Professional Documents
Culture Documents
CSF011G03 - Physical & Network Security
CSF011G03 - Physical & Network Security
CSF011G03 - Physical & Network Security
Welcome to:
• Definition
– Physical security is the protection of hardware, personnel, programs,
data and networks from physical events including natural disasters,
fire, burglary, terrorism and theft etc. through the use of
countermeasures such as suitable emergency preparedness, solid
building construction, adequate climate control, reliable power
supplies etc.
• Explanation
– The importance of physical security is often undervalued as
Trojans, spywares and hacking are seen as more dramatic and
technical issues. But without physical security, the various existing
software security implementations becomes null and void as the
intruder requires a limited amount of technical knowledge to carry
out a physical breach
controls
• Security in layers
• Technical controls
• Logging controls
• Perception as physical security
• Locks
• Keys and Combinations
• Patrol Force and Guards
• Natural barriers
• Structural barriers
– Fences
– Walls
– Gates
• Mantraps
• Turnstiles
• Biometrics
• CCTV surveillance
• Environmental Monitoring controls
• EMI Shielding controls
• Fire Suppression controls
• Power system controls
• Electronic and Electromagnetic Locks
• Magnetic Locks
Maintenance cost
No permanent record of
observation
© Copyright IBM Corporation 2015
Benefits of Physical IBM ICE (Innovation Centre for Education)
Security
• Physical security provides workplace security options
• Multiple levels of identity verification
• Improved response and awareness from combined
solutions, improved event categorization
• Event triggering between technology types for improved
notification, assessment and response
• Reduces threat from internal employees
• Restricts Unauthorized Access
Analysis
• Costs determination
– Total Cost of Ownership: It is a financial estimate intended to help
buyers and owners determine the direct and indirect costs of a
product or system
– Cost factors: Typical factors of costs are:
• Access controls
• Videos
• Management of contractor, employee etc.
• Communications
• Capturing the Benefits
– Direct benefits: The direct benefits are those whose influence
relate directly to the organization
– Indirect benefits: The benefits whose assistances do not directly
relate to the business are known as indirect benefits
• Definition
– Network security is a specialized field in computer networking
that involves securing a computer network
• Explanation
– Network security involves all the steps that an organization
undertakes to protect the present usability of any asset and also the
integrity and continuity of operations. An effective network security
strategy requires identifying threats and then choosing the best tools
to combat them
• Vulnerability Scanning
– Passively Testing Security Controls
– Interpreting Results
– Identifying Vulnerability
– Identifying Lack of Security Controls
– Identifying Common Misconfigurations
• Penetration Testing
– Verify a Threat Exists
– Bypass Security Controls
– Actively Test Security
– Exploit Vulnerabilities
• Centralized protection
– The advantage to having a centralized network security system is
that hacks can be halted before they do their malicious work
• Email security
– When an organization uses a network protection service, their
emails are filtered on the third party network before being forwarded
to their mail server
• Increases user productivity
– Network security tools will increase an organization's user
productivity on their network
• Eavesdropping
– Interception of communications by an unauthorized party is
called eavesdropping
• Viruses, Worms and Trojans
– Viruses are self-replication programs that use files to infect
and propagate.
– Worms are similar to viruses as they both are self-replicating, but
the worms do not require any file to propagate.
– Trojans are programs with malicious purpose which carry
some payload such as viruses.
• IP spoofing attacks
– Spoofing means to have the address of the computer mirror and
the address of a trusted computer in order to gain access to other
computers
Analysis
• An organization computes the true saving that will be
effective due to the installation of a new countermeasure
when it does the Cost vs Benefit Analysis. After the saving
is calculated the new effective cost is being calculated by
the existing management. It is calculated by subtracting the
new cost of the countermeasure from the new reduction in
Annualized Loss Expectancy (ALE) that is incurred from the
use of the new countermeasure
– For example: An organization had a considerable loss because their
network is being intruded. As a result most of the important data of
the organization was deleted. $200,000 was the cost incurred for
recovering the data which was lost. The likelihood of this kind of
incident happening came out to be once every 2 years. Therefore the
organization installed a detection tool for network intrusion which
incurred a cost of $40,000. Given on the next slide is a table that lists
the benefits and the cost incurred by the tool
© Copyright IBM Corporation 2015
Cost Benefit Table IBM ICE (Innovation Centre for Education)
Item Amount
5)
1. Which component of physical security is meant for outer-
layer access control?
– Mantraps
– Locked doors
– Security zones
– Perimeter security
2. Which type of fire extinguisher is used to suppress
electrical fire?
– Type D
– Type A
– Type C
– Type B
5)
3. The control that is not able to restrict EMI is:
– Physical location
– Humidity control
– Overhauling worn motors
– Physical shielding
4. Physical characteristics are needed by this technology in
order to establish identity. This technology is:
– Smart card
– Biometrics
– CHAP authenticator
– Surveillance
5)
5. This installation needs authentication as well as visual
identification in order to gain access. This high-security
installation is:
– Fencing
– Proximity reader
– Hot aisle
– Mantrap
6. What are the two states in which an application will fall in?
– Failopen
– Dependable
– Assured
– Failsafe
5)
7. A software application which checks the network of
an organization for security holes that are known?
– Log analyzer
– Design reviewer
– Vulnerability scanner
– Logic bomb
8. Which type of testing begins with the idea that the user
has some internal knowledge of the network?
– Green box
– White box
– Gray box
– Black box
5)
9. Which security function is performed by Nessus?
– Penetration testing
– Vulnerability scanning
– Loop protection
– Ethical hacking
10.In a certain method, a system is accessed from an
attacker’s perspective. What is that method known as?
– Flood gating
– Loop recon
– Penetration testing
– Vulnerability scanning