SlideShare a Scribd company logo
1 of 29
Presented by:
Pallavi Agarwal
What is Physical Infrastructure
● The physical infrastructure is the foundation on which all
enterprise systems operate – power, communication, computing,
control and security. Research shows that faults within the
physical infrastructure cause a majority of system downtime.
Secure physical infrastructure
● Security can be best achieved by ensuring multiple layers
of security and not depending on a single measure. The
controls for physical and environmental security are
defined in three areas:
– Security of the premise
– Security of the equipment
– Secure behavior
Security Of The Premise
Components:-
● Physical security perimeter
● Physical entry controls
● Securing offices, rooms and facilities
● Isolated delivery and loading areas
● Working in secure areas
Physical security perimeter
 boundary of the premise
 entry points
 protective wall
 doors strong enough
 Entry gates controlled by cards
 watchmen, guards or receptionist monitoring the
entry points
Physical entry controls
 Only authorized persons should be allowed access to
the secure areas.
 This objective could be achieved by having a clear
access control policy defining the access rights.
 These measures may take the form of access controlled
devices like swipe card controlled doors, logging
information about visitors and visible identification
badges.
Securing offices, rooms and
facilities
 Support facilities like photocopier, fax machines, which
are constantly accessed by everyone, should be located
away from the secure area.
 Suitable intruder detection systems like CCTV, motion
sensors etc. should be installed and regularly tested.
Working in secure areas
 Location of the secure office within the physically
secure perimeter should be chosen with care.
 All the risks pertaining to fire, flood, explosion, civil
unrest and other forms of natural or man made disaster
should be considered.
 There could also be threat from neighboring premises
caused by leakage of water, spreading of fire or storage
of toxic/inflammable/explosive material.
 Even bulk supplies like stationery should not be stored
within the secure premises.
Isolated delivery and loading
areas
 In industrial premises there could be constant
movement of incoming and outgoing material.
 All this traffic needs to be isolated from the secure office
area so that it does not pose a threat.
Security Of The Equipment
Components:
● Equipment sitting and protection
● Power supplies
● Cabling Security
● Equipment Maintenance
● Security of equipment off-premises
● Secure disposal or re-use of equipment
Equipment sitting and protection
 Information processing equipment needs to be
handled carefully.
 It reduce the risk from environmental threats and
hazards.
 Reduce opportunity for unauthorized access.
Power supplies
 Information processing will come to a halt in the
absence of a suitable power supply.
 So equipment should be protected from power failure.
Cabling Security
 Power and telecommunication cabling carrying data
or supporting information services shall be protected
from interception or damage
Equipment Maintenance
 It is normally expected that due care is taken for
equipment maintenance and proper records are
maintained.
 One is to maintain record of faults that were noticed
and the second step is to maintain records of all
equipment sent off the premises for maintenance.
Security of equipment off-premises
 Security procedures and controls shall be used to
secure equipment used outside any company’s
premies
Secure disposal or re-use of equipment
 Every such device should be subjected to a thorough
erasing and overwriting to destroy the data.
 Since some reports claim that the data could be
recovered even after multiple overwriting and
formatting, it may be desirable to physically destroy
the media containing top secret information.
Secure Behaviour
Components
● Clear desk and clear screen policy
● Removal of property
Clear desk and clear screen policy
 Lock up all documents and media when not used.
 Protect the computers and terminals through use of key
locks, passwords, and screen savers.
 Fax and telex machines used for confidential
information should not be left unattended.
 Access to photocopiers and scanners is restricted after
office hours.
 Printing of classified information should be supervised
and all printouts must be removed immediately.
Removal of property
 Any movement of equipment, information or software
should be only with proper authorization.
 All these movements should be logged and records
maintained for all outgoing and incoming items.
Enterprise-wide
security framework
Introduction
 Traditionally, organizations have relied on policies.
 These documents, once issued, provide top down
influence for everyone in the company—from
business units to departments to individual
employees.
 One of the major challenges for an organization in
this area is the continued growth and adaptation of
the policies to mirror the transformation within the
organization.
Contd…
 The fastest area of growth and change within an
organization is Information Systems. With the rapid
development and push toward new technologies,
organizations find themselves striving to maintain
current technical environments with outdated
policies.
 Secondly, with the emergence of new technology
strategies such as Intranets and Extranets, security
and the protection of informational assets has
become paramount.
Contd…
 The first step is an enterprise-wide Information
Systems Security Policy that is consistently enforced
even as business needs change.
 Unfortunately, most companies have only bits and
pieces of security scattered throughout the
organization. These may make some departments or
individuals feel safe, but they do little to protect the
enterprise as a whole.
What is PPT methodology?
 PPT stands for People, Policy, & Technology. The
security process is a mixture of these three elements.
Each element depends in some manner on the other
elements.
People
 This core element is the most important. The people
element comprises the people and various roles and
responsibilities within the organization.
 These are the people that are put in place to execute
and support the process.
 A few key roles include senior management, security
administrators, system and IT administrators, end
users, and auditors.
Policy
 This element comprises the security vision statement,
security policy and standards, and the control
documentation.
 This is basically the written security environment—
the bible that the security process will refer to for
direction and guidance.
Technology
 This element includes tools, methods, and
mechanisms in place to support the process.
 These are core technologies—the operating systems,
the databases, the applications, the security tools—
embraced by the organization.
 The technology then is the enforcement, monitoring,
and operational tool that will facilitate the process.
Secure physical infrastructure

