SlideShare a Scribd company logo
1 of 87
The Perimeter Protection Issues,
Technique and Operation

Assoc Prof Dr Zuraini Ismail / Hafiza Abas
Information Protection Requirements
o

Classified information systems and the classified
material on them must be physically located in a
security area appropriate to the classification and
sensitivity of the data.

o

Users have an important role in ensuring that the
system and associated classified information are
protected to the required levels.
Information Protection Requirements
• The classified information system and associated classified
information must be physically located in a security area
appropriate to the classification and sensitivity of the data.
• Classified information system equipment has varying separation
distance requirements depending on the work performed (including
computers, cables, telephones, radios, etc.).
• Users must check with their respective ISSO ( Info Sys Sec Officer)
for the appropriate physical distance protection requirements
before beginning classified work.
• Connections between classified systems and unclassified systems
or networks are prohibited (dilarang).
Information Protection Requirements
• Removable classified electronic media may not be present in a
work area containing unclassified systems that can read or write to
similar media.
• Computer equipment may not be connected, disconnected, or
moved unless authorized by the ISSO.
• Monitors, printers, and other devices that display or output
classified information must be positioned to deter unauthorized
individuals from reading the information without the knowledge of
the user.
• During classified processing it is required that the classification
level and category of the system accreditation be displayed on the
monitor using a placard or sticker.
Information Protection Requirements

o

o

The Physical (Environmental) Security domain
addresses the threats (ancaman), vulnerabilities (kelemahan), and
countermeasures (langkah-langkah) that can be utilized to
physically protect an enterprise’s resources and
sensitive information.
These resources include people, the facility in which
they work, and the data, equipment, support
systems, media, and supplies they utilize.
Information Protection Environment
• Primary consideration in physical security is that nothing
should impede (dihalang) “life safety goals.”
o Eg.: Do not lock the only fire exit door from the
outside.
• Safety: Deals with the protection of life and assets
against fire, natural disasters, and devastating
accidents.
• Security: Addresses vandalism, theft (kecurian), and attacks
(serangan) by individuals.
Physical Security Planning
• Physical security, like general information
security, should be based on a layered defense
model.
• Layers are implemented at the perimeter and
moving towards an asset.
• Layers include: Deterrence, Delaying,
Detection, Assessment, Response
http://www.softwaresecuritysolutions.com/layered-security.html
http://technet.microsoft.com/en-us/library/cc875841.aspx
http://www.secureworks.com/cyber-threat-intelligence/advanced-persistent-threats/assessment/
http://technet.microsoft.com/en-us/library/cc767969.aspx
http://www.ricoh.com/products/security/
Physical Security Planning
• A physical security program must address:
o

o

o

o

o

Crime and disruption protection through deterrence
(fences, security guards, warning signs, etc.).
Reduction of damages through the use of delaying
mechanisms (e.g., locks, security personnel, etc.).
Crime or disruption (gangguan) detection (e.g., smoke
detectors, motion detectors, CCTV, etc.).
Incident assessment through response to incidents
and determination of damage levels.
Response procedures (fire suppression
mechanisms, emergency response processes, etc.).
Physical Security Planning
• Before an effective physical security plan is
rolled out:
o Identify the team
o Carry out risk analysis to determine the
threats, vulnerabilities and calculate
business impact on each threats.
o Work with the management to identify
acceptable risk level for the physical security
program
Physical Security Planning
• Crime Prevention Through Environmental
Design (CPTED)
o

o

o

Is a discipline that outlines how the proper design of
a physical environment can reduce crime by directly
affecting human behavior.
Crime deterrence (pencegahan) through environmental
design.
Concepts developed in 1960’s. As of 2004, elements
of the CPTED approach have gained wide
international acceptance due to law enforcement
attempts to embrace it.
Physical Security Planning
• CPTED has three main strategies:
o

Natural Access Control

o

Natural Surveillance

o

Territorial Reinforcement
http://www.cityoftaylor.com/node/29575
http://targetcrime.ca/2009/02/22/solutions-for-safe-communities/
Physical Security Planning
• Natural Access Control
o

limits the opportunity for crime by taking
steps to clearly differentiate between public
space and private space.

o

By selectively placing entrances and exits,
fencing, lighting and landscape to limit
access or control flow, natural access control
occurs.

http://wsblockwatchnet.wordpress.com/2011/05/25/crime-prevention-through-environmental-designcpted-slides-from-our-may-24th-meeting/
Physical Security Planning
• Natural Surveillance
o

o

(pengawasan secara semula jadi)

Increases the threat of apprehension by
taking steps to increase the perception that
people can be seen
Natural surveillance occurs by designing the
placement of physical features, activities and
people in such a way as to maximize visibility
and foster positive social interaction among
legitimate users of private and public space.
http://www.lancastercsc.org/CPTED/Natural_Surveillance.html

The diagram shows good lines of sight on a neighborhood street.
People and vehicles can clearly be seen from many different
angles.
The following examples
show how landscaping
can affect lines of sight
around a home. This first
picture shows how the
plants don't allow people
to see the street or other
people in the area easily.
This creates place for
people to hid or commit
crimes that won't be easily
caught.
This picture shows how appropriate plants and lighting can
allow everyone to see what is happening on and near the
street around a home. This reduces the incentive for a
someone to commit a crime in the area.
Physical Security Planning
• Territorial Reinforcement
o

o

Promotes social control through increased
definition of space and improved proprietary
concern.
Creates physical designs that highlight the
company’s area of influence to give
legitimate owners a sense of ownership.
(sah)

o

Accomplished through the use of walls,
lighting, landscaping, etc.
Physical Security Planning
• CPTED is not the same as Target Hardening
• Target hardening focuses on denying access through
physical and artificial barriers (can lead to restrictions on
use, enjoyment, and aesthetics of the environment).
• Target hardening refers to strengthening the security of
your building so that it is difficult for criminals to attack.
• The goal is to increase the time and effort needed to
compromise your facility to the point where a criminal
will move on to a softer target.
• One way to begin a target hardening program is to
consider Existence, Capability, and History.
Please Read:
http
://www.emeraldinsight.com/journals.htm?articleid
Physical Security Planning
• Existence
Who may want to do you harm?
• Capability
What means have been used to carry out attacks
against businesses like yours in the past?
• History.
Study the history of attacks against businesses like
yours. What have attackers accomplished in the
past?
Physical Security Planning
• Issues with selecting a facility site:
o

