CHAPTER 5 Protecting Your System: Physical Security | CHAPTER 5 IN A NUTSHELL: Introduction to Physical Security | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Introduction to Physical Security Most people think about locks, bars, alarms, and uniformed guards whenthey think about security. While these countermeasures are by nomeans the only precautions that need to be considered when trying tosecure an information system, they are a perfectly logical place to begin.Physical security is a vital part of any security plan and is fundamental to allsecurity efforts--without it, information security (Chapter 6), softwaresecurity (Chapter 7), user access security (Chapter 8), and networksecurity (Chapter 9) are considerably more difficult, if not impossible, toinitiate. Physical security refers to the protection of building sites andequipment (and all information and software contained therein) fromtheft, vandalism, natural disaster, manmade catastrophes, and accidentaldamage (e.g., from electrical surges, extreme temperatures, and spilledcoffee). It requires solid building construction, suitable emergencypreparedness, reliable power supplies, adequate climate control, and appropriate protection from intruders. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Commonly Asked Questions Q.How can I implement adequate site security when I am stuck in anold and decrepit facility? Q.Even if we wanted to implement these physical security guidelines,how would we go about doing so? | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Determining countermeasures often requires creativity: don't limit yourself to traditional solutions. | Q.What if my budget won't allow for hiring full-time security guards? A. Hiring full-time guards is only one of many options for dealing withsecurity monitoring activities. Part-time staff on watch duringparticularly critical periods is another. So are video cameras and the use ofother staff (from managers to receptionists) who are trained to monitorsecurity as a part of their duties. The point is that by brainstorming a rangeof possible countermeasure solutions you can come up with severaleffective ways to monitor your workplace. The key is that the function isbeing performed. How it is done is secondary--and completely up to theorganization and its unique requirements. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Guidelines for security policy development can be found in Chapter 3. | Policy Issues Physical security requires that building site(s) be safeguarded in a way thatminimizes the risk of resource theft and destruction. To accomplishthis, decision-makers must be concerned about building construction, roomassignments, emergency procedures, regulations governing equipmentplacement and use, power supplies, product handling, and relationshipswith outside contractors and agencies. The physical plant must be satisfactorily secured to prevent thosepeople who are not authorized to enter the site and use equipment fromdoing so. A building does not need to feel like a fort to be safe. Well-conceivedplans to secure a building can be initiated without adding undueburden on your staff. After all, if they require access, they will receive it--as long as they were aware of, and abide by, the organization's statedsecurity policies and guidelines (see Chapter 3). The only way to ensurethis is to demand that before any person is given access to your system,they have first signed and returned a valid Security Agreement. Thisnecessary security policy is too important to permit exceptions. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
As discussed more completely in Chapter 2, a threat is any action, actor, or event that contributes to risk |
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
A countermeasure is a strp planned and taken in opposition to another act or potential act. | Physical Security Countermeasures The following countermeasures address physical security concerns thatcould affect your site(s) and equipment. These strategies arerecommended when risk assessment identifies or confirms the need tocounter potential breaches in the physical security of your system. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Countermeasures come in a variety of sizes, shapes, and levelsof complexity. This document endeavors to describe a range ofstrategies that are potentially applicable to life in educationorganizations. In an effort to maintain this focus, thosecountermeasures that are unlikely to be applied in educationorganizations are not included here. If after your risk assessment,for example, your security team determines that your organizationrequires high-end countermeasures like retinal scanners or voiceanalyzers, you will need to refer to other security references andperhaps even need to hire a reliable technical consultant. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Create a Secure Environment: Building and Room Construction:17
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Select only those countermeasures that meetpercuived needs as indentified during riskassessment (Chapter 2) and supportsecurity policy (Chapter 3). |
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Recognize that some countermeasures are ideals and may not be feasible if, for example, your organization is housed in an old building.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Guard Equipment:
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rebuff Theft:18
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Attend to Portable Equipment and Computers:19 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
While the X-ray conveyor belt is the preferred way oftransporting a laptop through airport security (compared tosubjecting the computer to the magnetic fields of walk-through orwand scanners), it is also a prime place for theft. Thieves love to"inadvertently" pick up the wrong bag and disappear whilepassengers are fumbling through their pockets to find the loosecoins that keep setting off the metal detectors. Use the X-rayconveyor belt, but never take your eyes off your laptop! | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Require laptop users to read the recommended travel guidelines that should come with the equipments's documentation. |
