physical security slk

Upload: shreyansagrawal

Post on 09-Jan-2016

23 views

Category:

Documents


0 download

DESCRIPTION

Security

TRANSCRIPT

  • ITNS and CERIAS CISSP Luncheon Series: Physical (Environmental) SecurityPresented by Scott L. Ksander

  • Physical SecurityFrom (ISC)2 Candidate Information Bulletin:The Physical (Environmental) Security domain addresses the threats, vulnerabilities, and countermeasures that can be utilized to physically protect an enterprises resources and sensitive information. These resources include people, the facility in which they work, and the data, equipment, support systems, media, and supplies they utilize.

  • Physical SecurityFrom (ISC)2 Candidate Information Bulletin:The candidate will be expected to know the elements involved in choosing a secure site, its design and configuration, and the methods for securing the facility against unauthorized access, theft of equipment and information, and the environmental and safety measures needed to protect people, the facility, and its resources.

  • IntroductionThreats to physical security include:Interruption of servicesTheftPhysical damageUnauthorized disclosureLoss of system integrity

  • IntroductionThreats fall into many categories:Natural environmental threats (e.g., floods, fire)Supply system threats (e.g., power outages, communication interruptions)Manmade threats (e.g., explosions, disgruntled employees, fraud)Politically motivated threats (e.g., strikes, riots, civil disobedience)

  • IntroductionPrimary consideration in physical security is that nothing should impede life safety goals.Ex.: Dont lock the only fire exit door from the outside.Safety: Deals with the protection of life and assets against fire, natural disasters, and devastating accidents.Security: Addresses vandalism, theft, and attacks by individuals.

  • Physical Security PlanningPhysical security, like general information security, should be based on a layered defense model.Layers are implemented at the perimeter and moving toward an asset.Layers include: Deterrence, Delaying, Detection, Assessment, Response

  • Physical Security PlanningA physical security program must address:Crime and disruption protection through deterrence (fences, security guards, warning signs, etc.).Reduction of damages through the use of delaying mechanisms (e.g., locks, security personnel, etc.).Crime or disruption detection (e.g., smoke detectors, motion detectors, CCTV, etc.).Incident assessment through response to incidents and determination of damage levels.Response procedures (fire suppression mechanisms, emergency response processes, etc.).

  • Physical Security PlanningCrime Prevention Through Environmental Design (CPTED)Is a discipline that outlines how the proper design of a physical environment can reduce crime by directly affecting human behavior.Concepts developed in 1960s.Think: Social Engineering

  • Physical Security PlanningCPTED has three main strategies:Natural Access ControlNatural SurveillanceTerritorial Reinforcement

  • Physical Security PlanningNatural Access ControlThe guidance of people entering and leaving a space by the placement of doors, fences, lighting, and landscapingBe familiar with: bollards, use of security zones, access barriers, use of natural access controls

  • Physical Security PlanningNatural SurveillanceIs the use and placement of physical environmental features, personnel walkways, and activity areas in ways that maximize visibility.The goal is to make criminals feel uncomfortable and make all other people feel safe and comfortable, through the use of observation.

  • Physical Security PlanningTerritorial ReinforcementCreates physical designs that highlight the companys area of influence to give legitimate owners a sense of ownership.Accomplished through the use of walls, lighting, landscaping, etc.

  • Physical Security PlanningCPTED is not the same as target hardeningTarget hardening focuses on denying access through physical and artificial barriers (can lead to restrictions on use, enjoyment, and aesthetics of the environment).

  • Physical Security PlanningIssues with selecting a facility site:Visibility (terrain, neighbors, population of area, building markings)Surrounding area and external factors (crime rate, riots, terrorism, first responder locations)Accessibility (road access, traffic, proximity to transportation services)Natural Disasters (floods, tornados, earthquakes)

  • Physical Security PlanningOther facility considerations:Physical construction materials and structure compositionBe familiar with: load, light frame construction material, heavy timber construction material, incombustible material, dire resistant material (know the fire ratings and construction properties).