Visibility (terrain, neighbors, population of area,
building markings)

o

Surrounding area and external factors (crime rate,
riots, terrorism, first responder locations)

o

Accessibility (road access, traffic, proximity to
transportation services)

o

Natural Disasters (floods, tornados, earthquakes)
Physical Security Planning
• Other facility considerations:
o

Physical construction materials and structure
composition


Be familiar with: load, light frame construction
material, heavy timber construction material,
incombustible material, dire resistant material
(know the fire ratings and construction
properties).
Physical Security Planning
Mantrap: A small room with two doors. The first
door is locked; a person is identified and
authenticated. Once the person is authenticated
and access is authorized, the first door opens and
allows the person into the mantrap. The person
has to be authenticated again in order to open the
second door and access a critical area. The
mantrap area could have a weight sensing floor
as an additional control to prevent literal
piggybacking.
“
Physical Security Planning
Automatic door lock configuration:
•“Fail safe:” If a power disruption occurs,
the door defaults to being unlocked.
•“Fail secure:” If a power disruption
occurs, the door defaults to being locked.
Physical Security Planning
• Windows can also be used to promote physical security.
• Know the different types of glass:
o Standard
o Tempered
o Acrylic
o Wired
o Laminated
o Solar Window Film
o Security Film
Insulated Glass
Physical Security Planning
• Consider use of internal partitions
carefully:
o

o

True floor to true ceiling to counter security
issues
Should never be used in areas that house
sensitive systems and devices
Power Supply
Power issues:
o

o

o

A continuous supply of electricity assures the
availability of company resources and
business continuity.
Data centers should be on a different power
supply from the rest of the building
Redundant power supplies: two or more
feeds coming from two or more electrical
substations
Ensuring Power Supply
o

UPS Systems
 Maintain continuous supply of power
 Use voltage stabilizer
 Online UPS systems
 Standby UPS System

o

Maintain proper operating temperature
 High temp can affect the power supply to cause
damage to devices
 Proper cooling systems
 PC and exhaust fans are working properly
&
unobstructed
Types of Voltage Fluctuations
Power Excess (quick burst of voltage)



Spike (momentary high voltage))
Surge (prolonged high voltage)

Power Failure



Fault (momentary power outrage)
Blackout (prolonged power lost, drops to
zero)

Power Degradation (under voltage)




Sag/dip (short term power shortage)
Brownout (under voltage)
Inrush Current (initial surge to startup a load)
Common power supply problems
o

Line Noise


o

Frequency


o

Variation of power waveform

Switching Transient


o

Distortion superimposed on power waveform

Under-voltage or over-voltage up to a few
nanoseconds

Harmonic Distortion


Multiples of power freq superimposed on power
waveform.
Internal Support System

Environmental Issues (in Brief)
o

Positive Drains: Contents flow out instead of
in.

o

Static Electricity due to low humidity,
hygrometer used

o

Ventilation :


Closed loop == do not bring outside air
in.



Positive pressurization

*
Internal Support System

Environmental Issues: Static Electricity
o

To prevent:






Use antistatic flooring in data processing areas
Ensure proper humidity
Proper grounding
No carpeting in data centers
Antistatic bands
Internal Support System

Environmental Issues: Temperature
Computing components can be affected
by temperature:




Magnetic Storage devices: 100 0F.
Computer systems and peripherals: 175 0F.
Paper products: 350 0F.
Kinds of Ventilation

Natural Ventilation


Uncontrolled movement of air thro cracks,
small holes & vents.

Whole-house ventilation


Controlled & uniform air movement.

Spot ventilation


Controlled air movement that improve the
effectiveness of natural & whole-house
ventilation by removing indoor pollutants
and/or moisture at their very source.
Internal Support System

• Fire Prevention: Includes training employees on how to
react, supplying the right equipment, enabling fire
suppression supply, proper storage of combustible
elements.

• Fire Detection: Includes alarms, manual detection pull
boxes, automatic detection response systems with
sensors, etc.

• Fire Suppression: Is the use of a suppression agent to
put out a fire.
Internal Support System

American Society for Testing and
Materials (ASTM)
is the organization that creates the
standards that dictate how fire resistant
ratings tests should be carried out and
how to properly interpret results.
results
Internal Support System
o

Fire needs oxygen and fuel to continue to grow.

o

Ignition sources can include the failure of an electrical
device, improper storage of materials, malfunctioning
heating devices, arson, etc.

o

Special note on “plenum areas:” The space above
drop down ceilings, wall cavities, and under raised
floors. Plenum areas should have fire detectors and
should only use plenum area rated cabling.
Internal Support System
Types of Fire:
A: Common Combustibles
• Elements: Wood products, paper, laminates
• Suppression: Water, foam
B: Liquid
• Elements: Petroleum products and coolants
• Suppression: Gas, CO2, foam, dry powders
C: Electrical
• Elements: Electrical equipment and wires
• Suppression: Gas, CO2, dry powders
D: Combustible Metals
• Elements: magnesium, sodium, potassium
• Suppression: Dry powder
K: Commercial Kitchens
• Elements: Cooking oil fires
• Suppression: Wet chemicals such as potassium
acetate.
Internal Support System

Types of Fire Detectors
o
o

Smoke Activated
Heat Activated

Know the types and properties of each
general category.
Internal Support System
•

Types of suppression agents:







Water
Halon and halon substitutes
Foams
Dry Powders
CO2
Soda Acid




Know suppression agent properties and the types of
fires that each suppression agent combats.
Know the types of fire extinguishers (A,B,C, D) that
combat different types of fires.
Internal Support System
Internal Support System

Types of Sprinklers






Wet Pipe Systems (aka Closed
Head System)
Dry Pipe Systems
Pre action Systems
Deluge Systems
Perimeter Security – Tools and Techniques

• The first line of defense is perimeter control
at the site location, to prevent unauthorized
access to the facility.
• Perimeter security has two modes:



Normal facility operation
Facility closed operation
Perimeter Security – Tools and Techniques

Proximity protection components put in
place to provide the following services:







Control of pedestrian and vehicle traffic
Various levels of protection for different security
zones
Buffers and delaying mechanisms to protect
against forced entry
Limit and control entry points
Perimeter Security – Tools and Techniques

Protection services can be provided by







Access Control Mechanisms
Physical Barriers
Intrusion Detection
Assessment
Response
Deterrents
Perimeter Security – Tools and Techniques

Perimeter Intrusion Detection and
Assessment System (PIDAS):




A type of fencing that has sensors on the
wire mesh and base of the fence.
A passive cable vibration sensor sets off
an alarm if an intrusion is detected.
Perimeter Security – Tools and Techniques

