SlideShare una empresa de Scribd logo
1 de 20
PHYSICAL SECURITY




Attacker
Physical Security

Not all attacks on your organization'
data come across the network

Many companies focus on an “iron-clad” network
security, but that does not protect them from physical
assault or theft of data.
Physical Security


   An example of this would be the recent identity theft
    incident at the Department of Veterans Affairs, which
    began with the theft of a company laptop.
Physical Security

   Increased importance

   Given the trend toward smaller, more lightweight PC
    components, physical security is growing increasingly
    important.

   It’s important to implement a physical access control
    program in a company and strictly enforce the measures.
Physical Security


   Attackers : Two Categories

       Outside the company

       From within the company
Physical Security

                  Impact of an attack

   These attackers can often cause systems to fail, and
    they can compromise password-protected computers by
    using a removable hard drive to gain access.

   Attackers can directly access networks by adding or
    rearranging the connections, and they can easily steal
    physical objects if they're already on the inside.
Physical Security

   Preventing Outside attackers

   Natural barriers: landscape and terrain

   Fencing: type and construction

   Walls and ceiling construction: high risk areas

   Gate facilities: security checkpoints
Physical Security
    Preventing Outside attackers
    Frequency of patrols and security checks

    Door and window locations and security devices used

    Reception areas: location and control of entry

    Employee surveillance and vigilance


    Parking areas: entrance/exit, access to facility
Physical Security
Armed Guards and Bulldogs are a good way to keep out attackers.
Physical Security
Preventing attackers from within
   Ex: Disgruntled or greedy employers or contactors.

   It’s important to implement a physical access control
    program in a company and strictly enforce the measures.

   If an attacker has physical access to a system they can
    wreak havoc.
Physical Security
Guidelines for restricting personal access:

   Create a badge program that includes an employee picture
    and possibly color-code specific areas of access.

   Make it a policy to question anyone who doesn't have a
    visible ID badge.

   Escort, observe, and supervise guests for their entire visit.
Physical Security
Guidelines for restricting personal access:
   Don't allow anyone – including vendors, salespeople, etc. – to
    connect personal laptops (or any other computing device) to the
    network.

   Don't allow anyone to add hardware or software to computers
    without proper authorization.

   Watch out for "tailgaters." These people wait for someone with
    access to enter a controlled area (such as one with a locked door)
    and then follow the authorized person through the door.
    Tailgaters enter without using their own key, card key, or lock
    combination.
Physical Security
Enforcement
Physical Security
Guidelines for protecting information and equipment access:

   Place monitors and printers away from windows and areas where
    unauthorized persons could easily observe them.

   Shred or otherwise destroy all sensitive information and media
    when it's no longer necessary.

   Don't leave documents unattended at fax machines or printers.

   Require all users to log off or power down workstations at the
    end of the working day.
Physical Security
Guidelines for protecting information and equipment access:

   Lock up portable equipment (e.g., laptops, PDAs, media,
    memory sticks) out of sight in a safe storage place overnight.

   Don't allow the removal of computers or storage media from
    the work area or facility without ensuring that the person
    removing it has authorization and a valid reason.

   Provide locks or cables to prevent theft, and lock computer
    cases.
Physical Security
Physical Security
    Strong Room
Physical Security

              Strong Rooms / Server Room

   This hardware contains highly sensitive information and access
    privileges that affect a company’s data system.

   Only a select few administrators should have access to this room.
Physical Security
           Strong Rooms / Server Room

   The room should have increased security mechanisms to
    prevent unauthorized entry.

   There should be camera/personnel surveillance on the
    entrance to ensure security.
Physical Security
Enforcement

Más contenido relacionado

La actualidad más candente

Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentFaheem Ul Hasan
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control PresentationWajahat Rajab
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamMohammed Adam
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
INFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMINFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMANAND MURALI
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Security risk management
Security risk managementSecurity risk management
Security risk managementG Prachi
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practicesamiable_indian
 
Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Securityleminhvuong
 

La actualidad más candente (20)

Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Physical Security.ppt
Physical Security.pptPhysical Security.ppt
Physical Security.ppt
 
SECURITY AWARENESS
SECURITY AWARENESSSECURITY AWARENESS
SECURITY AWARENESS
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
6 Physical Security
6 Physical Security6 Physical Security
6 Physical Security
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
INFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMINFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEM
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
 
