63
Information Security 365/765, Fall Semester, 2014 Course Instructor, Nicholas Davis Lecture 7, Physical Security

Information Systems Security 365/765 UW-Madison

Embed Size (px)

DESCRIPTION

I was very fortunate to be offered an opportunity to teach a semester long undergraduate and graduate student class, at the University of Wisconsin-Madison. The class has 50 students and every one of them is so friendly, outgoing and kind. The UW should be proud of the quality of the students it admits. I am lucky to be an employee of this massive and fantastic university. Here is the lecture I gave today. This module of the course is entitled Physical Security, which is an integral part of Information Security. It isn't all about hackers and spies. A lot of Information Security is derived from having solid documented and tested business processes.

Citation preview

Page 1: Information Systems Security 365/765 UW-Madison

Information Security 365/765, Fall Semester, 2014

Course Instructor, Nicholas DavisLecture 7, Physical Security

Page 2: Information Systems Security 365/765 UW-Madison

Today’s CandyToday’s CandyTwizzlersTwizzlers

Twizzlers is a brand of candy in the United States and Canada. Twizzlers is the product of Y&S Candies, Inc., of Lancaster, Pennsylvania, now a subsidiary of The Hershey Company.  In 1908 a plant was opened in Montreal and in 1929 the Twizzler brand was established

04/13/23 UNIVERSITY OF WISCONSIN 2

Page 3: Information Systems Security 365/765 UW-Madison

Physical SecurityPhysical Security

It used to be easy, way back in the 1960sToday, with IT assets on every desk, we have:TheftFraudVandalismSabotageAccidents

04/13/23 UNIVERSITY OF WISCONSIN 3

Page 4: Information Systems Security 365/765 UW-Madison

Let’s Watch an InterestingLet’s Watch an InterestingVideo About the History of Video About the History of

Physical SecurityPhysical Securityhttps://www.youtube.com/watch?v=-

eVSR9tder0

20 Minutes

04/13/23 UNIVERSITY OF WISCONSIN 4

Page 5: Information Systems Security 365/765 UW-Madison

Funny Cartoon VideoFunny Cartoon VideoBut, it Makes a Good PointBut, it Makes a Good Point

https://www.youtube.com/watch?v=tmOGJVDvJaQ

2 minutes

04/13/23 UNIVERSITY OF WISCONSIN 5

Page 6: Information Systems Security 365/765 UW-Madison

Four Major PhysicalFour Major PhysicalSecurity ThreatsSecurity Threats

Natural environmentalSupply systemHuman madePolitically motivated

Good security program protects against all of these, in layers

04/13/23 UNIVERSITY OF WISCONSIN 6

Page 7: Information Systems Security 365/765 UW-Madison

Physical ThreatsPhysical ThreatsNatural / EnvironmentalNatural / Environmental

Floods, earthquakes, storms, volcanoes

04/13/23 UNIVERSITY OF WISCONSIN 7

Page 8: Information Systems Security 365/765 UW-Madison

Physical ThreatsPhysical ThreatsSupply SystemSupply System

Power, communications, supply of water, etc.

04/13/23 UNIVERSITY OF WISCONSIN 8

Page 9: Information Systems Security 365/765 UW-Madison

Physical ThreatsPhysical ThreatsHuman MadeHuman Made

Unauthorized access, damage by angry employees, employee errors and accidents, vandalism, fraud, theft

04/13/23 UNIVERSITY OF WISCONSIN 9

Page 10: Information Systems Security 365/765 UW-Madison

Physical ThreatsPhysical ThreatsPolitically Motivated Politically Motivated

ThreatsThreatsStrikes, riots, civil disobedience, terrorist attacks, bombings

04/13/23 UNIVERSITY OF WISCONSIN 10

Page 11: Information Systems Security 365/765 UW-Madison

What Constitutes a GoodWhat Constitutes a GoodSecurity PlanSecurity Plan

Crime and disruption through deterrence

Fences, security guards, warning signs, etc.