Gates have 4 distinct types:







Class I: Residential usage
Class II: Commercial usage, where general public
access is expected (eg., public parking lot, gated
community, self storage facility)
Class III: Industrial usage, where limited access is
expected (eg., warehouse property entrance not
intended to serve public)
Class IV: Restricted access (eg., a prison entrance
that is monitored either in person or via CCTV)
Perimeter Security – Tools and Techniques

• Locks are inexpensive access control
mechanisms that are widely accepted
and used.
• Locks are considered delaying devices.
• Know your locks.
Perimeter Security – Tools and Techniques
Perimeter Security – Tools and Techniques

Types of Locks
o

Mechanical Locks


o
o

Combination Locks
Cipher Locks (aka programmable locks)


o

Warded & Tumbler

Smart locks

Device Locks


Cable locks, switch controls, slot locks, port
controls, peripheral switch controls, cable
traps
Perimeter Security – Tools and Techniques

Lock Strengths:
o
o
o

Grade 1 (commercial and industrial use)
Grade 2 (heavy duty residential/light duty commercial)
Grade 3 (residential and consumer expendable)

•Cylinder Categories
o
o
o

Low Security (no pick or drill resistance)
Medium Security (some pick resistance)
High Security (pick resistance through many different
mechanisms—used only in Grade 1 & 2 locks)
Perimeter Security – Tools and Techniques

Lighting
o

o

o

Know lighting terms and types of lighting to use
in different situations (inside v. outside, security
posts, access doors, zones of illumination).
It is important to have the correct lighting when
using various types of surveillance equipment.
Lighting controls and switches should be in
protected, locked, and centralized areas.
Perimeter Security – Tools and Techniques
• Continuous lighting:
An array of lights that provide an even amount of illumination across an area.

• Controlled lighting:
An organization should erect lights and use illumination in such a way that does
not blind its neighbors or any passing cars, trains, or planes.

• Standby Lighting:
Lighting that can be configured to turn on and off at different times so that
potential intruders think that different areas of the facility are populated.

• Redundant or backup lighting:
Should be available in case of power failures or emergencies.

• Response Area Illumination:
Takes place when an IDS detects suspicious activities and turns on the lights
within the specified area.
Perimeter Security – Tools and Techniques

Surveillance Devices
o

o

These devices usually work in conjunction with
guards or other monitoring mechanisms to
extend their capacity.
Know the factors in choosing CCTV, focal length,
lens types (fixed v. zoom), iris, depth of field,
illumination requirements
Perimeter Security – Tools and Techniques

• Focal length: The focal length of a lens defines its
effectiveness in viewing objects from a horizontal
and vertical view.
• The sizes of images that will be shown on a monitor
along with the area that can be covered by one
camera are defined by focal length.
o Short focal length = wider angle views
o Long focal length = narrower views
Perimeter Security – Tools and Techniques

• Depth of field: Refers to the portion of the
environment that is in focus.
• Shallow depth of focus: Provides a softer
backdrop and leads viewers to the foreground
object.
• Greater depth of focus: Not much distinction
between objects in the foreground and
background.
Perimeter Security – Tools and Techniques

• Intrusion Detection Systems (IDS) are used
to detect unauthorized entries and to alert a
responsible entity to respond.
• Know the different types of IDS systems
(electro-mechanical v. volumetric) and
changes that can be detected by an IDS
system.
Perimeter Security – Tools and Techniques

• Patrol Force and Guards
Use in areas where critical reasoning skills are
required

• Auditing Physical Access
Need to log and review such as
Date & time of access attempt
Entry point
User ID
Unsuccessful access attempts
Perimeter Security – Tools and Techniques

Final Concept to Guide in Assessing Physical
Security Issues:
o Deterrence
o Delay
o Detection
o Assessment
o Response

More Related Content

What's hot

Managing your access control systems
Managing your access control systemsManaging your access control systems
Managing your access control systemsWalter Sinchak,
 
Building management system (bms)
Building management system (bms)Building management system (bms)
Building management system (bms)AHMED NADIM JILANI
 
Electronic security system
Electronic security systemElectronic security system
Electronic security systemAtharva Chavan
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentGary Bahadur
 
CCTV Control Room Design Suggestions
CCTV Control Room Design SuggestionsCCTV Control Room Design Suggestions
CCTV Control Room Design Suggestionsvictoriamorgan1122
 
Physical security
Physical securityPhysical security
Physical securityDhani Ahmad
 
11. Smoke Proof Enclosures
11. Smoke Proof Enclosures11. Smoke Proof Enclosures
11. Smoke Proof EnclosuresSadiq Alam
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security AssessmentsTom Eston
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentFaheem Ul Hasan
 
Active fire protection system
Active fire protection systemActive fire protection system
Active fire protection systemgauravashist
 
Fire Fighting systems - Advanced Services
Fire Fighting systems - Advanced ServicesFire Fighting systems - Advanced Services
Fire Fighting systems - Advanced ServicesPratibha Mohan
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & BuildSameer Paradia
 
commentry on nbc part 4
commentry on nbc part 4commentry on nbc part 4
commentry on nbc part 4vakil jagdish
 
Security measures
Security measuresSecurity measures
Security measuresshiv404
 
Compartmentation and Fire Doors
Compartmentation and Fire DoorsCompartmentation and Fire Doors
Compartmentation and Fire DoorsAaron Johnson
 
Detailed Study of CCTV Cameras
Detailed Study of CCTV CamerasDetailed Study of CCTV Cameras
Detailed Study of CCTV CamerasHans Khanna
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centersBrencil Kaimba
 

What's hot (20)

Managing your access control systems
Managing your access control systemsManaging your access control systems
Managing your access control systems
 
Building management system (bms)
Building management system (bms)Building management system (bms)
Building management system (bms)
 
Electronic security system
Electronic security systemElectronic security system
Electronic security system
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
CCTV Control Room Design Suggestions
CCTV Control Room Design SuggestionsCCTV Control Room Design Suggestions
CCTV Control Room Design Suggestions
 
Physical security
Physical securityPhysical security
Physical security
 
11. Smoke Proof Enclosures
11. Smoke Proof Enclosures11. Smoke Proof Enclosures
11. Smoke Proof Enclosures
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
 
Fire protection system ppt.
Fire protection system ppt.Fire protection system ppt.
Fire protection system ppt.
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Server room
Server roomServer room
Server room
 
Active fire protection system
Active fire protection systemActive fire protection system
Active fire protection system
 