Personnel security
Personnel securityPersonnel security
Personnel security
 
Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Security
 

Destacado

5 Cryptography Part2
5 Cryptography Part25 Cryptography Part2
5 Cryptography Part2Alfred Ouyang
 
10 Legal+Compliance+Investigation
10 Legal+Compliance+Investigation10 Legal+Compliance+Investigation
10 Legal+Compliance+InvestigationAlfred Ouyang
 
7 Software Development Security
7 Software Development Security7 Software Development Security
7 Software Development SecurityAlfred Ouyang
 
5 Cryptography Part1
5 Cryptography Part15 Cryptography Part1
5 Cryptography Part1Alfred Ouyang
 

Destacado (6)

9 Bcp+Drp
9 Bcp+Drp9 Bcp+Drp
9 Bcp+Drp
 
5 Cryptography Part2
5 Cryptography Part25 Cryptography Part2
5 Cryptography Part2
 
10 Legal+Compliance+Investigation
10 Legal+Compliance+Investigation10 Legal+Compliance+Investigation
10 Legal+Compliance+Investigation
 
7 Software Development Security
7 Software Development Security7 Software Development Security
7 Software Development Security
 
8 Access Control
8 Access Control8 Access Control
8 Access Control
 
5 Cryptography Part1
5 Cryptography Part15 Cryptography Part1
5 Cryptography Part1
 

Similar a Physical security.ppt

Secure physical infrastructure
Secure physical infrastructureSecure physical infrastructure
Secure physical infrastructurePallavi Agarwal
 
Physical access control
Physical access controlPhysical access control
Physical access controlAhsin Yousaf
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issuesHaseeb Ahmed Awan
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecuritylearnt
 
Basic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpageBasic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpagenakomuri
 
Ethical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxEthical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxJanani S
 
Physical security.docx
Physical security.docxPhysical security.docx
Physical security.docxMVNVKUMAR
 
Physical security is a fundamental component of any secure infrastru.pdf
Physical security is a fundamental component of any secure infrastru.pdfPhysical security is a fundamental component of any secure infrastru.pdf
Physical security is a fundamental component of any secure infrastru.pdffeelinggift
 
SECURITY CONTROLS
SECURITY CONTROLSSECURITY CONTROLS
SECURITY CONTROLSsuccessdsp
 
now a days security is very important to organization and physical s.pdf
now a days security is very important to organization and physical s.pdfnow a days security is very important to organization and physical s.pdf
now a days security is very important to organization and physical s.pdfsooryasalini
 
Remote access security services are crucial for several reasons_.pdf
Remote access security services are crucial for several reasons_.pdfRemote access security services are crucial for several reasons_.pdf
Remote access security services are crucial for several reasons_.pdfSomiHan224
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & CyberPaul Andrews
 
Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT SecurityAjay Jassi
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxMohanPandey31
 
Securing Management Information Systems.ppt
Securing Management Information Systems.pptSecuring Management Information Systems.ppt
Securing Management Information Systems.pptRoshni814224
 
08 -Securing Information Systems at workplace.ppt
08 -Securing Information Systems at workplace.ppt08 -Securing Information Systems at workplace.ppt
08 -Securing Information Systems at workplace.pptRoshni814224
 
A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015Jeffery Brown
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)Zara Nawaz
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lectureZara Nawaz
 

Similar a Physical security.ppt (20)

Secure physical infrastructure
Secure physical infrastructureSecure physical infrastructure
Secure physical infrastructure
 
Physical access control
Physical access controlPhysical access control
Physical access control
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issues
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
Basic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpageBasic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpage
 
Ethical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxEthical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptx
 
Physical security.docx
Physical security.docxPhysical security.docx
Physical security.docx
 
Physical security is a fundamental component of any secure infrastru.pdf
Physical security is a fundamental component of any secure infrastru.pdfPhysical security is a fundamental component of any secure infrastru.pdf
Physical security is a fundamental component of any secure infrastru.pdf
 
SECURITY CONTROLS
SECURITY CONTROLSSECURITY CONTROLS
SECURITY CONTROLS
 
now a days security is very important to organization and physical s.pdf
now a days security is very important to organization and physical s.pdfnow a days security is very important to organization and physical s.pdf
now a days security is very important to organization and physical s.pdf
 
