SlideShare une entreprise Scribd logo
1  sur  17
PHYSICAL ACCESS
CONTROLS
GENERAL SECURITY
SUBMITTED BY:
AHSIN YOUSAF: L4F15ASOC0028
03032548705
SUBMITTED TO :-
PROF JAHANZAIB MALHI
WHAT IS THE PHYSICAL ACCESS
 Physical access is a term in computer security that refers to the
ability of people to physically gain access to a computer system.
According to Gregory White, "Given physical access to an
office, the knowledgeable attacker will quickly be able to find
the information needed to gain access to the organization's
computer systems and network.
THREATS
 Internal Threats:
 Internal threats are from individuals that have legitimate access such as employees, students, and
contractors. Insiders can be extremely difficult to detect or to protect
 • access, process, and distribute pornography materials.
 • access unauthorized information (salary, secret trade).
 External Threats:
Outside intruders can be hackers/crackers, saboteurs and thieves. If the network is compromised,
Intruders can attack or misuse the system.
WHAT DO YOU NEED TO DO?
 Make sure that doors and windows are kept locked when the area is not in use.
 Return any keys when no longer required or when you leave the University.
 Report any lost keys to the issuer.
 Report any unauthorised access or any alerts (e.g. burglar alarms) to site security.
 Make sure that information on your screen cannot be seen by unauthorised individuals – use a privacy
screen if required.
CONTINUE
•Ensure that any area where restricted University information is stored or processed has controlled access
or a staffed reception desk.
•Keep a record of key holders.
•Ensure that equipment such as photocopiers, scanners and digital cameras is protected from unauthorised
access.
•Situate faxes so that unauthorised individuals cannot see information sent to the machine. If your fax is
used to send or receive confidential information, ensure you have appropriate procedures and protection in
place to secure the information.
•If you are responsible for a restricted IT space, such as a data centre, telecommunications room, wiring
centre or IT storeroom, make sure that appropriate authorisation processes for access and physical security
measures are in place.
SECURITY CONTROLS
 Security controls are safeguards or countermeasures to avoid, detect, counteract, or
minimize security risks to physical property, information, computer systems, or other assets.
 They can be classified by several criteria.
 Before the event, preventive controls are intended to prevent an incident from occurring e.g. by
locking out unauthorized intruders;
 During the event, detective controls are intended to identify and characterize an incident in progress
e.g. by sounding the intruder alarm and alerting the security guards or police;
 After the event, corrective controls are intended to limit the extent of any damage caused by the
incident e.g. by recovering the organization to normal working status as efficiently as possible
PHYSICAL SECURITY
 Physical security is the protection of
personnel, hardware, software, networks and data from physical actions and events that
could cause serious loss or damage to an enterprise, agency or institution. This includes
protection from fire, flood, natural disasters, burglary, theft, vandalism and terrorism.
WHAT ARE PHYSICAL ACCESS CONTROLS?
CONTROLS
 CCTV
 A Biometric device
 Metal detectors
 Locks
 Lighting.
 Portable device security
 Alarm systems
 Doors
 Windows
 Emergency procedure
 On-going employee checks
 Electrical power
CCTV & DEPLOYMENT
 A television transmission system that uses cameras to transmit pictures to connected monitors
 Detection: The ability to detect the presence of an object
 Recognition: The ability to determine the type of object (animal, blowing debris, crawling human)
 • Cameras high enough to avoid physical attack
 • Cameras distributed to include blind areas
 • Appropriate Lenses must be high definition
 • Pan, Tilt, Zoom (PTZ) as required
 • Ability to be recorded
 • Camera system tied to alarm system.
A BIOMETRIC DEVICE
 It is a security identification and authentication device. Such devices verifying the identity of a living
person based on a physiological or behavioral characteristic.
These characteristics include:
 Fingerprint scanners
 Face and voice recognition systems
 Iris and retinal scans
METAL DETECTORS
SECURITY GUARD
 A metal detector is an electronic instrument which detects the presence of metal nearby. Metal
detectors are useful for finding metal inclusions hidden within objects, or metal objects buried
underground.
 Security guards use the metal detector and check every in going and out going person. That they any
harmful things or not. If they have any kind of these things they investigate on it.
 Also check that in going people are authorized or unauthorized.
LIGHTING
 • Provides a deterrent to intruders
 • Makes detection likely if entry attempted
 • Should be used with other controls such as fences, patrols, alarm systems, CCTV.
Types of lighting
 • Continuous Lighting (Most Common)
 – Glare Projection
 – Flood Lighting
 Trip Lighting , Standby Lighting , Movable (Portable) , Emergency Lighting.
PORTABLE DEVICE SECURITY
 Laptops, PDAs, Etc.
 Protect the device
 Protect the data in the device
 Examples: –
 Locking the cables – Tracing software – Encryption software – PIN Protection for PDAs – Inventory
system
ALARM SYSTEMS
 • Local alarm systems
 – Alarm sounds locally and must be protected from tampering and audible for at least 400 feet
 • Central station units
 – Monitored 7x24 and signalled over leased lines
 – Usually within < 10 minutes travel time
 – Private security firms
 Proprietary systems
 – Similar to central but owned and operated by customer