Fire Fighting systems - Advanced Services
Fire Fighting systems - Advanced ServicesFire Fighting systems - Advanced Services
Fire Fighting systems - Advanced Services
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 
Physical Security Management System
Physical Security Management SystemPhysical Security Management System
Physical Security Management System
 
commentry on nbc part 4
commentry on nbc part 4commentry on nbc part 4
commentry on nbc part 4
 
Security measures
Security measuresSecurity measures
Security measures
 
Compartmentation and Fire Doors
Compartmentation and Fire DoorsCompartmentation and Fire Doors
Compartmentation and Fire Doors
 
Detailed Study of CCTV Cameras
Detailed Study of CCTV CamerasDetailed Study of CCTV Cameras
Detailed Study of CCTV Cameras
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
 

Viewers also liked

Perimeter Protection: "Stairway to IP"
Perimeter Protection: "Stairway to IP"Perimeter Protection: "Stairway to IP"
Perimeter Protection: "Stairway to IP"cias-elettronica
 
Surviellance System-Naco
Surviellance System-NacoSurviellance System-Naco
Surviellance System-NacoGnanaranjan Das
 
SpyCameraCCTV Guide to IP Cameras
SpyCameraCCTV Guide to IP CamerasSpyCameraCCTV Guide to IP Cameras
SpyCameraCCTV Guide to IP CamerasSpyCameraCCTV
 
Digital recording system (Geo Physics)
Digital recording system (Geo Physics)Digital recording system (Geo Physics)
Digital recording system (Geo Physics)Junaid-sanwal
 
Post modernism
Post modernismPost modernism
Post modernismjuhi singh
 
13 propositions of Post-Modernism by Charles Jencks
13 propositions of Post-Modernism by Charles Jencks13 propositions of Post-Modernism by Charles Jencks
13 propositions of Post-Modernism by Charles JencksAnshuman Mishra
 
Models of landscape evolution and slope development by king
Models of landscape evolution and slope development by kingModels of landscape evolution and slope development by king
Models of landscape evolution and slope development by kingCharu Jaiswal
 
Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Securityleminhvuong
 
CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5Nil Menon
 
Post Modern Architecture
Post Modern ArchitecturePost Modern Architecture
Post Modern ArchitectureCarla Faner
 
Ports and connectors
Ports and connectorsPorts and connectors
Ports and connectorschrispaul8676
 
Proposal to supply, installation and testing of CCTV Camera
Proposal to supply, installation and testing of CCTV Camera Proposal to supply, installation and testing of CCTV Camera
Proposal to supply, installation and testing of CCTV Camera Denis kisina
 
Ip Cctv Presentation
Ip Cctv PresentationIp Cctv Presentation
Ip Cctv Presentationwillyaoll
 
CCTV-Powerpoint-Presentation
CCTV-Powerpoint-PresentationCCTV-Powerpoint-Presentation
CCTV-Powerpoint-Presentationguestaec424
 
Post modern architecture
Post modern architecturePost modern architecture
Post modern architectureAlex Waktola
 
Seminar on CCTV Cameras
Seminar on CCTV CamerasSeminar on CCTV Cameras
Seminar on CCTV CamerasSachin Sharma
 

Viewers also liked (20)

Perimeter Protection: "Stairway to IP"
Perimeter Protection: "Stairway to IP"Perimeter Protection: "Stairway to IP"
Perimeter Protection: "Stairway to IP"
 
Perimeter monitoring, detection and surveillance
Perimeter monitoring, detection and surveillancePerimeter monitoring, detection and surveillance
Perimeter monitoring, detection and surveillance
 
Surviellance System-Naco
Surviellance System-NacoSurviellance System-Naco
Surviellance System-Naco
 
Man Overboard Detection
Man Overboard DetectionMan Overboard Detection
Man Overboard Detection
 
SpyCameraCCTV Guide to IP Cameras
SpyCameraCCTV Guide to IP CamerasSpyCameraCCTV Guide to IP Cameras
SpyCameraCCTV Guide to IP Cameras
 
POST MODERN ARCHITECTURE
POST MODERN ARCHITECTUREPOST MODERN ARCHITECTURE
POST MODERN ARCHITECTURE
 
Digital recording system (Geo Physics)
Digital recording system (Geo Physics)Digital recording system (Geo Physics)
Digital recording system (Geo Physics)
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Post modernism
Post modernismPost modernism
Post modernism
 
13 propositions of Post-Modernism by Charles Jencks
13 propositions of Post-Modernism by Charles Jencks13 propositions of Post-Modernism by Charles Jencks
13 propositions of Post-Modernism by Charles Jencks
 
Models of landscape evolution and slope development by king
Models of landscape evolution and slope development by kingModels of landscape evolution and slope development by king
Models of landscape evolution and slope development by king
 
Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Security
 
CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5
 
Post Modern Architecture
Post Modern ArchitecturePost Modern Architecture
Post Modern Architecture
 
Ports and connectors
Ports and connectorsPorts and connectors
Ports and connectors
 
Proposal to supply, installation and testing of CCTV Camera
Proposal to supply, installation and testing of CCTV Camera Proposal to supply, installation and testing of CCTV Camera
Proposal to supply, installation and testing of CCTV Camera
 
Ip Cctv Presentation
Ip Cctv PresentationIp Cctv Presentation
Ip Cctv Presentation
 
CCTV-Powerpoint-Presentation
CCTV-Powerpoint-PresentationCCTV-Powerpoint-Presentation
CCTV-Powerpoint-Presentation
 
Post modern architecture
Post modern architecturePost modern architecture
Post modern architecture
 
Seminar on CCTV Cameras
Seminar on CCTV CamerasSeminar on CCTV Cameras
Seminar on CCTV Cameras
 

Similar to The Perimeter Protection Issues, Technique and Operation

CISSP week 26
CISSP week 26CISSP week 26
CISSP week 26jemtallon
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxTikdiPatel
 
Security & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxSecurity & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxdotco
 
Security & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxSecurity & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxTechnocracy2
 
Life Safety and Property Protection
Life Safety and Property ProtectionLife Safety and Property Protection
Life Safety and Property ProtectionQuality CCTV
 
Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdfNdheh
 
Types of Security in Industrial Security
Types of Security in Industrial SecurityTypes of Security in Industrial Security
Types of Security in Industrial SecurityRJCubillo
 
Crime prevention through environmental design
Crime prevention through environmental designCrime prevention through environmental design
Crime prevention through environmental designVijesh Kumar V
 