Remote access security services are crucial for several reasons_.pdf
Remote access security services are crucial for several reasons_.pdfRemote access security services are crucial for several reasons_.pdf
Remote access security services are crucial for several reasons_.pdf
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & Cyber
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & Cyber
 
Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT Security
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptx
 
Securing Management Information Systems.ppt
Securing Management Information Systems.pptSecuring Management Information Systems.ppt
Securing Management Information Systems.ppt
 
08 -Securing Information Systems at workplace.ppt
08 -Securing Information Systems at workplace.ppt08 -Securing Information Systems at workplace.ppt
08 -Securing Information Systems at workplace.ppt
 
A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 

Más de Faheem Ul Hasan

Workplace Safety And Security Hotel.Ppt
Workplace Safety And Security Hotel.PptWorkplace Safety And Security Hotel.Ppt
Workplace Safety And Security Hotel.PptFaheem Ul Hasan
 
Guarding Against Robbery & Assault
Guarding Against  Robbery & AssaultGuarding Against  Robbery & Assault
Guarding Against Robbery & AssaultFaheem Ul Hasan
 
Security Training Incident Investigation And Report Writing.Ppt
Security Training Incident Investigation And Report Writing.PptSecurity Training Incident Investigation And Report Writing.Ppt
Security Training Incident Investigation And Report Writing.PptFaheem Ul Hasan
 
Terrorism And Its Hazards
Terrorism And Its HazardsTerrorism And Its Hazards
Terrorism And Its HazardsFaheem Ul Hasan
 
Terrorism A Global Threat
Terrorism A Global ThreatTerrorism A Global Threat
Terrorism A Global ThreatFaheem Ul Hasan
 
Safety & Security Hotel
Safety &  Security HotelSafety &  Security Hotel
Safety & Security HotelFaheem Ul Hasan
 
Fundamentals Of Fire Extinguishers
Fundamentals Of Fire ExtinguishersFundamentals Of Fire Extinguishers
Fundamentals Of Fire ExtinguishersFaheem Ul Hasan
 
Fire Extinguisher How To Used
Fire Extinguisher How To UsedFire Extinguisher How To Used
Fire Extinguisher How To UsedFaheem Ul Hasan
 
Chemical Suicides Presentation
Chemical Suicides PresentationChemical Suicides Presentation
Chemical Suicides PresentationFaheem Ul Hasan
 
South Asia Intelligence Report
South Asia Intelligence ReportSouth Asia Intelligence Report
South Asia Intelligence ReportFaheem Ul Hasan
 
W Kplace Violence & Security Presentation
W Kplace Violence & Security PresentationW Kplace Violence & Security Presentation
W Kplace Violence & Security PresentationFaheem Ul Hasan
 

Más de Faheem Ul Hasan (20)

PATROLLING
PATROLLINGPATROLLING
PATROLLING
 
Bomb threat checklist
Bomb threat checklistBomb threat checklist
Bomb threat checklist
 
Workplace Safety And Security Hotel.Ppt
Workplace Safety And Security Hotel.PptWorkplace Safety And Security Hotel.Ppt
Workplace Safety And Security Hotel.Ppt
 
Guarding Against Robbery & Assault
Guarding Against  Robbery & AssaultGuarding Against  Robbery & Assault
Guarding Against Robbery & Assault
 
Security Training Incident Investigation And Report Writing.Ppt
Security Training Incident Investigation And Report Writing.PptSecurity Training Incident Investigation And Report Writing.Ppt
Security Training Incident Investigation And Report Writing.Ppt
 
Terrorism And Its Hazards
Terrorism And Its HazardsTerrorism And Its Hazards
Terrorism And Its Hazards
 
Terrorism A Global Threat
Terrorism A Global ThreatTerrorism A Global Threat
Terrorism A Global Threat
 
Safety & Security Hotel
Safety &  Security HotelSafety &  Security Hotel
Safety & Security Hotel
 
Fundamentals Of Fire Extinguishers
Fundamentals Of Fire ExtinguishersFundamentals Of Fire Extinguishers
Fundamentals Of Fire Extinguishers
 
Fire Exinguisher
Fire ExinguisherFire Exinguisher
Fire Exinguisher
 
Fire Extinguisher How To Used
Fire Extinguisher How To UsedFire Extinguisher How To Used
Fire Extinguisher How To Used
 
Terrorism South Asia
Terrorism South AsiaTerrorism South Asia
Terrorism South Asia
 