Contenu connexe

Tendances

7. physical sec
7. physical sec7. physical sec
7. physical sec
7wounders
 
Information Security Principles - Access Control
Information Security  Principles -  Access ControlInformation Security  Principles -  Access Control
Information Security Principles - Access Control
idingolay
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
Wajahat Rajab
 
Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Security
leminhvuong
 

Tendances (20)

Information Security Policies and Standards
Information Security Policies and StandardsInformation Security Policies and Standards
Information Security Policies and Standards
 
Physical Security.ppt
Physical Security.pptPhysical Security.ppt
Physical Security.ppt
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
 
Incident response
Incident responseIncident response
Incident response
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Personnel security
Personnel securityPersonnel security
Personnel security
 
7. physical sec
7. physical sec7. physical sec
7. physical sec
 
Access Controls
Access ControlsAccess Controls
Access Controls
 
An overview of access control
An overview of access controlAn overview of access control
An overview of access control
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
Information Security Principles - Access Control
Information Security  Principles -  Access ControlInformation Security  Principles -  Access Control
Information Security Principles - Access Control
 
Digital investigation
Digital investigationDigital investigation
Digital investigation
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
Physical Security.ppt
Physical Security.pptPhysical Security.ppt
Physical Security.ppt
 
Information security
Information securityInformation security
Information security
 
8 Access Control
8 Access Control8 Access Control
8 Access Control
 
Physical Security Management System
Physical Security Management SystemPhysical Security Management System
Physical Security Management System
 
Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Security
 

Similaire à Physical access control

Physical security.docx
Physical security.docxPhysical security.docx
Physical security.docx
MVNVKUMAR
 
Physical security is a fundamental component of any secure infrastru.pdf
Physical security is a fundamental component of any secure infrastru.pdfPhysical security is a fundamental component of any secure infrastru.pdf
Physical security is a fundamental component of any secure infrastru.pdf
feelinggift
 
Basic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpageBasic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpage
nakomuri
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
learnt
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & Cyber
Paul Andrews
 
Intrusion Detection & Electronic Surveillance For Security
Intrusion Detection & Electronic Surveillance For SecurityIntrusion Detection & Electronic Surveillance For Security
Intrusion Detection & Electronic Surveillance For Security
PLN9 Security Services Pvt. Ltd.
 