04/13/23 UNIVERSITY OF WISCONSIN 11

Page 12: Information Systems Security 365/765 UW-Madison

What Constitutes a GoodWhat Constitutes a GoodSecurity PlanSecurity Plan

Reduction of damage through use of delaying mechanisms

Layers of defenses that slow down the adversary, such as locks, security personnel, barriers

04/13/23 UNIVERSITY OF WISCONSIN 12

Page 13: Information Systems Security 365/765 UW-Madison

What Constitutes a GoodWhat Constitutes a GoodSecurity PlanSecurity Plan

Crime or disruption detection

Smoke detectors, motion detectors, surveillance cameras, etc

04/13/23 UNIVERSITY OF WISCONSIN 13

Page 14: Information Systems Security 365/765 UW-Madison

What Constitutes a GoodWhat Constitutes a GoodSecurity PlanSecurity Plan

Incident assessment

Response of personnel to quickly evaluate situation and damage level

04/13/23 UNIVERSITY OF WISCONSIN 14

Page 15: Information Systems Security 365/765 UW-Madison

What Constitutes a GoodWhat Constitutes a GoodSecurity PlanSecurity Plan

Rapid response procedures

Fire suppression systems, emergency response systems, law enforcement notification

04/13/23 UNIVERSITY OF WISCONSIN 15

Page 16: Information Systems Security 365/765 UW-Madison

5 Core Steps in a Physical5 Core Steps in a PhysicalSecurity SystemSecurity System

DeterDelayDetectAssessRespond

04/13/23 UNIVERSITY OF WISCONSIN 16

Page 17: Information Systems Security 365/765 UW-Madison

Sidewalk, Lights andSidewalk, Lights andLandscaping For ProtectionLandscaping For Protection

04/13/23 UNIVERSITY OF WISCONSIN 17

Page 18: Information Systems Security 365/765 UW-Madison

Physical Access ControlPhysical Access ControlFor VisitorsFor Visitors

Limit the number of entry pointsForce all guests to sign-in at a common locationReduce entry points even more, after hours and on weekendsValidate a government issued picture ID before allowing entryRequire all guests to be escorted by a full time employeeEncourage employees to question strangers

04/13/23 UNIVERSITY OF WISCONSIN 18

Page 19: Information Systems Security 365/765 UW-Madison

Natural SurveillanceNatural Surveillance

Natural Surveillance is the intentional and visible surveillance, to make potential criminals aware that they are being watch and make all others feel safe

04/13/23 UNIVERSITY OF WISCONSIN 19

Page 20: Information Systems Security 365/765 UW-Madison

Territorial ReinforcementTerritorial Reinforcement

Building facilities in such a way as you make people feel secure, open, visible, strong, etc.

04/13/23 UNIVERSITY OF WISCONSIN 20

Page 21: Information Systems Security 365/765 UW-Madison

Selecting a Facility SiteSelecting a Facility Site

Visibility – Terrain, neighbors, populationSurrounding area – Crime, riots, police, medical, fire, other hazzardsAccessibility – Road access, traffic, airport access, etcNatural Disasters – floods, tornadoes, earthquakes, rain, etc

04/13/23 UNIVERSITY OF WISCONSIN 21

Page 22: Information Systems Security 365/765 UW-Madison

Entry PointsEntry Points

Windows and doors are the standard access points. They should be secure, strong, foolproof

Walls should be at least as strong as the doors and windows

04/13/23 UNIVERSITY OF WISCONSIN 22

Page 23: Information Systems Security 365/765 UW-Madison

A Human TrapA Human Trap

Only allows one person into a secure area at a timeOpen first door, enterWait for first door to closeEnter second door to secure areaOnly enough space for one person at a time

04/13/23 UNIVERSITY OF WISCONSIN 23

Page 24: Information Systems Security 365/765 UW-Madison

Don’t Forget AboutDon’t Forget Aboutthe Ceilingthe Ceiling

04/13/23 UNIVERSITY OF WISCONSIN 24

Page 25: Information Systems Security 365/765 UW-Madison

In Computer FacilitiesIn Computer FacilitiesWater Detectors Are Water Detectors Are