  • Physical Security PlanningMantrap: A small room with two doors. The first door is locked; a person is identified and authenticated. Once the person is authenticated and access is authorized, the first door opens and allows the person into the mantrap. The person has to be authenticated again in order to open the second door and access a critical area. The mantrap area could have a weight sensing floor as an additional control to prevent literal piggybacking.

  • Physical Security PlanningAutomatic door lock configuration:Fail safe: If a power disruption occurs, the door defaults to being unlocked.Fail secure: If a power disruption occurs, the door defaults to being locked.

  • Physical Security PlanningWindows can also be used to promote physical security.Know the different types of glass:StandardTemperedAcrylicWiredLaminatedSolar Window FilmSecurity Film

  • Physical Security PlanningConsider use of internal partitions carefully:True floor to true ceiling to counter security issuesShould never be used in areas that house sensitive systems and devices

  • Internal Support SystemsPower issues:A continuous supply of electricity assures the availability of company resources.Data centers should be on a different power supply from the rest of the buildingRedundant power supplies: two or more feeds coming from two or more electrical substations

  • Internal Support SystemsPower protection:UPS SystemsOnline UPS systemsStandby UPS SystemPower line conditionersBackup Sources

  • Internal Support SystemsOther power terms to know:GroundNoiseTransient NoiseInrush CurrentClean PowerEMIRFI

  • Internal Support SystemsTypes of Voltage FluctuationsPower ExcessSpikeSurgePower LossFault BlackoutPower DegradationSag/dipBrownoutInrush Current

  • Internal Support SystemsEnvironmental IssuesPositive DrainsStatic ElectricityTemperature

  • Internal Support SystemsEnvironmental Issues: Positive DrainsContents flow out instead of inImportant for water, steam, gas lines

  • Internal Support SystemsEnvironmental Issues: Static ElectricityTo prevent:Use antistatic flooring in data processing areasEnsure proper humidityProper groundingNo carpeting in data centersAntistatic bands

  • Internal Support SystemsEnvironmental Issues: TemperatureComputing components can be affected by temperature:Magnetic Storage devices: 100 Deg. F.Computer systems and peripherals: 175 Deg. F.Paper products: 350 Deg. F.

  • Internal Support SystemsVentilationAirborne materials and particle concentration must be monitored for inappropriate levels.Closed LoopPositive Pressurization

  • Internal Support SystemsFire prevention, detection, suppressionFire Prevention: Includes training employees on how to react, supplying the right equipment, enabling fire suppression supply, proper storage of combustible elementsFire Detection: Includes alarms, manual detection pull boxes, automatic detection response systems with sensors, etc.Fire Suppression: Is the use of a suppression agent to put out a fire.

  • Internal Support SystemsAmerican Society for Testing and Materials (ASTM) is the organization that creates the standards that dictate how fire resistant ratings tests should be carried out and how to properly interpret results.

  • Internal Support SystemsFire needs oxygen and fuel to continue to grow.Ignition sources can include the failure of an electrical device, improper storage of materials, malfunctioning heating devices, arson, etc.Special note on plenum areas: The space above drop down ceilings, wall cavities, and under raised floors. Plenum areas should have fire detectors and should only use plenum area rated cabling.

  • Internal Support SystemsTypes of Fire:A: Common CombustiblesElements: Wood products, paper, laminatesSuppression: Water, foamB: LiquidElements: Petroleum products and coolantsSuppression: Gas, CO2, foam, dry powdersC: ElectricalElements: Electrical equipment and wiresSuppression: Gas, CO2, dry powdersD: Combustible MetalsElements: magnesium, sodium, potassiumSuppression: Dry powderK: Commercial KitchensElements: Cooking oil firesSuppression: Wet chemicals such as potassium acetate.

  • Internal Support SystemsTypes of Fire DetectorsSmoke ActivatedHeat Activated

    Know the types and properties of each general category.