Similaire à Physical access control (20)

Physical security.docx
Physical security.docxPhysical security.docx
Physical security.docx
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issues
 
Physical security is a fundamental component of any secure infrastru.pdf
Physical security is a fundamental component of any secure infrastru.pdfPhysical security is a fundamental component of any secure infrastru.pdf
Physical security is a fundamental component of any secure infrastru.pdf
 
INFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMINFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEM
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
Basic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpageBasic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpage
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
Secure physical infrastructure
Secure physical infrastructureSecure physical infrastructure
Secure physical infrastructure
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & Cyber
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & Cyber
 
Smart
SmartSmart
Smart
 
Securing embedded systems
Securing embedded systemsSecuring embedded systems
Securing embedded systems
 
Security Intrusion Detection & Electronic Surveillance
Security Intrusion Detection & Electronic SurveillanceSecurity Intrusion Detection & Electronic Surveillance
Security Intrusion Detection & Electronic Surveillance
 
Intrusion Detection & Electronic Surveillance For Security
Intrusion Detection & Electronic Surveillance For SecurityIntrusion Detection & Electronic Surveillance For Security
Intrusion Detection & Electronic Surveillance For Security
 
Physical Penetration Testing - RootedCON 2015
Physical Penetration Testing - RootedCON 2015Physical Penetration Testing - RootedCON 2015
Physical Penetration Testing - RootedCON 2015
 
Physical Penetration Testing (RootedCON 2015)
Physical Penetration Testing (RootedCON 2015)Physical Penetration Testing (RootedCON 2015)
Physical Penetration Testing (RootedCON 2015)
 
computer security .ppt
computer security .pptcomputer security .ppt
computer security .ppt
 
INTRODUCTION TO SECURITY
INTRODUCTION TO SECURITYINTRODUCTION TO SECURITY
INTRODUCTION TO SECURITY
 
TSCM Overview for Stakeholders
TSCM Overview for StakeholdersTSCM Overview for Stakeholders
TSCM Overview for Stakeholders
 

Plus de Ahsin Yousaf

Database Security Management
Database Security Management Database Security Management
Database Security Management
Ahsin Yousaf
 
Corporate law in pakistan
Corporate law in pakistanCorporate law in pakistan
Corporate law in pakistan
Ahsin Yousaf
 

Plus de Ahsin Yousaf (7)

Database Security Management
Database Security Management Database Security Management
Database Security Management
 
Corporate law in pakistan
Corporate law in pakistanCorporate law in pakistan
Corporate law in pakistan
 
Register Dld project
Register Dld projectRegister Dld project
Register Dld project
 
Three step writing process bovee by ahsin yousaf
Three step writing process bovee by ahsin yousafThree step writing process bovee by ahsin yousaf
Three step writing process bovee by ahsin yousaf
 
Financial Accounting presentation
Financial Accounting presentationFinancial Accounting presentation
Financial Accounting presentation
 
Bcrw
BcrwBcrw
Bcrw
 
Global market place
Global market placeGlobal market place
Global market place
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 