ImportantImportantWater detectors should be placed under raised floors and on ceilings

04/13/23 UNIVERSITY OF WISCONSIN 25

Page 26: Information Systems Security 365/765 UW-Madison

Laptops Are One of theLaptops Are One of theMost Frequently Stolen Most Frequently Stolen

Physical AssetsPhysical AssetsInventory the laptopsHarden the Operating systemPassword protect BIOSRegister laptops with vendorDon’t check laptop as baggage!Don’t leave laptop unattendedEngrave the laptop visiblyUse a physical cable and lockBackup dataEncrypt hard diskStore in secure place when not in use

04/13/23 UNIVERSITY OF WISCONSIN 26

Page 27: Information Systems Security 365/765 UW-Madison

Electric PowerElectric Power

Electricity is the lifeline of the companyUse multiple supply circuits coming into the facilityFilter power for a clean electrical signal, important for computersHave a backup generator, test it regularlyHave an appropriately sized battery backup power supply (UPS)Test EVERYTHING, test OFTEN

04/13/23 UNIVERSITY OF WISCONSIN 27

Page 28: Information Systems Security 365/765 UW-Madison

Keep All Wiring OrganizedKeep All Wiring OrganizedOn Computer EquipmentOn Computer Equipment

Reduces confusionMakes troubleshooting easierLower risk of fire hazardLower risk of electrical interferenceLooks professional and trustworthy, in case visitors come throughUse shielded cabling to stop electrical interferenceDon’t run electrical wiring close to fluorescent lighting

04/13/23 UNIVERSITY OF WISCONSIN 28

Page 29: Information Systems Security 365/765 UW-Madison

An Example of WhatAn Example of WhatNot to DoNot to Do

04/13/23 UNIVERSITY OF WISCONSIN 29

Page 30: Information Systems Security 365/765 UW-Madison

Make Sure All Utility LinesMake Sure All Utility LinesHave Emergency Shutoff Have Emergency Shutoff

ValvesValves

04/13/23 UNIVERSITY OF WISCONSIN 30

Page 31: Information Systems Security 365/765 UW-Madison

Static Electricity, theStatic Electricity, theInvisible EnemyInvisible Enemy

Protect against static electricity, which can destroy computer equipment:Antistatic flooringHumidity levels should be kept moderateUse proper electrical groundingNo carpeting, ever!!!Use anti-static bands on wrist when working on a computer server04/13/23 UNIVERSITY OF WISCONSIN 31

Page 32: Information Systems Security 365/765 UW-Madison

HVAC – Heating, HVAC – Heating, Ventilation,Ventilation,

Air ConditioningAir ConditioningImportant to have commercial grade systems to keep temperature are proper level, and keep air filtered and circulating

04/13/23 UNIVERSITY OF WISCONSIN 32

Page 33: Information Systems Security 365/765 UW-Madison

Every Good CompanyEvery Good CompanyIs Full of LiebertIs Full of Liebert

04/13/23 UNIVERSITY OF WISCONSIN 33

Page 34: Information Systems Security 365/765 UW-Madison

Water Sprinkler SystemsWater Sprinkler Systems

There are two types:Wet Pipe – always contains waterAdvantage – always ready for useDisadvantage – most costly, possibility of accidental release of waterDry Pipe – has to be connected to a tankAdvantage – no risk of accidental water releaseDisadvantage – not ready immediately

04/13/23 UNIVERSITY OF WISCONSIN 34

Page 35: Information Systems Security 365/765 UW-Madison

Other Security ControlsOther Security Controls

Fences – different heights, strengthsBollards – those odd looking posts in front of Best BuyLighting – one of the best deterrents around, cheap and effectiveLocks – usually easy to defeat, but good as once layer of security for defense in depth strategyCCTV – Efficient for monitoring04/13/23 UNIVERSITY OF WISCONSIN 35

Page 36: Information Systems Security 365/765 UW-Madison

Auditing Physical AccessAuditing Physical AccessCritical Pieces of Critical Pieces of

InformationInformationThe date and time of the access attemptThe entry point at which access was attemptedThe user ID associated with the access attemptAny unsuccessful attempts, especially if done during unauthorized hours

