1. Trang chủ
  2. » Công Nghệ Thông Tin

Computer security principles and practice 3rd by williams stallings and brown ch16

26 164 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 26
Dung lượng 6,59 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Physical and Infrastructure Security • Protects computer-based data from software-based and communication-based threats Logical security • Also called infrastructure security • Protect

Trang 2

Chapter 16

Physical and Infrastructure

Security

Trang 3

Physical and Infrastructure

Security

• Protects computer-based data from software-based and

communication-based threats

Logical security

• Also called infrastructure security

• Protects the information systems that contain data and the people who use,

operate, and maintain the systems

• Must prevent any type of physical access or intrusion that can compromise

logical security

Physical security

• Also known as corporate or facilities security

• Protects the people and property within an entire area, facility, or

building(s), and is usually required by laws, regulations, and fiduciary

obligations

• Provides perimeter security, access control, smoke and fire detection, fire

suppression, some environmental protection, and usually surveillance

systems, alarms, and guards

Premises security

Trang 4

Physical Security

Overview

• Protect physical assets that support the storage

and processing of information

Concerns include information system hardware, physical facility, support facilities, and personnel Prevent physical

infrastructure misuse that leads

to the misuse or damage of protected information

Includes vandalism, theft of equipment, theft by copying, theft of services, and unauthorized

entry

Trang 5

Physical Security Threats

Physical situations and

occurrences that threaten

information systems:

• Environmental threats

• Technical threats

• Human-caused threats

Trang 6

Table 16.1 Characteristics of Natural Disasters

Source: ComputerSite Engineering, Inc

Trang 7

Table 16.2

Fujita Tornado Intensity

Scale

Trang 8

Table 16.3 Saffir/Simpson Hurricane Scale

Trang 9

Table 16.4 Temperature Thresholds for Damage to

Computing Resources

Source: Data taken from National Fire Protection Association

Component or Medium Sustained Ambient

Temperature at which Damage May Begin

Flexible disks, magnetic tapes,

125 ºC (257 ºF)

Trang 10

1 2 3 4 5 6 7 8

Trang 11

Table 16.5

480 Cº/ 896 ºF An uninsulated steel file

tends to buckle and expose its contents

1220 Cº/ 2228 ºF Cast iron melts

1410 Cº/ 2570 ºF Hard steel melts

Trang 12

A pipe may burst from a fault in the line or from freezing

Sprinkler systems set off accidentally

Sprinkler systems set off accidentally

Floodwater leaving a muddy residue and suspended material

in the water

Floodwater leaving a muddy residue and suspended material

in the water

Due diligence should

be performed to ensure that water from

as far as two floors above will not create a

hazard

Due diligence should

be performed to ensure that water from

as far as two floors above will not create a

hazard

Trang 13

Chemical, Radiological, and Biological Hazards

accidental discharge

ventilation system or open windows, and in the case of radiation, through perimeter walls

or chemical contaminants

Trang 14

Dust and Infestation

• Often overlooked

• Rotating storage media

and computer fans are

the most vulnerable to

damage

• Can also block ventilation

• Influxes can result from a

number of things:

o Controlled explosion of a nearby

building

o Windstorm carrying debris

o Construction or maintenance work

Trang 15

Technical Threats

• Electrical power is essential to run equipment

o Power utility problems:

• Under-voltage - dips/brownouts/outages, interrupts service

• Over-voltage - surges/faults/lightening, can destroy chips

• Noise - on power lines, may interfere with device operation

Electromagnetic interference (EMI)

heavy equipment, other computers, cell phones, microwave relay antennas, nearby radio stations

as through power lines

Trang 16

Human-Caused Threats

• Less predictable, designed to overcome

prevention measures, harder to deal with

• Include:

o Unauthorized physical access

• Information assets are generally located in restricted areas

• Can lead to other threats such as theft, vandalism or misuse

o Theft of equipment/data

• Eavesdropping and wiretapping fall into this category

• Insider or an outsider who has gained unauthorized access

o Vandalism of equipment/data

o Misuse of resources

Trang 17

Physical Security Prevention

and Mitigation Measures

• One prevention measure is the use of cloud computing

• Inappropriate temperature and humidity

o Environmental control equipment, power supply

• Fire and smoke

o Alarms, preventative measures, fire mitigation

o Smoke detectors, no smoking

Trang 18

Mitigation Measures

Technical Threats

Uninterruptibl

e power supply (UPS)

for each piece

of critical equipment

Trang 19

Mitigation Measures Human-Caused Physical Threats

Physical access control

Restrict building access

Controlled areas patrolled or guarded

Locks or screening measures at entry points

Equip movable resources with a tracking device

Power switch controlled by a security device

Intruder sensors and alarms

Surveillance systems that provide recording and real-time remote viewing

Physical access control

Restrict building access

Controlled areas patrolled or guarded

Locks or screening measures at entry points

Equip movable resources with a tracking device

Power switch controlled by a security device

Intruder sensors and alarms

Surveillance systems that provide recording and real-time remote viewing

Trang 20

Recovery from Physical Security Breaches

Most essential element

of recovery is

redundancy

• Provides for recovery from loss of

data

• Ideally all important data should

be available off-site and updated

as often as feasible

• Can use batch encrypted remote

backup

• For critical situations a remote

hot-site that is ready to take over

operation instantly can be

created

Physical equipment damage recovery

• Depends on nature of damage and cleanup

• May need disaster recovery specialists

Trang 21

Physical and Logical Security

Integration

• Numerous detection and prevention devices

• More effective if there is a central control

• Integrate automated physical and logical security functions

o Use a single ID card

o Single-step card enrollment and termination

o Central ID-management system

o Unified event monitoring and correlation

• Need standards in this area

o FIPS 201-1 “Personal Identity Verification (PIV) of Federal Employees

and Contractors”

Trang 22

Authorization data

Authorization data

Physical resource

Logical resource

PIV Card Issuance

I&A = Identification and Authentication

Logical Access Control

Card reader /writer

PIN input device Biometric reader PIV card

PIV Front end

Figure 16.2 FIPS 201 PIV System Model

LEGEND

I&A

Trang 23

Figure 16.3 Convergence Example

Certificate authority

PIV system

Access control system

Vending, e-purse and other applications

Contactless

smartcard reader Physical access control system (PACS) server

card enrollment station

Smartcard reader

Smartcard reader

Smartcard and biometric middleware

Optional

biometric

reader

Optional biometric reader

Other user directories

Active directory

Human resources database

Trang 24

Table 16.6 Degrees of Security and Control for Protected

Areas (FM 3-19.30)

Trang 25

Exclusion Limited Controlled Unrestricted

(a) Access Control Model

(b) Example Use

Figure 16.4 Use of Authentication

Mechanisms for Physical Access Control

CAK+BI O– A

CHUI D+VI S

EXCLUSI ON AREA

LI MI TED AREA

lab space and other sensitive areas

Buildings

CAK

BI O PKI

Trang 26

• Physical security prevention and mitigation

measures

o Environmental threats

o Technical threats

o Human-caused physical threats

• Integration of physical and logical security

o Personal identity verification

o Use of PIV credentials

in physical access control systems

Ngày đăng: 18/12/2017, 15:17

TỪ KHÓA LIÊN QUAN