Innovative Ideas in Privacy Research.ppt
Innovative Ideas in Privacy Research.pptInnovative Ideas in Privacy Research.ppt
Innovative Ideas in Privacy Research.pptssuser991de0
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Chinatu Uzuegbu
 
Importance of workplace Security.pptx
Importance of workplace Security.pptxImportance of workplace Security.pptx
Importance of workplace Security.pptxSecurity Guards
 
Information Security
Information Security Information Security
Information Security Alok Katiyar
 
CISM_WK_3.pptx
CISM_WK_3.pptxCISM_WK_3.pptx
CISM_WK_3.pptxdotco
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoMark John Lado, MIT
 

Similar to The Perimeter Protection Issues, Technique and Operation (20)

6 Physical Security
6 Physical Security6 Physical Security
6 Physical Security
 
CISSP week 26
CISSP week 26CISSP week 26
CISSP week 26
 
internet security and cyber lawUnit1
internet security and  cyber lawUnit1internet security and  cyber lawUnit1
internet security and cyber lawUnit1
 
SECURITY PLANNING DESIGN (SESSION 3).ppt
SECURITY PLANNING  DESIGN (SESSION 3).pptSECURITY PLANNING  DESIGN (SESSION 3).ppt
SECURITY PLANNING DESIGN (SESSION 3).ppt
 
1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptx
 
Security & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxSecurity & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptx
 
Security & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxSecurity & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptx
 
Life Safety and Property Protection
Life Safety and Property ProtectionLife Safety and Property Protection
Life Safety and Property Protection
 
Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdf
 
Internet safety and security strategies for building an internet safety wall
Internet safety and security strategies for building an internet safety wallInternet safety and security strategies for building an internet safety wall
Internet safety and security strategies for building an internet safety wall
 
Types of Security in Industrial Security
Types of Security in Industrial SecurityTypes of Security in Industrial Security
Types of Security in Industrial Security
 
Crime prevention through environmental design
Crime prevention through environmental designCrime prevention through environmental design
Crime prevention through environmental design
 
Innovative Ideas in Privacy Research.ppt
Innovative Ideas in Privacy Research.pptInnovative Ideas in Privacy Research.ppt
Innovative Ideas in Privacy Research.ppt
 
dexa.ppt
dexa.pptdexa.ppt
dexa.ppt
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2
 
Importance of workplace Security.pptx
Importance of workplace Security.pptxImportance of workplace Security.pptx
Importance of workplace Security.pptx
 
Information Security
Information Security Information Security
Information Security
 
CISM_WK_3.pptx
CISM_WK_3.pptxCISM_WK_3.pptx
CISM_WK_3.pptx
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
 

More from Hafiza Abas

animated semut dengan menggunakan path animation.
animated semut dengan menggunakan path animation.animated semut dengan menggunakan path animation.
animated semut dengan menggunakan path animation.Hafiza Abas
 
Teknologi ePembelajaran
Teknologi ePembelajaran Teknologi ePembelajaran
Teknologi ePembelajaran Hafiza Abas
 
Access Controls Attacks
Access Controls AttacksAccess Controls Attacks
Access Controls AttacksHafiza Abas
 
Task 6 access_control_attacks_hong_kim_sheng_2
Task 6 access_control_attacks_hong_kim_sheng_2Task 6 access_control_attacks_hong_kim_sheng_2
Task 6 access_control_attacks_hong_kim_sheng_2Hafiza Abas
 
Example of access control
Example of access controlExample of access control
Example of access controlHafiza Abas
 
Islamic studies for disabled: teaching Salat for Autism Using Apps
Islamic studies for disabled: teaching Salat for Autism Using AppsIslamic studies for disabled: teaching Salat for Autism Using Apps
Islamic studies for disabled: teaching Salat for Autism Using AppsHafiza Abas
 
Quantitative search and_qualitative_research by mubarak
Quantitative search and_qualitative_research by mubarakQuantitative search and_qualitative_research by mubarak
Quantitative search and_qualitative_research by mubarakHafiza Abas
 
Chap 6 Avoiding Ambiguity
Chap 6 Avoiding Ambiguity Chap 6 Avoiding Ambiguity
Chap 6 Avoiding Ambiguity Hafiza Abas
 
Chapter 14 Review of the Literature
Chapter 14 Review of the LiteratureChapter 14 Review of the Literature
Chapter 14 Review of the Literature Hafiza Abas
 
Chapter 5 Be Concise
Chapter 5 Be ConciseChapter 5 Be Concise
Chapter 5 Be ConciseHafiza Abas
 
Chapter 13 Introduction in research paper
Chapter 13 Introduction in research paperChapter 13 Introduction in research paper
Chapter 13 Introduction in research paperHafiza Abas
 
Chapter 4 Structuring Paragraph and Sentences
Chapter 4 Structuring Paragraph and SentencesChapter 4 Structuring Paragraph and Sentences
Chapter 4 Structuring Paragraph and SentencesHafiza Abas
 
Chapter 12: Abstract ( english for writing research papers)
Chapter 12: Abstract ( english for writing research papers)Chapter 12: Abstract ( english for writing research papers)
Chapter 12: Abstract ( english for writing research papers)Hafiza Abas
 
Chapter 3 Breaking up long sentences (ENGLISH FOR WRITING RESEARCH PAPERS)
Chapter 3 Breaking up long sentences (ENGLISH FOR WRITING RESEARCH PAPERS)Chapter 3 Breaking up long sentences (ENGLISH FOR WRITING RESEARCH PAPERS)
Chapter 3 Breaking up long sentences (ENGLISH FOR WRITING RESEARCH PAPERS)Hafiza Abas
 
English for writing research papers (chap 2 and 11)
English for writing research papers (chap 2 and 11)English for writing research papers (chap 2 and 11)
English for writing research papers (chap 2 and 11)Hafiza Abas
 
Assessment vs. evaluation
Assessment vs. evaluationAssessment vs. evaluation
Assessment vs. evaluationHafiza Abas
 
Business Continuity Plan (Introduction)
Business Continuity Plan (Introduction)Business Continuity Plan (Introduction)
Business Continuity Plan (Introduction)Hafiza Abas
 

More from Hafiza Abas (20)

animated semut dengan menggunakan path animation.
animated semut dengan menggunakan path animation.animated semut dengan menggunakan path animation.
animated semut dengan menggunakan path animation.
 