  • Internal Support SystemsDifferent types of suppression agents:WaterHalon and halon substitutesFoamsDry PowdersCO2Soda Acid

    Know suppression agent properties and the types of fires that each suppression agent combatsKnow the types of fire extinguishers (A,B,C, D) that combat different types of fires

  • Internal Support SystemsTypes of SprinklersWet Pipe Systems (aka Closed Head System)Dry Pipe SystemsPreaction SystemsDeluge Systems

  • Perimeter SecurityThe first line of defense is perimeter control at the site location, to prevent unauthorized access to the facility.Perimeter security has two modes:Normal facility operationFacility closed operation

  • Perimeter SecurityProximity protection components put in place to provide the following services:Control of pedestrian and vehicle trafficVarious levels of protection for different security zonesBuffers and delaying mechanisms to protect against forced entryLimit and control entry points

  • Perimeter SecurityProtection services can be provided by:Access Control MechanismsPhysical BarriersIntrusion DetectionAssessmentResponseDeterrents

  • Perimeter SecurityFences are first line of defence mechanisms. (Small Joke!)Varying heights, gauge, and mesh provides security features (know them).Barbed wire direction makes a difference.

  • Perimeter SecurityPerimeter Intrusion Detection and Assessment System (PIDAS): A type of fencing that has sensors on the wire mesh and base of the fence. A passive cable vibration sensor sets off an alarm if an intrusion is detected.

  • Perimeter SecurityGates have 4 distinct types:Class I: Residential usageClass II: Commercial usage, where general public access is expected (e.g., public parking lot, gated community, self storage facility)Class III: Industrial usage, where limited access is expected (e.g., warehouse property entrance not intended to serve public)Class IV: Restricted access (e.g., a prison entrance that is monitored either in person or via CCTV)

  • Perimeter SecurityLocks are inexpensive access control mechanisms that are widely accepted and used.Locks are considered delaying devices.Know your locks!

  • Perimeter SecurityTypes of LocksMechanical LocksWarded & TumblerCombination LocksCipher Locks (aka programmable locks)Smart locksDevice LocksCable locks, switch controls, slot locks, port controls, peripheral switch controls, cable traps

  • Perimeter SecurityLock Strengths:Grade 1 (commercial and industrial use)Grade 2 (heavy duty residential/light duty commercial)Grade 3 (residential and consumer expendable)Cylinder CategoriesLow Security (no pick or drill resistance)Medium Security (some pick resistance)High Security (pick resistance through many different mechanismsused only in Grade 1 & 2 locks)

  • Perimeter SecurityLightingKnow lighting terms and types of lighting to use in different situations (inside v. outside, security posts, access doors, zones of illumination)It is important to have the correct lighting when using various types of surveillance equipment. Lighting controls and switches should be in protected, locked, and centralized areas.

  • Perimeter SecurityContinuous lighting: An array of lights that provide an even amount of illumination across an area.Controlled lighting: An organization should erect lights and use illumination in such a way that does not blind its neighbors or any passing cars, trains, or planes. Standby Lighting: Lighting that can be configured to turn on and off at different times so that potential intruders think that different areas of the facility are populated. Redundant or backup lighting: Should be available in case of power failures or emergencies.Response Area Illumination: Takes place when an IDS detects suspicious activities and turns on the lights within the specified area.

  • Perimeter SecuritySurveillance DevicesThese devices usually work in conjunction with guards or other monitoring mechanisms to extend their capacity.Know the factors in choosing CCTV, focal length, lens types (fixed v. zoom), iris, depth of field, illumination requirements

  • Perimeter SecurityFocal length: The focal length of a lens defines its effectiveness in viewing objects from a horizontal and vertical view.The sizes of images that will be shown on a monitor along with the area that can be covered by one camera are defined by focal length. Short focal length = wider angle viewsLong focal length = narrower views

  • Perimeter SecurityDepth of field: Refers to the portion of the environment that is in focusShallow depth of focus: Provides a softer backdrop and leads viewers to the foreground objectGreater depth of focus: Not much distinction between objects in the foreground and background.

