
 Practical Exercise
07/12/22 Fred Kaggwa 1
Faculty of Computing and Informatics
Is Physical Security An IT Concern?
Succeed We Must

 You have been working hard to secure your network


from cyber attacks
Computer Security Research Group

 But what if an attacker gains access to the server


room or network wiring closet or your room ...
 Is your network, computer etc still safe?

 Attackers could use ‘side-channel attack’ to


facilitate cyber-attack:
 Use keyboard sound to know key strokes

 Use computer screen light change to detect


information
 Attach USB key to spy/record

 Good to read about these three

07/12/22 Fred Kaggwa 2


Faculty of Computing and Informatics

Succeed We Must
Introduction
 Physical security addresses design,
Computer Security Research Group

implementation, and maintenance of


countermeasures that protect physical
resources of an organization.
 Most controls can be circumvented if
attacker gains physical access
 Physical security is as important as logical
security

07/12/22 Fred Kaggwa 3


Faculty of Computing and Informatics

Succeed We Must
Introduction cont’d
Seven major sources of physical Loss
Computer Security Research Group

•Extreme temperature: heat, cold


•Gases: war gases, commercial vapors, humid or dry air,

suspended particles
•Liquids: water, chemicals

•Living organisms: viruses, bacteria, people, animals, insects

•Projectiles: tangible objects in motion, powered objects

•Movement: collapse, shearing, shaking, vibration, liquefaction,

flows waves, separation, slide


•Energy anomalies: electrical surge or failure, magnetism, static

electricity, aging circuitry; radiation: sound, light, radio,


microwave, electromagnetic, atomic. Donn B. Parker: author

07/12/22 Fred Kaggwa 4


Faculty of Computing and Informatics

Succeed We Must
Introduction cont’d
 Community roles
Computer Security Research Group

 General management: responsible for


facility security
 IT management and professionals:
responsible for environmental and access
security
 Information security management and
professionals: perform risk assessments
and implementation reviews
07/12/22 Fred Kaggwa 5
Faculty of Computing and Informatics

Succeed We Must
Physical Security Controls
 Secure facility: physical location
Computer Security Research Group

engineered with controls designed to


minimize risk of attacks from physical
threats

 Secure facility can take advantage of


natural terrain, traffic flow, and degree of
urban development; can complement these
with protection mechanisms (fences, gates,
walls, guards, alarms)
07/12/22 Fred Kaggwa 6
Faculty of Computing and Informatics
Controls for protecting the secure facility
Succeed We Must
 Walls, fencing, and gates
Computer Security Research Group

 Guards

 Dogs

 ID Cards and badges

 Locks and keys

 Mantraps

 Electronic monitoring

 Alarms and alarm systems

 Computer rooms and wiring closets

 Interior walls and doors

07/12/22 Fred Kaggwa 7


Faculty of Computing and Informatics
ID Cards and Badges
Succeed We Must

 Ties physical security with information access


control
Computer Security Research Group

 ID card is typically concealed

 Name badge is visible

 Serve as simple form of biometrics (facial


recognition)
 Should not be only means of control as cards
can be easily duplicated, stolen, and modified
 Tailgating occurs when unauthorized individual
follows authorized user through the control

07/12/22 Fred Kaggwa 8


Faculty of Computing and Informatics
Locks and Keys
Succeed We Must

 Two types of locks: mechanical and


Computer Security Research Group

electromechanical
 Locks can also be divided into four categories:
manual, programmable, electronic, biometric
 Locks fail and alternative procedures for controlling
access must be put in place
 Locks fail in one of two ways
 Fail-safe lock-lock fails, door becomes unlocked
 Fail-secure lock-lock fails, door remains locked
 More on locks and keys (next 5 slides)
07/12/22 Fred Kaggwa 9
Faculty of Computing and Informatics
Compromising Locks
Succeed We Must

 For centuries, the lock has been one of the


Computer Security Research Group

cornerstones of physical security


 We rely on dozens of them every day to protect

people and assets


 The trust most people place in locks is
unwarranted
 Most locks can be easily compromised with

nondestructive methods
 Sometimes within seconds and with readily

available tools
 “Locks keep honest people honest”
07/12/22 Fred Kaggwa 10
Faculty of Computing and Informatics
1860: Yale Pin Tumbler Lock
Succeed We Must

• Modern version of
Computer Security Research Group

the Egyptian single-


pin design
• Utilizes two pins for
Public domain image of Linus Yale, Jr.