Teknologi ePembelajaran
Teknologi ePembelajaran Teknologi ePembelajaran
Teknologi ePembelajaran
 
Access Controls Attacks
Access Controls AttacksAccess Controls Attacks
Access Controls Attacks
 
Task 6 access_control_attacks_hong_kim_sheng_2
Task 6 access_control_attacks_hong_kim_sheng_2Task 6 access_control_attacks_hong_kim_sheng_2
Task 6 access_control_attacks_hong_kim_sheng_2
 
Example of access control
Example of access controlExample of access control
Example of access control
 
SPSS LEVEL 2
SPSS LEVEL 2SPSS LEVEL 2
SPSS LEVEL 2
 
Islamic studies for disabled: teaching Salat for Autism Using Apps
Islamic studies for disabled: teaching Salat for Autism Using AppsIslamic studies for disabled: teaching Salat for Autism Using Apps
Islamic studies for disabled: teaching Salat for Autism Using Apps
 
Quantitative search and_qualitative_research by mubarak
Quantitative search and_qualitative_research by mubarakQuantitative search and_qualitative_research by mubarak
Quantitative search and_qualitative_research by mubarak
 
Chap 15 Method
Chap 15 MethodChap 15 Method
Chap 15 Method
 
Chap 6 Avoiding Ambiguity
Chap 6 Avoiding Ambiguity Chap 6 Avoiding Ambiguity
Chap 6 Avoiding Ambiguity
 
Chapter 14 Review of the Literature
Chapter 14 Review of the LiteratureChapter 14 Review of the Literature
Chapter 14 Review of the Literature
 
Chapter 5 Be Concise
Chapter 5 Be ConciseChapter 5 Be Concise
Chapter 5 Be Concise
 
Chapter 13 Introduction in research paper
Chapter 13 Introduction in research paperChapter 13 Introduction in research paper
Chapter 13 Introduction in research paper
 
Chapter 4 Structuring Paragraph and Sentences
Chapter 4 Structuring Paragraph and SentencesChapter 4 Structuring Paragraph and Sentences
Chapter 4 Structuring Paragraph and Sentences
 
Chapter 12: Abstract ( english for writing research papers)
Chapter 12: Abstract ( english for writing research papers)Chapter 12: Abstract ( english for writing research papers)
Chapter 12: Abstract ( english for writing research papers)
 
Chapter 3 Breaking up long sentences (ENGLISH FOR WRITING RESEARCH PAPERS)
Chapter 3 Breaking up long sentences (ENGLISH FOR WRITING RESEARCH PAPERS)Chapter 3 Breaking up long sentences (ENGLISH FOR WRITING RESEARCH PAPERS)
Chapter 3 Breaking up long sentences (ENGLISH FOR WRITING RESEARCH PAPERS)
 
English for writing research papers (chap 2 and 11)
English for writing research papers (chap 2 and 11)English for writing research papers (chap 2 and 11)
English for writing research papers (chap 2 and 11)
 
Assessment vs. evaluation
Assessment vs. evaluationAssessment vs. evaluation
Assessment vs. evaluation
 
Rubric
RubricRubric
Rubric
 
Business Continuity Plan (Introduction)
Business Continuity Plan (Introduction)Business Continuity Plan (Introduction)
Business Continuity Plan (Introduction)
 

Recently uploaded

20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdfChris Skinner
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers referencessuser2c065e
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsIndiaMART InterMESH Limited
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfJamesConcepcion7
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxShruti Mittal
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...ssuserf63bd7
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerAggregage
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in PhilippinesDavidSamuel525586
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOne Monitar
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfJamesConcepcion7
 
BAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptxBAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptxran17april2001
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreNZSG
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...SOFTTECHHUB
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 

Recently uploaded (20)

20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers reference
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan Dynamics
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdf
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptx
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors Data
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon Harmer
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in Philippines
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdf
 
BAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptxBAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptx
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource Centre
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 