  • Perimeter SecurityIntrusion Detection systems are used to detect unauthorized entries and to alert a responsible entity to respond.Know the different types of IDS systems (electro-mechanical v. volumetric) and changes that can be detected by an IDS system.

  • Perimeter SecurityPatrol Force and GuardsUse in areas where critical reasoning skills are requiredAuditing Physical AccessNeed to log and review:Date & time of access attemptEntry pointUser IDUnsuccessful access attempts

  • Physical SecurityFinal Concept to Guide in Assessing Physical Security Issues on Exam:DeterrenceDelayDetectionAssessmentResponse

  • Physical SecurityResourcesAll in One Book (Shon Harris, 2005)Official (ISC) Guide to the CISSP CBK ((ISC), 2006)

    References are from: All in One Book (Shon Harris, 2005)

    Bollards: Short posts that are commonly used to prevent vehicular access and to protect a building or people walking on a sidewalk from vehicles. They can also be used to direct foot traffic. (346)

    Security Zones (CPTED model): Division of an environments space into zones with different security levels depending upon who needs to be in the zone and the associated risk. (347)Zones are labeled as controlled, restricted, public, or sensitive. (347)Each zone should have a specific protection level that is required of it, which will help dictates the types of controls that should be put into place. (347)

    Following controls are commonly used for access controls within different organizations: (347)Limit the number of entry pointsForce all guests to go to a front desk and sign in before entering the environmentReduce the number of entry points even further after hours or during the weekend when not as many employees are around.Have a security guard validate a picture ID before allowing entranceRequire guests to sign in and be escortedEncourage employees to question strangersAccess barriers can be naturally created (cliffs, rivers, hills), existing manmade elements (railroad tracks, highways) or artificial forms designed specifically to impede movement (fences, closing streets). (347)References are from: All in One Book (Shon Harris, 2005)

    Can prevent literal piggybacking as well.

    Piggybacking: When an individual gains unauthorized access by using someone elses legitimate credentials or access rights. The best preventative measures against this are to have security guards at access points and to educate employees about good security practices. (387)Note that fail safe and fail secure terminology can be applied to other types of access control defaults, not merely terms for doors.

    References are from: All in One Book (Shon Harris, 2005) pg. 358

    Standard: No extra protection. Cheapest and lowest level of protection.

    Tempered: Glass is heated and then cooled suddenly to increase its integrity and strength. 5-7x stronger than regular glass.

    Acrylic: Type of plastic instead of glass. Polycarbonate acrylics are stronger than regular acrylics.Produces toxic fumes if burned, may be prohibited by fire codes.Very expensive.

    Wired: mesh of wire is embedded between two sheets of glass. This wire helps to prevent the glass from shattering.

    Laminated: Plastic layer between two outer glass layers. Plastic layer helps to increate the strength against breakage.The greater the depth, the more difficult to break.

    Solar window film: Provides extra security by being tinted and extra strength through the films material.

    Security film: Transparent film is applied to the glass to increase its strength.References are from: All in One Book (Shon Harris, 2005) pg. 358

    Power protection (365)There are three main methods of protecting against power problems: (365)

    UPS Online UPS systems: Use AC line voltage to charge a bank of batteries. When in use the UPS has an inverter that changes the DC output from the batteries into the required AC form and regulates the voltage as it powers computer devices. (365)Have the normal primary power passing though them day in and day out. The constantly provide power from their own inverters, even when the electric power is in proper use. This UPS device is able to quickly detect when power failure takes place and can provide the necessary electricity and pick up the load after a power failure much more quickly then a standby UPS. (366)Standby UPS: Devices stay inactive until the power fails. The system has sensors that detect a power failure, and the load is then switched to the battery pack. (366)UPS factors that should be reviewed are the size of the electrical load the UPS can support, the speed with which it can assume the load when the primary source fails, and the amount of time it can support the load. (403)

