1. Trang chủ
  2. » Công Nghệ Thông Tin

Chapter 7 – Physical Security pptx

82 806 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Physical Security
Tác giả Brian E. Brzezicki
Chuyên ngành Information Security
Thể loại Lecture Notes
Định dạng
Số trang 82
Dung lượng 2,5 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Physical Security Layers n/b• Deterrence – fences, guards, signs • Reducing/Avoiding damage by Delaying attackers – slow down the attackers locks, guards, barriers • Detection – motion s

Trang 1

All-In-One Edition Chapter 7 – Physical Security

Brian E Brzezicki

Trang 2

Note: A LOT of this chapter is “missing” from the book That is the book is only 12 pages I have put over 70 slides in this chapter (one of the longest) These

things you should expect to see on the exam So

pay extra attention to these slides!

Trang 3

Physical Security

Trang 4

There is NO security without

Physical Security

We spend A LOT of money on logical (technical)

security However without physical security there is

NO security Physical security is a weak link

usually!

• Attackers can walk off with machines

• If I can get physical access to your machine I will

be able to get whatever info I want or load “bad”

software on it, or even just change the

root/administrator account password!

• Plug into a network and attack it from within!

Trang 5

Some physical Security Attacks

(187)

• LiveCDs (Knoppix, BackTrack)

• USB/CDs and “auto play” – talk about this LATER

• No BIOS/Default BIOS passwords

• Disk Imaging (how?)

• Copying off sensitive data

Trang 6

Physical Security Layers (n/b)

• Deterrence – fences, guards, signs

• Reducing/Avoiding damage by Delaying attackers – slow down the attackers (locks, guards, barriers)

• Detection – motion sensors, smoke detectors

• Incident assessment – response of guards, and determination of damage level

• Response procedures – fire suppression, law

enforcement notification etc

Trang 7

Physical Security Terms and

Concepts

Trang 8

Bollards

Trang 9

Bollards (n/b)

Bollards are small concrete pillars, sometimes

containing lights or flowers

They are used to stop people from driving through

a wall, often put between a building and parking lot

They can be arranged to form a natural path for walking

Trang 10

Fencing (n/b)

Can deter and delay intruders, first line of defense

• Fences 3-4 feet high only deter casual

trespassers

• Fences 6-7 feet high are considered too high to climb easily

• Fences 8 feet high should are considered

serious Use for Critical areas

Trang 11

Walls (n/b)

You know what they are

• Choose a wall with the strength to support the security application This might also include fire rating!

Trang 12

Zones (n/b)

Fences, Walls, Bollards, etc along with access control mechanisms can be brought together to create

“security” zones Each zone has some different

security level or work type

• Example

– Lobby – low security, public access

– Offices – medium security, restricted access

– R&D – high security, extremely restricted access

(see next slide)

Trang 13

Security Zones (n/b)

• Zones are used to physically separate areas into

different security areas

•Each inner level becomes more restricted and more secure

•Stronger Access Control and Monitoring at the

entry point to each zone

Trang 14

Lighting (n/b)

Lighting is obviously important in perimeter

security It decreases the probability of criminal activity

• Each light should cover it’s own zone and there should not be gaps in the coverage

• Coverage in fact should overlap

• Lighting should be directed AWAY from the

security guards etc

Trang 15

locked and unlocked position.

• Pin tumbler – uses pins

• Wafer – uses wafer (not very secure)

Trang 16

Warded Lock (n/b)

Trang 17

Tumbler Lock (n/b)

Trang 18

• Grade 3 – residential throw away locks

There are also 3 cylinder categories

Low – no pick or drill resistance providedMedium – a little pick resistance

High – higher degree of pick resistance

Trang 19

Attacks against key type locks (n/b)

Tension wrench – shaped like an L and is used to apply tension to the cylinder, then use a pick to

manipulate the individual pins

Pick – used in conjunction with a tension wrench to manipulate the pins into place so you can turn the cylinder

Visualization next slide

Trang 20

Lock Picking

Trang 21

• Combination locks – rather than use a key, turn

Trang 22

Locks (n/b)

• Cipher locks – electronic locks

– Combination can be changed

– Combination can be different for different people

– Can work during different times of day

– Can have emergency codes

– Can have “override codes”

Trang 23

Cipher Lock

Trang 24

Man Trap (n/b)

Trang 25

• Avoids piggybacking

• Can trap intruder

Trang 26

Surveillance (n/b)

CCTVs and recording devices to record video of site

• It deters criminal activity

• Can be used later as evidence or to determine what happened

• CCTVs should generally have PTZ capability, and auto-irises

Trang 27

Intrusion Detection Systems (n/b)

IDS (physical IDS, NOT network IDS) – help detect the physical presence of an intruder

Can be multiple types

Electromechanical – traditional types, determine a opening of a window by a break in connectivity.– Vibration sensors are also electromechanical– Pressure pads are also electromechanical

