Professional Documents
Culture Documents
3600 Lecture9 Physical Security
3600 Lecture9 Physical Security
Chapter 9
Physical Security
1. Extreme temperature
2. Gases – includes humidity or dry air
3. Liquids – includes water
4. Living organisms – viruses, bacteria, animals, people
5. Projectiles
6. Movement – shaking, vibrating
7. Energy anomalies
Security Facility Controls
Mantraps
Small enclosure
Entry point & different exit point
Does not allow access if break-in
Electronic Monitoring
Alarms & Alarm Systems
Computer Rooms and Wiring Closets
Require special attention
Overlooked
Interior Walls and Doors
Fire Security and Safety
Class B
Solvents, gasoline, paint, lacquer, and oil
Remove oxygen from the air
Class C
Electrical equipment and appliance
Non-conducting agents
Class D
Metals, magnesium, lithium, and sodium
Special extinguishing agents and techniques
Manual & Automatic Fire Response
Wet-pipe
Pressurized water in all pipes
Some form of valve in each protected area
System activated – valves are opened
Dry-pipe
Work in areas where electrical equipment is used
Air hold valves closed
Fire is detected – sprinkler heads activated
Deluge system
Individual sprinkler heads are kept open
System activated
Pre-action
Water mist
Gaseous Emission
Failure of Supporting Utilities Structural
Collapse
Direct observation
Individuals must be close enough to breach confidentiality
Risk when info is moved from protected place
Interception of data transmission
Internet a real problem
Direct wiretap
Wireless
Laws dealing with wiretap do not apply to wireless
No expectation of privacy with radio-based communications
Interception of Data
Electromagnetic interception
Monitoring electromagnetic activity
Put back together
Not proven it can be done
Hoax
TEMPEST
Reduce the risk of EMR monitoring
Ensure computers placed as far as possible from outside perimeters
Installing special shielding inside CPU case
Maintaining distances from plumbing and other infrastructure
Mobile and Portable Systems
Hotel rooms
Presume unencrypted transmissions being monitored
Notebooks lost or stolen
Leased facilities
Who is attached to network
Advanced authentication systems strongly recommended