04/13/23 UNIVERSITY OF WISCONSIN 36

Page 37: Information Systems Security 365/765 UW-Madison

Tests and DrillsTests and Drills

Need to be developedMust be put into action, at least once per year, generally speakingMust be documentedMust be put in easily accessible placesPeople must be assigned specific tasksPeople should be taught and informed on how to fulfill specific tasksDetermine in advance what will determine success

04/13/23 UNIVERSITY OF WISCONSIN 37

Page 38: Information Systems Security 365/765 UW-Madison

A Note About Credit CardA Note About Credit CardReader Physical SecurityReader Physical Security

https://www.youtube.com/watch?v=XipjYIbBj7k

Physical access to credit card transaction equipment is one of the greatest physical security threats facing most small businesses in the United States, but most people never give it a second thought

04/13/23 UNIVERSITY OF WISCONSIN 38

Page 39: Information Systems Security 365/765 UW-Madison

04/13/23 UNIVERSITY OF WISCONSIN 39

Page 40: Information Systems Security 365/765 UW-Madison

04/13/23 UNIVERSITY OF WISCONSIN 40

Page 41: Information Systems Security 365/765 UW-Madison

04/13/23 UNIVERSITY OF WISCONSIN 41

Page 42: Information Systems Security 365/765 UW-Madison

04/13/23 UNIVERSITY OF WISCONSIN 42

Page 43: Information Systems Security 365/765 UW-Madison

04/13/23 UNIVERSITY OF WISCONSIN 43

Page 44: Information Systems Security 365/765 UW-Madison

04/13/23 UNIVERSITY OF WISCONSIN 44

Page 45: Information Systems Security 365/765 UW-Madison

04/13/23 UNIVERSITY OF WISCONSIN 45

Page 46: Information Systems Security 365/765 UW-Madison

04/13/23 UNIVERSITY OF WISCONSIN 46

Page 47: Information Systems Security 365/765 UW-Madison

04/13/23 UNIVERSITY OF WISCONSIN 47

Page 48: Information Systems Security 365/765 UW-Madison

04/13/23 UNIVERSITY OF WISCONSIN 48

Page 49: Information Systems Security 365/765 UW-Madison

04/13/23 UNIVERSITY OF WISCONSIN 49

Page 50: Information Systems Security 365/765 UW-Madison

04/13/23 UNIVERSITY OF WISCONSIN 50

Page 51: Information Systems Security 365/765 UW-Madison

04/13/23 UNIVERSITY OF WISCONSIN 51

Page 52: Information Systems Security 365/765 UW-Madison

04/13/23 UNIVERSITY OF WISCONSIN 52

Page 53: Information Systems Security 365/765 UW-Madison

04/13/23 UNIVERSITY OF WISCONSIN 53

Page 54: Information Systems Security 365/765 UW-Madison

04/13/23 UNIVERSITY OF WISCONSIN 54

Page 55: Information Systems Security 365/765 UW-Madison

04/13/23 UNIVERSITY OF WISCONSIN 55

Page 56: Information Systems Security 365/765 UW-Madison

04/13/23 UNIVERSITY OF WISCONSIN 56

Page 57: Information Systems Security 365/765 UW-Madison

04/13/23 UNIVERSITY OF WISCONSIN 57

Page 58: Information Systems Security 365/765 UW-Madison

04/13/23 UNIVERSITY OF WISCONSIN 58

Page 59: Information Systems Security 365/765 UW-Madison

04/13/23 UNIVERSITY OF WISCONSIN 59

Page 60: Information Systems Security 365/765 UW-Madison

04/13/23 UNIVERSITY OF WISCONSIN 60

Page 61: Information Systems Security 365/765 UW-Madison

04/13/23 UNIVERSITY OF WISCONSIN 61

Page 62: Information Systems Security 365/765 UW-Madison

04/13/23 UNIVERSITY OF WISCONSIN 62

Page 63: Information Systems Security 365/765 UW-Madison

04/13/23 UNIVERSITY OF WISCONSIN 63