locking
• Modern version of
the Egyptian single-
pin design
• Utilizes two pins for
locking

07/12/22 Fred Kaggwa 11


Faculty of Computing and Informatics
How Does a Pin Tumbler Lock Work?
Succeed We Must

1. When a key is not present, the


pin stacks are pushed down by
Computer Security Research Group

the springs so that the driver


(top) pins span the plug and
the outer casing, preventing
the plug from rotating.
2. When the correct key is
inserted, the ridges of the key
push up the pin stacks so that
the cuts of the pin stacks are
aligned with the shear line.
3. The alignment of the cuts with
the shear line allows the plug
to be rotated.

Images from http://en.wikipedia.org/wiki/File:Pin_tumbler_with_key.svg used with permission under Gnu Free Documentation License 1.2

07/12/22 Fred Kaggwa 12


Faculty of Computing and Informatics
How Does a Pin Tumbler Lock Work?
Succeed We Must
Computer Security Research Group

 If an inappropriate
key is inserted, then
the pins do not align
along the shear line
and the lock does
not turn.

Image from http://en.wikipedia.org/wiki/File:Pin_tumbler_with_key.svg used with permission under Gnu Free Documentation License 1.2

07/12/22 Fred Kaggwa 13


Faculty of Computing and Informatics

Succeed We Must
Tubular lock
 Usually on car alarms or
Computer Security Research Group

vending machines
 6-8 pins
 Easy to pick with special tool
 The tool could become a new
key

Images from http://en.wikipedia.org/wiki/File:Tubular_locked.png used with permission under Gnu Free Documentation License 1.2

07/12/22 Fred Kaggwa 14


Faculty of Computing and Informatics

Succeed We Must
Mantraps
 Small enclosure that has entry point and different
Computer Security Research Group

exit point

 Individual enters mantrap, requests access, and if


verified, is allowed to exit mantrap into facility

 Individual denied entry is not allowed to exit until


security official overrides automatic locks of the
enclosure

07/12/22 Fred Kaggwa 15


Faculty of Computing and Informatics

Succeed We Must
Mantraps
Computer Security Research Group

07/12/22 Fred Kaggwa 16


Faculty of Computing and Informatics

Succeed We Must
Electronic Monitoring
 Records events where other types of physical
Computer Security Research Group

controls are impractical or incomplete


 May use cameras with video recorders; includes
closed-circuit television (CCT) systems
 Drawbacks
 Reactive; do not prevent access or prohibited
activity
 Recordings often not monitored in real time;
must be reviewed to have any value

07/12/22 Fred Kaggwa 17


Faculty of Computing and Informatics

Succeed We Must
Alarms and Alarm Systems
 Alarm systems notify when an event occurs
Computer Security Research Group

 Detect fire, intrusion, environmental


disturbance, or an interruption in services
 Rely on sensors that detect event; e.g.,
motion detectors, smoke detectors, thermal
detectors, glass breakage detectors, weight
sensors, contact sensors, vibration sensors

07/12/22 Fred Kaggwa 18


Faculty of Computing and Informatics

Succeed We Must
Computer Rooms and Wiring Closets
 Require special attention to ensure
Computer Security Research Group

confidentiality, integrity, and availability of


information
 Logical controls easily defeated if attacker
gains physical access to computing equipment
 Custodial staff often the least scrutinized
persons who have access to offices; are given
greatest degree of unsupervised access

07/12/22 Fred Kaggwa 19


Faculty of Computing and Informatics

Succeed We Must
Interior Walls and Doors
 Information asset security sometimes compromised
Computer Security Research Group

by construction of facility walls and doors


 Facility walls typically either standard interior or
firewall
 High-security areas must have firewall-grade walls to
provide physical security from potential intruders and
improve resistance to fires
 Doors allowing access to high security rooms should
be evaluated
 Recommended that push or crash bars be installed
on computer rooms and closets

07/12/22 Fred Kaggwa 20


Faculty of Computing and Informatics

Succeed We Must
Fire Security and Safety
 Most serious threat to safety of people who
work in an organization is possibility of fire
Computer Security Research Group

 Fires account for more property damage,


personal injury, and death than any other
threat
 Imperative that physical security plans
examine and implement strong measures to
detect and respond to fires