Trang 28

IDS (n/b)

Photoelectric – uses light beams to detect when

something crosses the beam (slide image)

Passive Infrared (PIR) – monitors heat signatures in a room (a lot of home automatically light systems are

of this type) (slide image)

Acoustical Detection – uses sound

Proximity detector/capacitance detectors – emits a

measurable magnetic field If field is disrupted it sets off the alarm (usually this field is a very small area,

as magnetic fields disperse quickly as the area

increases)

Trang 29

Passive Infrared IDS

Passive Infrared (PIR) – monitors heat signatures in

a room (a lot of home automatic light systems are

of this type)

Trang 30

Photoelectric IDS

Photoelectric – uses light beams

to detect when something

crosses the beam

Trang 31

Personnel Access Controls

Trang 32

Personnel access controls

There are different technologies to grant access to a building, generally called an “access token”

• User activated – a user does something (swipe

cards, biometrics)

• Proximity devices/transponders – a system

recognizes the presence of an object (Electronic

access control tokens) is a generic term for proximity authentication systems)

Trang 33

Smart Cards Vs Memory cards

What is memory Cards? (see slide)

What is a smart Card? (see slide)

How are they different?

Which is more secure?

Trang 34

Memory Cards

Trang 35

Smart Card

Trang 36

Biometrics (195)

• Bio – life, metrics - measure

• Biometrics verifies (authenticates) an individuals identity by analyzing unique personal attribute (something they ARE)

• Require enrollment before being used* (what is enrollment? Any ideas)

• EXPENSIVE

• COMPLEX

Trang 37

Biometrics (195)

• Can be based on

– behavior (signature dynamics) – might change over time

– Physical attribute (fingerprints, iris, retina scans)

– We will talk about the different types of biometrics later

• Can give incorrect results

• False negative – Type 1 error* (annoying)

• False positive – Type 2 error* (very bad)

Trang 38

CER (n/b)

• Crossover Error Rate (CER)* is an important metric that is stated as a percentage that represents the point at which the false rejection rate equals the

false positive rate

• Lower number CER is better/more accurate* (3 is better than an 4)

• Also called Equal Error Rate

• Use CER to compare vendors products objectively

Trang 39

Biometrics (n/b)

• Systems can be calibrated, for example of you

adjust the sensitivity to decrease fall positives, you probably will INCREASE false negatives, this is

where the CER come in (see next slide)

• Some areas (like military) are more concerned with one error than the other (ex Would rather deny a valid user than accept an invalid user)

• Can you think of any situations for each case?

Trang 40

CER (n/b)

Trang 42

Biometric Types Overview (n/b)

We will talk in more depth of each in the next

Trang 43

Finger Print

Trang 44

Fingerprint (n/b)

• Measures ridge endings an bifurcations (changes in the qualitative or topological structure) and other

details called “minutiae”

• Full fingerprint is stored, the scanners just compute specific features and values and sends those for

verification against the real fingerprint

Trang 45

Hand Geometry (n/b)

• Overall shape of hand

• Length and width of fingers

• This is significantly different between individuals

Trang 46

Retina Scan

Trang 48

Iris Scan

Trang 49

Iris Scan (n/b)

• Measures colors

• Measures rifts

• Measures rings

• Measures furrow (wrinkle, rut or groove)

• Provides most assurance of all biometric systems

• IRIS remains constant through adulthood

• Place scanner so sun does NOT shine through aperture*

Trang 50

• Type I (what is type I again?) error high

• Type II (what is type II again?) error low

Trang 51

Keyboard dynamics (n/b)

• Measure the speeds and motions as you type,

including timed difference between characters typed For a given phrase

• This is more effective than a password believe it or not, as it is hard to repeats someone's typing style, where as it’s easy to get someone's password

Trang 52

Voice Print (n/b)

• Enrollment, you say several different phrases

• Measures speech patterns, inflection and intonation (i.e pitch and tone)

• For authentication words are jumbled

Trang 53

Facial Scan

Trang 55

• Camera on the side at an angle snaps a pictures

• Not unique enough to stand on it’s own, but can be used with hand geometry to add assurance

Trang 56

Biometrics wrap up

We covered a bunch of different biometrics

• Understand some are behavioral* based

– Voice print

– Keyboard dynamics

– Can change over time

• Some are physically based

– Fingerprint

– Iris scan

Trang 57

Biometrics wrap Up

• Fingerprints are probably the most commonly used and cheapest

• Iris scanning provides the most “assurance”

• Some methods are intrusive

• Understand Type I and Type II errors

• Be able to define CER, is a lower CER value better

or worse?