    Power Line Conditioners

    Backup SourcesAre necessary when there is a power failure and the outage will last longer than a UPS can last. Backup supplies can be a redundant line from another electrical substation, or from a motor generator, and can be used to supply main power or charge the batteries in a UPS system. (366)References are from: All in One Book (Shon Harris, 2005) pg. 358

    Ground: The pathway to the earth to enable excess voltage to dissipate. (367)

    Noise: Electromagnetic or frequency interference that disrupts the power flow and can cause fluctuations. (367)

    Transient Noise: Short duration of power line disruption. (367)

    Inrush Current: The initial surge of current required when there is an increase in power demand. (367)

    Clean power: Electrical current that does not fluctuate. (367)

    Types of interference (line noise): (366)

    EMI: Electromagnetic interference (367) Created by the difference between three wires: hot, neutral and ground and the magnetic field that they create. Lightning and electric motors can induce EMI. (366)

    RFI: Radio frequency interference (367) Can be caused by anything that creates radio waves. Fluorescent lighting is one of the main causes of RFI within buildings today. (366)References are from: All in One Book (Shon Harris, 2005) pg. 358

    Power ExcessSpike: Momentary high voltageSurge: Prolonged high voltage

    Power LossFault : Momentary power lossBlackout: Sustained power loss

    Power DegredationSag/dip: Momentary low voltage condition, from one cycle to a few seconds. Brownout: Prolonged power supply that is below normal voltage. Inrush Current: The initial surge of current required to start a load.

    References are from: All in One Book (Shon Harris, 2005)

    Hygrometer: Used to monitor humidity. (372)

    High humidity can cause corrosion and low humidity can cause static electricityReferences are from: All in One Book (Shon Harris, 2005)

    Hygrometer: Used to monitor humidity. (372)References are from: All in One Book (Shon Harris, 2005)

    Closed Loop: means that the air within the building is reused after it has been properly filtered, instead of bringing outside air in. (373) Should be used to maintain air quality. (373)

    Positive pressurization: Means that when an employee opens a door, the air goes out and outside area does not come in. (373) Positive pressurization and ventilation should be implemented to control contamination. (373)References are from: All in One Book (Shon Harris, 2005)

    **Need to know the fire resistant ratings that are used in the study guides.E.g., 5/8 inch thick drywall sheet installed on each side of a wood stud provides a one hour rating. If the thickness of the drywall were doubled, it would be a two hour rating.

    Fire resistance represents the ability of a laboratory constructed assembly to contain fire for a specific period of time. References are from: All in One Book (Shon Harris, 2005)

    Smoke activated detectors (375)Good for early warning devices (375)Can be used to sound a warning alarm before the suppression system activates (375)

    Photoelectric Device (aka optical detector): Detects variation in light intensity. The detector produces a beam of light across a protected area, and if the beam is obstructed, the alarm sounds. (375)

    Heat Activated (376)Can be configured to sound an alarm either when a predefined temperature (fixed temperature) is reached or when the temperature increases over a period of time (rate of rise). (376)

    Rate of rise temperature sensors usually provide a quicker warning that fixed temperature sensors because they are more sensitive (but they can also sound more false alarms). (376)References are from: All in One Book (Shon Harris, 2005)

    Water: Works by reducing temperature. (378)

    Halon and halon substitutes: Works by interfering with the chemical combustion of elements with a fire. (378)Halon depletes the ozone and when used on extremely hot fires degrades into toxic chemicals. (378)Was prohibited in Montreal Protocol in 1987 and has not been manufactured since 1992.FM-200 is a halon substitute. (404)

    Foams: Mainly water based and contain a foaming agent that allows them to float on top of a burning substance to exclude oxygen. (377)

    Dry powders: Used mainly for class B and C fires.Sodium or potassium bicarbonate, calcium carbonate: interrupts the chemical combustion of a fire. (377)Monoammonium phosphate: Excludes oxygen from the fuel. (377)