The Perimeter Protection Issues, Technique and Operation

  • 1. The Perimeter Protection Issues, Technique and Operation Assoc Prof Dr Zuraini Ismail / Hafiza Abas
  • 2. Information Protection Requirements o Classified information systems and the classified material on them must be physically located in a security area appropriate to the classification and sensitivity of the data. o Users have an important role in ensuring that the system and associated classified information are protected to the required levels.
  • 3. Information Protection Requirements • The classified information system and associated classified information must be physically located in a security area appropriate to the classification and sensitivity of the data. • Classified information system equipment has varying separation distance requirements depending on the work performed (including computers, cables, telephones, radios, etc.). • Users must check with their respective ISSO ( Info Sys Sec Officer) for the appropriate physical distance protection requirements before beginning classified work. • Connections between classified systems and unclassified systems or networks are prohibited (dilarang).
  • 4. Information Protection Requirements • Removable classified electronic media may not be present in a work area containing unclassified systems that can read or write to similar media. • Computer equipment may not be connected, disconnected, or moved unless authorized by the ISSO. • Monitors, printers, and other devices that display or output classified information must be positioned to deter unauthorized individuals from reading the information without the knowledge of the user. • During classified processing it is required that the classification level and category of the system accreditation be displayed on the monitor using a placard or sticker.
  • 5. Information Protection Requirements o o The Physical (Environmental) Security domain addresses the threats (ancaman), vulnerabilities (kelemahan), and countermeasures (langkah-langkah) that can be utilized to physically protect an enterprise’s resources and sensitive information. These resources include people, the facility in which they work, and the data, equipment, support systems, media, and supplies they utilize.
  • 6. Information Protection Environment • Primary consideration in physical security is that nothing should impede (dihalang) “life safety goals.” o Eg.: Do not lock the only fire exit door from the outside. • Safety: Deals with the protection of life and assets against fire, natural disasters, and devastating accidents. • Security: Addresses vandalism, theft (kecurian), and attacks (serangan) by individuals.
  • 7. Physical Security Planning • Physical security, like general information security, should be based on a layered defense model. • Layers are implemented at the perimeter and moving towards an asset. • Layers include: Deterrence, Delaying, Detection, Assessment, Response
  • 8.
  • 10.
  • 15. Physical Security Planning • A physical security program must address: o o o o o Crime and disruption protection through deterrence (fences, security guards, warning signs, etc.). Reduction of damages through the use of delaying mechanisms (e.g., locks, security personnel, etc.). Crime or disruption (gangguan) detection (e.g., smoke detectors, motion detectors, CCTV, etc.). Incident assessment through response to incidents and determination of damage levels. Response procedures (fire suppression mechanisms, emergency response processes, etc.).
  • 16. Physical Security Planning • Before an effective physical security plan is rolled out: o Identify the team o Carry out risk analysis to determine the threats, vulnerabilities and calculate business impact on each threats. o Work with the management to identify acceptable risk level for the physical security program
  • 17.
  • 18. Physical Security Planning • Crime Prevention Through Environmental Design (CPTED) o o o Is a discipline that outlines how the proper design of a physical environment can reduce crime by directly affecting human behavior. Crime deterrence (pencegahan) through environmental design. Concepts developed in 1960’s. As of 2004, elements of the CPTED approach have gained wide international acceptance due to law enforcement attempts to embrace it.
  • 19. Physical Security Planning • CPTED has three main strategies: o Natural Access Control o Natural Surveillance o Territorial Reinforcement
  • 22. Physical Security Planning • Natural Access Control o limits the opportunity for crime by taking steps to clearly differentiate between public space and private space. o By selectively placing entrances and exits, fencing, lighting and landscape to limit access or control flow, natural access control occurs. http://wsblockwatchnet.wordpress.com/2011/05/25/crime-prevention-through-environmental-designcpted-slides-from-our-may-24th-meeting/
  • 23. Physical Security Planning • Natural Surveillance o o (pengawasan secara semula jadi) Increases the threat of apprehension by taking steps to increase the perception that people can be seen Natural surveillance occurs by designing the placement of physical features, activities and people in such a way as to maximize visibility and foster positive social interaction among legitimate users of private and public space.
  • 24. http://www.lancastercsc.org/CPTED/Natural_Surveillance.html The diagram shows good lines of sight on a neighborhood street. People and vehicles can clearly be seen from many different angles.
  • 25. The following examples show how landscaping can affect lines of sight around a home. This first picture shows how the plants don't allow people to see the street or other people in the area easily. This creates place for people to hid or commit crimes that won't be easily caught.
  • 26. This picture shows how appropriate plants and lighting can allow everyone to see what is happening on and near the street around a home. This reduces the incentive for a someone to commit a crime in the area.
  • 27.
  • 28. Physical Security Planning • Territorial Reinforcement o o Promotes social control through increased definition of space and improved proprietary concern. Creates physical designs that highlight the company’s area of influence to give legitimate owners a sense of ownership. (sah) o Accomplished through the use of walls, lighting, landscaping, etc.
  • 29. Physical Security Planning • CPTED is not the same as Target Hardening • Target hardening focuses on denying access through physical and artificial barriers (can lead to restrictions on use, enjoyment, and aesthetics of the environment). • Target hardening refers to strengthening the security of your building so that it is difficult for criminals to attack. • The goal is to increase the time and effort needed to compromise your facility to the point where a criminal will move on to a softer target. • One way to begin a target hardening program is to consider Existence, Capability, and History.
  • 31. Physical Security Planning • Existence Who may want to do you harm? • Capability What means have been used to carry out attacks against businesses like yours in the past? • History. Study the history of attacks against businesses like yours. What have attackers accomplished in the past?
  • 32. Physical Security Planning • Issues with selecting a facility site: o Visibility (terrain, neighbors, population of area, building markings) o Surrounding area and external factors (crime rate, riots, terrorism, first responder locations) o Accessibility (road access, traffic, proximity to transportation services) o Natural Disasters (floods, tornados, earthquakes)
  • 33. Physical Security Planning • Other facility considerations: o Physical construction materials and structure composition  Be familiar with: load, light frame construction material, heavy timber construction material, incombustible material, dire resistant material (know the fire ratings and construction properties).
  • 34. Physical Security Planning Mantrap: A small room with two doors. The first door is locked; a person is identified and authenticated. Once the person is authenticated and access is authorized, the first door opens and allows the person into the mantrap. The person has to be authenticated again in order to open the second door and access a critical area. The mantrap area could have a weight sensing floor as an additional control to prevent literal piggybacking. “
  • 35.
  • 36.
  • 37. Physical Security Planning Automatic door lock configuration: •“Fail safe:” If a power disruption occurs, the door defaults to being unlocked. •“Fail secure:” If a power disruption occurs, the door defaults to being locked.
  • 38. Physical Security Planning • Windows can also be used to promote physical security. • Know the different types of glass: o Standard o Tempered o Acrylic o Wired o Laminated o Solar Window Film o Security Film
  • 39.
  • 41. Physical Security Planning • Consider use of internal partitions carefully: o o True floor to true ceiling to counter security issues Should never be used in areas that house sensitive systems and devices
  • 42. Power Supply Power issues: o o o A continuous supply of electricity assures the availability of company resources and business continuity. Data centers should be on a different power supply from the rest of the building Redundant power supplies: two or more feeds coming from two or more electrical substations
  • 43.