07/12/22 Fred Kaggwa 21


Faculty of Computing and Informatics

Succeed We Must
Fire Detection and Response
 Fire suppression systems: devices installed
Computer Security Research Group

and maintained to detect and respond to a


fire
 Deny an environment of heat, fuel, or oxygen
 Water and water mist systems
 Carbon dioxide systems
 Soda acid systems
 Gas-based systems
07/12/22 Fred Kaggwa 22
Faculty of Computing and Informatics

Succeed We Must
Fire Detection
 Fire detection systems fall into two general
Computer Security Research Group

categories: manual and automatic

 Part of a complete fire safety program includes


individuals that monitor chaos of fire evacuation to
prevent an attacker accessing offices

 There are three basic types of fire detection


systems: thermal detection, smoke detection, flame
detection

07/12/22 Fred Kaggwa 23


Faculty of Computing and Informatics

Succeed We Must
Fire Suppression
 Systems consist of portable, manual, or
Computer Security Research Group

automatic apparatus

 Portable extinguishers are rated by the type


of fire: Class A, Class B, Class C, Class D

 Installed systems apply suppressive


agents; usually either sprinkler or gaseous
systems

07/12/22 Fred Kaggwa 24


Faculty of Computing and Informatics
Gaseous Emission Systems
Succeed We Must

 Until recently, two types of systems: carbon


Computer Security Research Group

dioxide and Halon


 Carbon dioxide robs a fire of oxygen supply
 Halon is clean but has been classified as
ozone-depleting substance; new installations
are prohibited
 Alternative clean agents include FM-200,
Inergen, carbon dioxide, FE-13
(trifluromethane)

07/12/22 Fred Kaggwa 25


Faculty of Computing and Informatics
Failure Of Supporting Utilities and Structural Collapse
Succeed We Must

 Supporting utilities (heating, ventilation and


Computer Security Research Group

air conditioning; power; water; and others)


have significant impact on continued safe
operation of a facility

 Each utility must be properly managed to


prevent potential damage to information
and information systems

07/12/22 Fred Kaggwa 26


Faculty of Computing and Informatics
Heating, Ventilation, and Air
Succeed We Must
Conditioning
 Areas within heating, ventilation, and air
Computer Security Research Group

conditioning (HVAC) system that can cause


damage to information systems include:
 Temperature
 Filtration
 Humidity
 Static electricity

07/12/22 Fred Kaggwa 27


Faculty of Computing and Informatics

Succeed We Must
Ventilation Shafts
 While ductwork is small in residential
Computer Security Research Group

buildings, in large commercial buildings it


can be large enough for individual to climb
though

 If vents are large, security can install wire


mesh grids at various points to
compartmentalize the runs

07/12/22 Fred Kaggwa 28


Faculty of Computing and Informatics
Power Management and Conditioning
Succeed We Must

 Electrical quantity (voltage level; amperage rating)


Computer Security Research Group

is a concern, as is quality of power (cleanliness;


proper installation)
 Noise that interferes with the normal 60 Hertz cycle
can result in inaccurate time clocks or unreliable
internal clocks inside CPU
 Grounding ensures that returning flow of current is
properly discharged to ground
 Overloading a circuit causes problems with circuit
tripping and can overload electrical cable,
increasing risk of fire

07/12/22 Fred Kaggwa 29


Faculty of Computing and Informatics
Uninterruptible Power Supply (UPS)
Succeed We Must

 In case of power outage, UPS is backup


Computer Security Research Group

power source for major computer systems


 Four basic UPS configurations
 Standby
 Ferroresonant standby
 Line-interactive
 True online (double conversion online)

07/12/22 Fred Kaggwa 30


Faculty of Computing and Informatics

Succeed We Must
Emergency Shutoff
 Important aspect of power management is
Computer Security Research Group

the need to be able to stop power


immediately should current represent a risk
to human or machine safety

 Most computer rooms and wiring closets


equipped with an emergency power shutoff

07/12/22 Fred Kaggwa 31


Faculty of Computing and Informatics

Succeed We Must
Water Problems
 Lack of water poses problem to systems, including
Computer Security Research Group

functionality of fire suppression systems and ability


of water chillers to provide air-conditioning
 Surplus of water, or water pressure, poses a real
threat (flooding; leaks)
 Very important to integrate water detection
systems into alarm systems that regulate overall
facilities operations