It Really Happens! Jack's briefcase was his life. Well, maybe it wasn't his whole life, but it definitely contained the betterpart of his professional life. It held his grade book, his lesson plans, his master's thesis--all very important things in the world of a middle school teacher. And it wouldn't be an exaggeration to say that Jack sure was surprised when his life (the briefcase) went up in flames one afternoon in the school cafeteria. He couldn't explain it, but nonetheless he found himself sitting in front of the district technologist trying to do exactly that--explain why his briefcase caught on fire and ruined, among more important things to him, the spare battery he was carrying for the school's laptop computer. "So," the technologist asked, "you're saying that you're surprised that your briefcase caught on fire? Well, let me tell you, I'm glad that it was only your bag that was damaged. Didn't you know that the exposed terminals of a battery can cause a spark? Didn't you know that any piece of metal, even a paper clip, can serve as the conduit? That's all it takes: an improperly stored battery, a paper clip and anything combustible--and wham, you've got yourself a fire. Your home could have gone up in flames last night because of it. Or your school could have this afternoon. Didn't you know that?" Jack almost replied that, of course, he hadn't known about all of those dangers, and that the technologist should have warned him about them before he had borrowed the laptop and extra battery. But instead he just shook his head sheepishly. After all, along with his grade book, lesson plans, and master's thesis, he had just burned a $200 dollar laptop battery that didn't belong to him. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Regulate Power Supplies:
| Pay attention to the manufacturer's recommendations for storing portable computer batteries--they carry live charges and are capable of igniting fires if not handled properly. |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Protect Output:
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
It Really Happens! Dr. Hamilton was everything that a school district could ask for. She was a great visionary, a trustedleader, and an excellent superintendent... but she was terrible with the piles of paper she kept on her desk.Luckily for her and the district, she had an equally competent secretary. Lucy was always one step ahead of Dr.Hamilton with the paperwork. She knew where to find the latest draft of the letter to the Board. She knewwhich form needed to be completed by when. She knew how many copies of the monthly report needed to berun off. One afternoon, Dr. Hamilton came running out of her office to Lucy's desk, "You haven't shredded thosepapers I gave you this morning yet, have you?" As was always the case, Lucy had, of course, completed the task shortly after it had been handed to her.She told Dr. Hamilton so, and asked what was the matter. "I think that I accidentally gave you my only copy of the speech I'm giving to the Chamber of Commercetonight," the distraught woman replied, knowing that she'd never be able to reproduce the outline in time forthe meeting. "Don't worry," Lucy said, beaming with pride that her forethought was about to again pay off, "I makebackup copies of every sheet of paper you give me before I turn on that paper shredder. Let's look in my filingcabinet." Dr. Hamilton let out a deep sigh of relief--Lucy had again saved the day. Suddenly, however, the astutesuperintendent paused, "What do you mean you make copies of everything I give you before you turn on thepaper shredder?" | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
While it may be tempting to simply refer to the following checklist as yoursecurity plan, to do so would limit the effectiveness of the recom-mendations.They are most useful when initiated as part of a larger plan todevelop and implement security policy throughout an organization. Otherchapters in this document also address ways to customize policy to yourorganization's specific needs--a concept that should not be ignored if youwant to maximize the effectiveness of any given guideline. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
The brevity of a checklist can be helpful, but it in no way makes up for the detail of the text. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Physical Security, from Safeguarding Your Technology, NCES Publication 98-297 (National Center for Education Statistics) (2024)
Top Articles
Top 30 Apps like Quora Ask Questions Get Answers for Android
Can a Private Investigator Find Hidden Bank Accounts?
Craigslist Niles Ohio
Craigslist Cars And Trucks For Sale By Owner Indianapolis
Craigslist Benton Harbor Michigan
Retro Ride Teardrop
Mikayla Campinos Videos: A Deep Dive Into The Rising Star
What is the surrender charge on life insurance?
R/Afkarena
Studentvue Columbia Heights
DoorDash, Inc. (DASH) Stock Price, Quote & News - Stock Analysis
What is Rumba and How to Dance the Rumba Basic — Duet Dance Studio Chicago | Ballroom Dance in Chicago
Amc Flight Schedule
Echat Fr Review Pc Retailer In Qatar Prestige Pc Providers – Alpha Marine Group
Jinx Chapter 24: Release Date, Spoilers & Where To Read - OtakuKart
Osborn-Checkliste: Ideen finden mit System
St. Petersburg, FL - Bombay. Meet Malia a Pet for Adoption - AdoptaPet.com
MLB power rankings: Red-hot Chicago Cubs power into September, NL wild-card race
Blue Rain Lubbock
Https Paperlesspay Talx Com Boydgaming
Self-Service ATMs: Accessibility, Limits, & Features
Never Give Up Quotes to Keep You Going
European city that's best to visit from the UK by train has amazing beer
Hdmovie2 Sbs
Aspenx2 Newburyport
1773x / >
Phoenixdabarbie
Publix Coral Way And 147
Life Insurance Policies | New York Life
Boneyard Barbers
Panchang 2022 Usa
Movies123.Pick
Etowah County Sheriff Dept
Babylon 2022 Showtimes Near Cinemark Downey And Xd
Tugboat Information
Bella Thorne Bikini Uncensored
Devotion Showtimes Near The Grand 16 - Pier Park
Trivago Myrtle Beach Hotels
Myanswers Com Abc Resources
Paperless Employee/Kiewit Pay Statements
9 oplossingen voor het laptoptouchpad dat niet werkt in Windows - TWCB (NL)
Mytime Maple Grove Hospital
Cpmc Mission Bernal Campus & Orthopedic Institute Photos
Differential Diagnosis
Parent Portal Pat Med
Coffee County Tag Office Douglas Ga
Syrie Funeral Home Obituary
Leland Westerlund
Walmart Front Door Wreaths
Campaign Blacksmith Bench
Where To Find Mega Ring In Pokemon Radical Red
When Is The First Cold Front In Florida 2022
Latest Posts
Article information
Author: Dong Thiel
Last Updated:
Views: 6192
Rating: 4.9 / 5 (79 voted)
Reviews: 94% of readers found this page helpful
Author information
Name: Dong Thiel
Birthday: 2001-07-14
Address: 2865 Kasha Unions, West Corrinne, AK 05708-1071
Phone: +3512198379449
Job: Design Planner
Hobby: Graffiti, Foreign language learning, Gambling, Metalworking, Rowing, Sculling, Sewing
Introduction: My name is Dong Thiel, I am a brainy, happy, tasty, lively, splendid, talented, cooperative person who loves writing and wants to share my knowledge and understanding with you.