    CO2: Works by removing oxygen. (378)Colorless, odorless (404)Good for putting fires out, but bad for life forms because it removes oxygen from the air. A suppression system using this agent should have a delay mechanism. (377)Best used in unattended areas or facilities. (377)

    Soda Acid (378): Works by removing fuel. (378)

    Class A extinguishers are for ordinary combustible materials such as paper, wood, cardboard, and most plastics. The numerical rating on these types of extinguishers indicates the amount of water it holds and the amount of fire it can extinguish. Class B fires involve flammable or combustible liquids such as gasoline, kerosene, grease and oil. The numerical rating for class B extinguishers indicates the approximate number of square feet of fire it can extinguish. Class C fires involve electrical equipment, such as appliances, wiring, circuit breakers and outlets. Never use water to extinguish class C fires - the risk of electrical shock is far too great! Class C extinguishers do not have a numerical rating. The C classification means the extinguishing agent is non-conductive. Class D fire extinguishers are commonly found in a chemical laboratory. They are for fires that involve combustible metals, such as magnesium, titanium, potassium and sodium. These types of extinguishers also have no numerical rating, nor are they given a multi-purpose rating - they are designed for class D fires only. References are from: All in One Book (Shon Harris, 2005)

    Wet Pipe Systems (aka Closed Head System): Always contain water in the pipes and are usually discharged by temperature control level sensors. One disadvantage is that the water in pipes may freeze in colder climates. Also, nozzle or pipe break could cause severe water damage. (379)

    Dry Pipe Systems: Water is not actually held in pipes, it is contained in a holding tank until released. The pipes contain pressurized air, which is reduced when a fire or smoke alarm is activated, allowing the water value to be opened by the water pressure. Best used in colder climates because the pipes will not freeze. (379) Actual fire must be detected, usually by a heat or smoke senor being activated. (379)

    Preaction Systems: Similar to dry pipe systems in that the water is not held in pipes but is released when the pressurized air within the pipes is reduced. In this system water is not released right away, but will be released when a thermal-fusible link on the sprinkler head melts. (380) This gives people more time to respond to small fires or false alarms that can be handled by other means. (380)

    Deluge System: Has its sprinkler heads wide open to allow for a larger volume of water to be released in a shorter period. (380) Not usually used in data processing environments. (380)References are from: All in One Book (Shon Harris, 2005)

    Access control mechanisms: Locks and keys, electronic card access, personnel awareness.

    Physical barriers: Fences, gates, walls, doors, windows, protected vents, vehicle barriers.

    Intrusion Detection: Perimeter sensors, interior sensors, annunciation mechanisms

    Assessment: guards, CCTV cameras.

    Response: Guards, local law enforcement

    Deterrents: Signs, lighting, environmental designReferences are from: All in One Book (Shon Harris, 2005)

    Fence posts should be buried deep in ground and secured with concrete to ensure that they cannot be dug up or pulled out with vehicles. (390)

    3-4 ft high: Only deter casual trespassers6-7 ft high: Considered too high to climb easily8 ft high w/ strands of barbed or razor write at the top: serious property protection, may deter the more determined intruder.

    Fencing gauge & mesh: (390) The lower the gauge number, the thicker the wire diameter:11 gauge = .120 inch diameter9 gauge = .148 inch diameter6 gauge = .192 inch diameter

    Mesh sizingTypically are 2 inch, 1 inch, 3/8 inch.It is more difficult to climb fences with smaller mesh sizes.