07/12/22 Fred Kaggwa 32


Faculty of Computing and Informatics
Structural Collapse
Succeed We Must

 Unavoidable forces can cause failures of


Computer Security Research Group

structures that house organization


 Structures designed and constructed with
specific load limits; overloading these limits
results in structural failure and potential
injury or loss of life
 Periodic inspections by qualified civil
engineers assists in identifying potentially
dangerous structural conditions
07/12/22 Fred Kaggwa 33
Faculty of Computing and Informatics
Maintenance of Facility Systems
Succeed We Must

 Physical security must be constantly


Computer Security Research Group

documented, evaluated, and tested


 Documentation of facility’s configuration,
operation, and function should be
integrated into disaster recovery plans and
operating procedures
 Testing helps improve the facility’s physical
security and identify weak points

07/12/22 Fred Kaggwa 34


Faculty of Computing and Informatics

Succeed We Must
Interception of Data
 Three methods of data interception
Computer Security Research Group

 Direct observation
 Interception of data transmission
 Electromagnetic interception
 E.g. The U.S. government developed
TEMPEST program to reduce risk of
electromagnetic radiation (EMR) monitoring
 How about in Uganda? Find out!

07/12/22 Fred Kaggwa 35


Faculty of Computing and Informatics

Succeed We Must
Mobile and Portable Systems
 With the increased threat to information
Computer Security Research Group

security for laptops, handhelds, and PDAs,


mobile computing requires more security
than average in-house system

 Many mobile computing systems have


corporate information stored within them;
some are configured to facilitate user’s
access into organization’s secure
computing facilities
07/12/22 Fred Kaggwa 36
Faculty of Computing and Informatics
Mobile and Portable Systems cont’d
Succeed We Must

 Controls support security and retrieval


Computer Security Research Group

of lost or stolen laptops


 CompuTrace software, stored on laptop;
reports to a central monitoring center
 Burglar alarms made up of a PC card
that contains a motion detector

07/12/22 Fred Kaggwa 37


Faculty of Computing and Informatics

Succeed We Must
Remote Computing Security
 Remote site computing: away from organizational
Computer Security Research Group

facility
 Telecommuting: computing using
telecommunications including Internet, dial-up, or
leased point-to-point links
 Employees may need to access networks on
business trips; telecommuters need access from
home systems or satellite offices
 To provide secure extension of organization’s
internal networks, all external connections and
systems must be secured
07/12/22 Fred Kaggwa 38
Faculty of Computing and Informatics
Special Considerations for Physical Security Threats
Succeed We Must

 Develop physical security in-house or outsource?


Computer Security Research Group

 Many qualified and professional agencies


 Benefit of outsourcing includes gaining
experience and knowledge of agencies
 Downside includes high expense, loss of control
over individual components, and level of trust
that must be placed in another company
 Social engineering: use of people skills to obtain
information from employees that should not be
released

07/12/22 Fred Kaggwa 39


Faculty of Computing and Informatics

Succeed We Must
Inventory Management
 Computing equipment should be
Computer Security Research Group

inventoried and inspected on a regular


basis
 Classified information should also be
inventoried and managed
 Physical security of computing equipment,
data storage media and classified
documents varies for each organization

07/12/22 Fred Kaggwa 40


Faculty of Computing and Informatics

Succeed We Must
Summary
 Threats to information security that are unique to
Computer Security Research Group

physical security
 Key physical security considerations in a facility site
 Physical security monitoring components
 Essential elements of access control
 Fire safety, fire detection, and response
 Importance of supporting utilities, especially use of
uninterruptible power supplies
 Countermeasures to physical theft of computing
devices

07/12/22 Fred Kaggwa 41


Faculty of Computing and Informatics

Succeed We Must
Individual Exercise
 You are required to move around the MUST Upper or Lower
(Choose one but not both) campus and make a summarized
Computer Security Research Group

report concerning the physical security of the upper campus.


In your Report,
 Identify the weaknesses in the physical security of the
different facilities (networks, buildings etc.) at the campus.
 Propose the appropriate physical security mechanisms that
can be put in place to counter those weaknesses.
 Mention the Status (see table next slide) for attention
 Use a sample table below(next slide) for your summarized
report
 Hand in your report by 4:30pm sharp (Hand written)

07/12/22 Fred Kaggwa 42


Faculty of Computing and Informatics
MUST Lower/Upper Campus Physical Security Report
Succeed We Must

FACILITY WEAKNESS PROPOSED STATUS (Urgent, Not


(Item) SOLUTION Urgent, Can Wait)
Computer Security Research Group

07/12/22 Fred Kaggwa 43

You might also like