Physical access control

  • 2. SUBMITTED BY: AHSIN YOUSAF: L4F15ASOC0028 03032548705 SUBMITTED TO :- PROF JAHANZAIB MALHI
  • 3. WHAT IS THE PHYSICAL ACCESS  Physical access is a term in computer security that refers to the ability of people to physically gain access to a computer system. According to Gregory White, "Given physical access to an office, the knowledgeable attacker will quickly be able to find the information needed to gain access to the organization's computer systems and network.
  • 4.
  • 5. THREATS  Internal Threats:  Internal threats are from individuals that have legitimate access such as employees, students, and contractors. Insiders can be extremely difficult to detect or to protect  • access, process, and distribute pornography materials.  • access unauthorized information (salary, secret trade).  External Threats: Outside intruders can be hackers/crackers, saboteurs and thieves. If the network is compromised, Intruders can attack or misuse the system.
  • 6. WHAT DO YOU NEED TO DO?  Make sure that doors and windows are kept locked when the area is not in use.  Return any keys when no longer required or when you leave the University.  Report any lost keys to the issuer.  Report any unauthorised access or any alerts (e.g. burglar alarms) to site security.  Make sure that information on your screen cannot be seen by unauthorised individuals – use a privacy screen if required.
  • 7. CONTINUE •Ensure that any area where restricted University information is stored or processed has controlled access or a staffed reception desk. •Keep a record of key holders. •Ensure that equipment such as photocopiers, scanners and digital cameras is protected from unauthorised access. •Situate faxes so that unauthorised individuals cannot see information sent to the machine. If your fax is used to send or receive confidential information, ensure you have appropriate procedures and protection in place to secure the information. •If you are responsible for a restricted IT space, such as a data centre, telecommunications room, wiring centre or IT storeroom, make sure that appropriate authorisation processes for access and physical security measures are in place.
  • 8. SECURITY CONTROLS  Security controls are safeguards or countermeasures to avoid, detect, counteract, or minimize security risks to physical property, information, computer systems, or other assets.  They can be classified by several criteria.  Before the event, preventive controls are intended to prevent an incident from occurring e.g. by locking out unauthorized intruders;  During the event, detective controls are intended to identify and characterize an incident in progress e.g. by sounding the intruder alarm and alerting the security guards or police;  After the event, corrective controls are intended to limit the extent of any damage caused by the incident e.g. by recovering the organization to normal working status as efficiently as possible
  • 9. PHYSICAL SECURITY  Physical security is the protection of personnel, hardware, software, networks and data from physical actions and events that could cause serious loss or damage to an enterprise, agency or institution. This includes protection from fire, flood, natural disasters, burglary, theft, vandalism and terrorism.
  • 10. WHAT ARE PHYSICAL ACCESS CONTROLS?
  • 11. CONTROLS  CCTV  A Biometric device  Metal detectors  Locks  Lighting.  Portable device security  Alarm systems  Doors  Windows  Emergency procedure  On-going employee checks  Electrical power
  • 12. CCTV & DEPLOYMENT  A television transmission system that uses cameras to transmit pictures to connected monitors  Detection: The ability to detect the presence of an object  Recognition: The ability to determine the type of object (animal, blowing debris, crawling human)  • Cameras high enough to avoid physical attack  • Cameras distributed to include blind areas  • Appropriate Lenses must be high definition  • Pan, Tilt, Zoom (PTZ) as required  • Ability to be recorded  • Camera system tied to alarm system.
  • 13. A BIOMETRIC DEVICE  It is a security identification and authentication device. Such devices verifying the identity of a living person based on a physiological or behavioral characteristic. These characteristics include:  Fingerprint scanners  Face and voice recognition systems  Iris and retinal scans
  • 14. METAL DETECTORS SECURITY GUARD  A metal detector is an electronic instrument which detects the presence of metal nearby. Metal detectors are useful for finding metal inclusions hidden within objects, or metal objects buried underground.  Security guards use the metal detector and check every in going and out going person. That they any harmful things or not. If they have any kind of these things they investigate on it.  Also check that in going people are authorized or unauthorized.
  • 15. LIGHTING  • Provides a deterrent to intruders  • Makes detection likely if entry attempted  • Should be used with other controls such as fences, patrols, alarm systems, CCTV. Types of lighting  • Continuous Lighting (Most Common)  – Glare Projection  – Flood Lighting  Trip Lighting , Standby Lighting , Movable (Portable) , Emergency Lighting.
  • 16. PORTABLE DEVICE SECURITY  Laptops, PDAs, Etc.  Protect the device  Protect the data in the device  Examples: –  Locking the cables – Tracing software – Encryption software – PIN Protection for PDAs – Inventory system
  • 17. ALARM SYSTEMS  • Local alarm systems  – Alarm sounds locally and must be protected from tampering and audible for at least 400 feet  • Central station units  – Monitored 7x24 and signalled over leased lines  – Usually within < 10 minutes travel time  – Private security firms  Proprietary systems  – Similar to central but owned and operated by customer