    Strength levels of the most common gauge and mesh sizes used in fencing industry:Extremely high security: 3/8 in. mesh, 11 gaugeVery high security: 1 inch mesh, 9 gaugeHigh security: 1 inch mesh, 11 gaugeGreater security: 2 inch mesh, 6 gaugeNormal industrial security: 2 inch mesh, 9 gauge

    Barbed wire tilted in (e.g. prison): makes it harder for people to get out. (390)Barbed wire tilted out (e.g. military base): makes it harder for people to get in. (390)References are from: All in One Book (Shon Harris, 2005)

    Each gate classification has a long list of implementation and maintenance guidelines to ensure the necessary level of protection. Guidelines are developed by Underwriters Laboratory (UL) which is a nonprofit organization that tests, inspects and classified electronic devices, fire protection equipment, and specific construction materials. (391)

    For physical security realm, we look to UL for best practices and industry standards. (391)

    Bollards: small concrete pillars places next to sides of buildings that have the most immediate threat of someone driving a vehicle through an exterior wall. (391)References are from: All in One Book (Shon Harris, 2005)

    Two main types of mechanical locks: (382)Warded Lock: Basic padlock. These are the cheapest locks, and because of their lack of sophistication, are the easiest to pick. (382) See diagram page 383.Tumbler Lock: Has more pieces and parts than a warded lock.Three types: (383)Pin TumblerMost commonly used tumbler lock. (383)Wafer Tumbler (aka disc tumbler locks)Does not provide much protection because it can be easily circumvented. (383)Often used as car or desk locks. (383)Lever Tumbler

    Combination Locks: Require the correct combination of numbers to unlock them. (384)

    Cipher Locks (aka Programmable Locks): Keyless and use a keypad to control access into an area or facility. Compared to traditional locks, provide a much higher level of security and control of who can access a facility. (384)Smart Locks: More sophisticated cipher locks that allow for specific codes to be assigned to unique individuals. Allows entry and exit activities to be logged by person. (385)Functionalities available on many cipher combination locks that improve access controls and security: (384-85)Door Delay: If a door is held open for a given time, an alarm will trigger to alert personnel of suspicious activity. (384)Key Override: A specific combination can be programmed to be used in emergency situations to override normal procedures or for supervisory overrides. (384)Master Keying: Enables supervisory personnel to change access codes and other features of the cipher lock. (385)Hostage Alarm: If an individual is under duress and/or held hostage, a combination he enters can communicate this situation to the guard station or police station. (385)

    Device Locks (385)Cable Locks: consist of a vinyl coated steel cable that can secure a computer or peripheral to a desk or other stationary component. (385)Switch Controls: Cover on/off power switches. (386)Slot Locks: Secure the system to a stationary component by the use of steel cable that is connected to a bracket that is mounted in a spare expansion slot. (386)Port Controls: Block Access to disk drives or unused serial or parallel ports. (386)Peripheral Switch Controls: Secure a keyboard by inserting an on/off switch between the system unit and the keyboard input slot. (386)Cable traps: prevent the removal of input/output devices by passing their cables through a lockable unit. (386)References are from: All in One Book (Shon Harris, 2005)

    Continuous lighting: An array of lights that provides an even amount of illumination across an area. (393)Controlled lighting: An organization should erect lights and use illumination in such a way that does not blind its neighbors or any passing cars, trains, or planes. (393)Standby Lighting: Lighting that can be configured to turn on and off at different times so that potential intruders think that different areas of the facility are populated. (393)Redundant or backup lighting should be available in case of power failures or emergencies.Response Area Illumination: Takes place when an IDS detects suspicious activities and turns on the lights within the specified area. (393)Annunciator system: An indicator that listens for noise and activates electrical devices. Will alert a security guard if movement is detected on a screen. (397)Depth of field varies depending upon the size of the lens opening, the distance of the object being focused upon, and the focal length of the lens. (396)Increases as the size of the lens opening decreases, the subject distance increases, or the focal length of the lens decreases.So if you want to cover a large area and not focus on specific items use a: Wide angle lens (short focal length) with a Small lens openingIDS Characteristics:Expensive and requires human intervention to respond to alarmsRedundant power supply and emergency backup power are necessaryCan be linked to a centralized security systemShould have a fail safe configuration, which should default to activatedShould detect and be resistant to tampering

    IDSs can be used to detect changes in the following: (398)Beams of lightSounds and vibrationsMotionDifferent types of fields (microwave, ultrasonic, and electrostatic)Electrical Circuit