  • 44. Ensuring Power Supply o UPS Systems  Maintain continuous supply of power  Use voltage stabilizer  Online UPS systems  Standby UPS System o Maintain proper operating temperature  High temp can affect the power supply to cause damage to devices  Proper cooling systems  PC and exhaust fans are working properly & unobstructed
  • 45.
  • 46. Types of Voltage Fluctuations Power Excess (quick burst of voltage)   Spike (momentary high voltage)) Surge (prolonged high voltage) Power Failure   Fault (momentary power outrage) Blackout (prolonged power lost, drops to zero) Power Degradation (under voltage)    Sag/dip (short term power shortage) Brownout (under voltage) Inrush Current (initial surge to startup a load)
  • 47. Common power supply problems o Line Noise  o Frequency  o Variation of power waveform Switching Transient  o Distortion superimposed on power waveform Under-voltage or over-voltage up to a few nanoseconds Harmonic Distortion  Multiples of power freq superimposed on power waveform.
  • 48.
  • 49. Internal Support System Environmental Issues (in Brief) o Positive Drains: Contents flow out instead of in. o Static Electricity due to low humidity, hygrometer used o Ventilation :  Closed loop == do not bring outside air in.  Positive pressurization *
  • 50.
  • 51.
  • 52.
  • 53. Internal Support System Environmental Issues: Static Electricity o To prevent:      Use antistatic flooring in data processing areas Ensure proper humidity Proper grounding No carpeting in data centers Antistatic bands
  • 54. Internal Support System Environmental Issues: Temperature Computing components can be affected by temperature:    Magnetic Storage devices: 100 0F. Computer systems and peripherals: 175 0F. Paper products: 350 0F.
  • 55. Kinds of Ventilation Natural Ventilation  Uncontrolled movement of air thro cracks, small holes & vents. Whole-house ventilation  Controlled & uniform air movement. Spot ventilation  Controlled air movement that improve the effectiveness of natural & whole-house ventilation by removing indoor pollutants and/or moisture at their very source.
  • 56. Internal Support System • Fire Prevention: Includes training employees on how to react, supplying the right equipment, enabling fire suppression supply, proper storage of combustible elements. • Fire Detection: Includes alarms, manual detection pull boxes, automatic detection response systems with sensors, etc. • Fire Suppression: Is the use of a suppression agent to put out a fire.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61. Internal Support System American Society for Testing and Materials (ASTM) is the organization that creates the standards that dictate how fire resistant ratings tests should be carried out and how to properly interpret results. results
  • 62. Internal Support System o Fire needs oxygen and fuel to continue to grow. o Ignition sources can include the failure of an electrical device, improper storage of materials, malfunctioning heating devices, arson, etc. o Special note on “plenum areas:” The space above drop down ceilings, wall cavities, and under raised floors. Plenum areas should have fire detectors and should only use plenum area rated cabling.
  • 63. Internal Support System Types of Fire: A: Common Combustibles • Elements: Wood products, paper, laminates • Suppression: Water, foam B: Liquid • Elements: Petroleum products and coolants • Suppression: Gas, CO2, foam, dry powders C: Electrical • Elements: Electrical equipment and wires • Suppression: Gas, CO2, dry powders D: Combustible Metals • Elements: magnesium, sodium, potassium • Suppression: Dry powder K: Commercial Kitchens • Elements: Cooking oil fires • Suppression: Wet chemicals such as potassium acetate.
  • 64.
  • 65. Internal Support System Types of Fire Detectors o o Smoke Activated Heat Activated Know the types and properties of each general category.
  • 66.
  • 67. Internal Support System • Types of suppression agents:       Water Halon and halon substitutes Foams Dry Powders CO2 Soda Acid   Know suppression agent properties and the types of fires that each suppression agent combats. Know the types of fire extinguishers (A,B,C, D) that combat different types of fires.
  • 69. Internal Support System Types of Sprinklers     Wet Pipe Systems (aka Closed Head System) Dry Pipe Systems Pre action Systems Deluge Systems
  • 70.
  • 71. Perimeter Security – Tools and Techniques • The first line of defense is perimeter control at the site location, to prevent unauthorized access to the facility. • Perimeter security has two modes:   Normal facility operation Facility closed operation
  • 72. Perimeter Security – Tools and Techniques Proximity protection components put in place to provide the following services:     Control of pedestrian and vehicle traffic Various levels of protection for different security zones Buffers and delaying mechanisms to protect against forced entry Limit and control entry points
  • 73. Perimeter Security – Tools and Techniques Protection services can be provided by       Access Control Mechanisms Physical Barriers Intrusion Detection Assessment Response Deterrents
  • 74. Perimeter Security – Tools and Techniques Perimeter Intrusion Detection and Assessment System (PIDAS):   A type of fencing that has sensors on the wire mesh and base of the fence. A passive cable vibration sensor sets off an alarm if an intrusion is detected.
  • 75. Perimeter Security – Tools and Techniques Gates have 4 distinct types:     Class I: Residential usage Class II: Commercial usage, where general public access is expected (eg., public parking lot, gated community, self storage facility) Class III: Industrial usage, where limited access is expected (eg., warehouse property entrance not intended to serve public) Class IV: Restricted access (eg., a prison entrance that is monitored either in person or via CCTV)
  • 76. Perimeter Security – Tools and Techniques • Locks are inexpensive access control mechanisms that are widely accepted and used. • Locks are considered delaying devices. • Know your locks.
  • 77. Perimeter Security – Tools and Techniques
  • 78. Perimeter Security – Tools and Techniques Types of Locks o Mechanical Locks  o o Combination Locks Cipher Locks (aka programmable locks)  o Warded & Tumbler Smart locks Device Locks  Cable locks, switch controls, slot locks, port controls, peripheral switch controls, cable traps
  • 79. Perimeter Security – Tools and Techniques Lock Strengths: o o o Grade 1 (commercial and industrial use) Grade 2 (heavy duty residential/light duty commercial) Grade 3 (residential and consumer expendable) •Cylinder Categories o o o Low Security (no pick or drill resistance) Medium Security (some pick resistance) High Security (pick resistance through many different mechanisms—used only in Grade 1 & 2 locks)
  • 80. Perimeter Security – Tools and Techniques Lighting o o o Know lighting terms and types of lighting to use in different situations (inside v. outside, security posts, access doors, zones of illumination). It is important to have the correct lighting when using various types of surveillance equipment. Lighting controls and switches should be in protected, locked, and centralized areas.
  • 81. Perimeter Security – Tools and Techniques • Continuous lighting: An array of lights that provide an even amount of illumination across an area. • Controlled lighting: An organization should erect lights and use illumination in such a way that does not blind its neighbors or any passing cars, trains, or planes. • Standby Lighting: Lighting that can be configured to turn on and off at different times so that potential intruders think that different areas of the facility are populated. • Redundant or backup lighting: Should be available in case of power failures or emergencies. • Response Area Illumination: Takes place when an IDS detects suspicious activities and turns on the lights within the specified area.
  • 82. Perimeter Security – Tools and Techniques Surveillance Devices o o These devices usually work in conjunction with guards or other monitoring mechanisms to extend their capacity. Know the factors in choosing CCTV, focal length, lens types (fixed v. zoom), iris, depth of field, illumination requirements
  • 83. Perimeter Security – Tools and Techniques • Focal length: The focal length of a lens defines its effectiveness in viewing objects from a horizontal and vertical view. • The sizes of images that will be shown on a monitor along with the area that can be covered by one camera are defined by focal length. o Short focal length = wider angle views o Long focal length = narrower views
  • 84. Perimeter Security – Tools and Techniques • Depth of field: Refers to the portion of the environment that is in focus. • Shallow depth of focus: Provides a softer backdrop and leads viewers to the foreground object. • Greater depth of focus: Not much distinction between objects in the foreground and background.
  • 85. Perimeter Security – Tools and Techniques • Intrusion Detection Systems (IDS) are used to detect unauthorized entries and to alert a responsible entity to respond. • Know the different types of IDS systems (electro-mechanical v. volumetric) and changes that can be detected by an IDS system.
  • 86. Perimeter Security – Tools and Techniques • Patrol Force and Guards Use in areas where critical reasoning skills are required • Auditing Physical Access Need to log and review such as Date & time of access attempt Entry point User ID Unsuccessful access attempts
  • 87. Perimeter Security – Tools and Techniques Final Concept to Guide in Assessing Physical Security Issues: o Deterrence o Delay o Detection o Assessment o Response