Chemical Suicides Presentation
Chemical Suicides PresentationChemical Suicides Presentation
Chemical Suicides Presentation
 
Risk Advisory
Risk AdvisoryRisk Advisory
Risk Advisory
 
South Asia Intelligence Report
South Asia Intelligence ReportSouth Asia Intelligence Report
South Asia Intelligence Report
 
Global Terrorism
Global TerrorismGlobal Terrorism
Global Terrorism
 
Terrorism Update
Terrorism UpdateTerrorism Update
Terrorism Update
 
Khyber Assessment 2011
Khyber Assessment 2011Khyber Assessment 2011
Khyber Assessment 2011
 
Travel Risk Advisory
Travel Risk AdvisoryTravel Risk Advisory
Travel Risk Advisory
 
W Kplace Violence & Security Presentation
W Kplace Violence & Security PresentationW Kplace Violence & Security Presentation
W Kplace Violence & Security Presentation
 

Último

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 

Último (20)

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 

Physical security.ppt

  • 2. Physical Security Not all attacks on your organization' data come across the network Many companies focus on an “iron-clad” network security, but that does not protect them from physical assault or theft of data.
  • 3. Physical Security  An example of this would be the recent identity theft incident at the Department of Veterans Affairs, which began with the theft of a company laptop.
  • 4. Physical Security  Increased importance  Given the trend toward smaller, more lightweight PC components, physical security is growing increasingly important.  It’s important to implement a physical access control program in a company and strictly enforce the measures.
  • 5. Physical Security  Attackers : Two Categories  Outside the company  From within the company
  • 6. Physical Security Impact of an attack  These attackers can often cause systems to fail, and they can compromise password-protected computers by using a removable hard drive to gain access.  Attackers can directly access networks by adding or rearranging the connections, and they can easily steal physical objects if they're already on the inside.
  • 7. Physical Security  Preventing Outside attackers  Natural barriers: landscape and terrain  Fencing: type and construction  Walls and ceiling construction: high risk areas  Gate facilities: security checkpoints
  • 8. Physical Security  Preventing Outside attackers  Frequency of patrols and security checks  Door and window locations and security devices used  Reception areas: location and control of entry  Employee surveillance and vigilance  Parking areas: entrance/exit, access to facility
  • 9. Physical Security Armed Guards and Bulldogs are a good way to keep out attackers.
  • 10. Physical Security Preventing attackers from within  Ex: Disgruntled or greedy employers or contactors.  It’s important to implement a physical access control program in a company and strictly enforce the measures.  If an attacker has physical access to a system they can wreak havoc.
  • 11. Physical Security Guidelines for restricting personal access:  Create a badge program that includes an employee picture and possibly color-code specific areas of access.  Make it a policy to question anyone who doesn't have a visible ID badge.  Escort, observe, and supervise guests for their entire visit.
  • 12. Physical Security Guidelines for restricting personal access:  Don't allow anyone – including vendors, salespeople, etc. – to connect personal laptops (or any other computing device) to the network.  Don't allow anyone to add hardware or software to computers without proper authorization.  Watch out for "tailgaters." These people wait for someone with access to enter a controlled area (such as one with a locked door) and then follow the authorized person through the door. Tailgaters enter without using their own key, card key, or lock combination.
  • 14. Physical Security Guidelines for protecting information and equipment access:  Place monitors and printers away from windows and areas where unauthorized persons could easily observe them.  Shred or otherwise destroy all sensitive information and media when it's no longer necessary.  Don't leave documents unattended at fax machines or printers.  Require all users to log off or power down workstations at the end of the working day.
  • 15. Physical Security Guidelines for protecting information and equipment access:  Lock up portable equipment (e.g., laptops, PDAs, media, memory sticks) out of sight in a safe storage place overnight.  Don't allow the removal of computers or storage media from the work area or facility without ensuring that the person removing it has authorization and a valid reason.  Provide locks or cables to prevent theft, and lock computer cases.
  • 17. Physical Security Strong Room
  • 18. Physical Security Strong Rooms / Server Room  This hardware contains highly sensitive information and access privileges that affect a company’s data system.  Only a select few administrators should have access to this room.
  • 19. Physical Security Strong Rooms / Server Room  The room should have increased security mechanisms to prevent unauthorized entry.  There should be camera/personnel surveillance on the entrance to ensure security.