• Privacy Issues

Trang 58

Device Security

Trang 59

Device Security

Devices can be stolen

• Use a drive encryption technology such as bit locker

or encrypting file system

• Use device or port locks to secure items

• Laptops

– should be inventoried

– “Lojack” type devices should be installed

– Encrypt the Disks

(more)

Trang 60

• Disable Auto Play

• Use privacy Screen

• Securely Dispose of Devices

Trang 61

Environmental Security

Trang 63

Fire Suppression

A – Common Combustibles

• Use for: Wood, paper, laminates

• Uses water or foam as suppression agent

B – Liquid

• Use for: gas or oil fires

• Use: Gas (CO2), foam, dry powders

Trang 64

Fire Suppression

C – Electrical

• Use on: electrical equipment and wires

• Uses: Gas, CO2, dry powder

Trang 65

Fire Suppression (Halon)

Before any type of dangerous gas (Halon, CO2) is released there should be some type of warning emitted (CO2 will suffocate people)

Halon is a type of gas that used to be commonly used, it is no longer used do to CFCs (it is also dangerous to people) It was banned by the

“Montreal protocol”* in 1987 effective

replacement is FM-200 or others on top of pg

444*

Trang 66

Fire Suppression Note

HVAC system should be set to shutdown when an automatically suppression system activates

Now we need to understand automatic fire

suppression systems

Trang 67

Sprinkler Heads

The “Thermal Linkage” is often a small glass tube with colored liquid that is

designed to shatter at a fixed temperature.

The fire will heat the Thermal Linkage to its break point, at which point the water in the pipe will flow freely through the opening at a high

pressure The pressure of the water causes it to spread in a wide area when it hits the

deflector

Trang 68

Automatic fire suppression (n/b)

Sprinklers –

• Wet Pipe – high pressure water in pipe directly

above sprinkler heads

•Deluge – Type of wet pipe with a high volume of water

dispersal, not used for data centers.

Trang 69

Automatic fire suppression (n/b)

• Dry Pipe – Air in pipe overhead, water in

reservoir, released on fire detection

Trang 70

Automatic fire suppression (n/b)

• Pre action – like dry pipe, but a delay exists

before release Best for computer rooms if a

water based system is used

Trang 71

Fire random tidbit (n/b)

The space between the “ceiling” and the actual

floor above is called the “plenum” You should

know this term, you should understand that

when running network cables and other plastics insulated wiring, you need to use a certain type

of wire called “plenum” wire, this is because

burning plastic gives off toxic gases and small

fires in plenum areas could distribute toxic gases throughout the building air systems

Trang 72

Environmental Issues (n/b)

Improper environments can cause damage to

equipment or services

Water and Gas

• Make sure there are shutoff valves and that they have positive drains (flow out instead of in, why?)

Trang 73

Environmental Issues (n/b)

• Static electricity – besides ensuring proper humidity

– use anti-static flooring in data processing areas– Don’t use carpeting in data centers

– Wear anti-static bands when working inside

computers

Trang 74

Electric power issues (n/b)

There power interference that stops you from getting

“clean power” this is called “line noise”

Trang 75

Electric power issues (n/b)

Line Noise can be caused by the following

• Electromagnetic Interference – electromagnetic that can create noise (motors can generate fields)

• Radio Frequency Interference – fluorescent lights

Trang 76

Electrical Power Issues (n/b)

There are times where the voltage delivered falls outside normal thresholds

Excess

• Spike – momentary high voltage

• Surge – prolonged

Shortage

• Sag/dip – momentary low voltage

• Brownout – prolonged low voltage

Loss

• Fault – momentary outage

• Black out

Trang 77

Electrical power issues (n/b)

• “In rush current” – when a bunch of things are turned

on, power demands are usually higher, and may

stress power supplies, causing a sag/dip

• Try to have computer equipment on different

electrical supplies Do not use microwaves or

vacuums on computer power lines

Trang 78

Power best practices (n/b)

• Use surge protectors on desktops

• Do not daisy change surge protectors (see next

• Use UPS systems in computer rooms

• If possible shield power cables

• Do not run power over or under fluorescent lights

Trang 80

Computer Room (n/b)

• Temperature and Humidity levels should be properly maintained

– Humidity too low, static electricity*

– Humidity too high, corrosion of metal parts*

• CR should be on separate electrical systems than the rest of the building

• Should have redundant power systems and UPS

Trang 81

Review Questions

Q What feature can allow a windows computer to

automatically run a Trojan program on an inserted CD or USB drive

Q Which of the following water based automatic fire

suppression systems would be best used for a data center.

Q Why is access to a network jack a risk?

Q What is the CER in terms of biometrics

Q What is a type 1 and type 2 error?

Trang 82

Review Questions

Q If providing access to a bank vault, would I

prefer higher false positives or higher false

negatives?

Q What type of fire rating is electrical fires?

Q What is the difference between smart cards and memory cards

Q What type of motion sensor detects a human

through emanated heat?

Ngày đăng: 22/03/2014, 23:21

w