More Related Content

What's hot

ELEMENTS OF TRANSPORT PROTOCOL
ELEMENTS OF TRANSPORT PROTOCOLELEMENTS OF TRANSPORT PROTOCOL
ELEMENTS OF TRANSPORT PROTOCOLShashank Rustagi
 
Real estate presentation ppt
Real estate presentation pptReal estate presentation ppt
Real estate presentation pptPavanJadhav33
 
computer networking and its application ppt
computer networking and its application pptcomputer networking and its application ppt
computer networking and its application pptNitesh Dubey
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signaturesRohit Bhat
 
Designing of packaging materials for international market
Designing of packaging materials for international marketDesigning of packaging materials for international market
Designing of packaging materials for international marketMegha BHardwaj
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructurevimal kumar
 
An Analysis of SAFTA in the Context of Bangladesh
An Analysis of SAFTA in the Context of BangladeshAn Analysis of SAFTA in the Context of Bangladesh
An Analysis of SAFTA in the Context of BangladeshMd. Joynal Abdin
 
Smart City Mission (India)
Smart City Mission (India)Smart City Mission (India)
Smart City Mission (India)divyanshbatham
 
Bhiwandi industrial demand supply Real estate
Bhiwandi industrial demand supply Real estate Bhiwandi industrial demand supply Real estate
Bhiwandi industrial demand supply Real estate sunil seth kakkad
 
Perimeter Intrusion Detection System | PIDS | GMAX
Perimeter Intrusion Detection System | PIDS | GMAXPerimeter Intrusion Detection System | PIDS | GMAX
Perimeter Intrusion Detection System | PIDS | GMAXMaybei Maybeyou
 

What's hot (20)

ELEMENTS OF TRANSPORT PROTOCOL
ELEMENTS OF TRANSPORT PROTOCOLELEMENTS OF TRANSPORT PROTOCOL
ELEMENTS OF TRANSPORT PROTOCOL
 
TDR - TRANSFER OF DEVELOPMENT RIGHTS
TDR - TRANSFER OF DEVELOPMENT RIGHTSTDR - TRANSFER OF DEVELOPMENT RIGHTS
TDR - TRANSFER OF DEVELOPMENT RIGHTS
 
Real estate presentation ppt
Real estate presentation pptReal estate presentation ppt
Real estate presentation ppt
 
Iot
IotIot
Iot
 
computer networking and its application ppt
computer networking and its application pptcomputer networking and its application ppt
computer networking and its application ppt
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
Designing of packaging materials for international market
Designing of packaging materials for international marketDesigning of packaging materials for international market
Designing of packaging materials for international market
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
 
Smart devices
Smart devicesSmart devices
Smart devices
 
An Analysis of SAFTA in the Context of Bangladesh
An Analysis of SAFTA in the Context of BangladeshAn Analysis of SAFTA in the Context of Bangladesh
An Analysis of SAFTA in the Context of Bangladesh
 
Smart City Mission (India)
Smart City Mission (India)Smart City Mission (India)
Smart City Mission (India)
 
Operations of air cargo
Operations of air cargoOperations of air cargo
Operations of air cargo
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Bhiwandi industrial demand supply Real estate
Bhiwandi industrial demand supply Real estate Bhiwandi industrial demand supply Real estate
Bhiwandi industrial demand supply Real estate
 
Perimeter Intrusion Detection System | PIDS | GMAX
Perimeter Intrusion Detection System | PIDS | GMAXPerimeter Intrusion Detection System | PIDS | GMAX
Perimeter Intrusion Detection System | PIDS | GMAX
 
smart Home security
smart Home securitysmart Home security
smart Home security
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Domain specific IoT
Domain specific IoTDomain specific IoT
Domain specific IoT
 
ppt on FTP 2023.pptx
ppt on FTP 2023.pptxppt on FTP 2023.pptx
ppt on FTP 2023.pptx
 
Wireless Local Loop
Wireless Local LoopWireless Local Loop
Wireless Local Loop
 

Similar to Secure physical infrastructure

PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental ControlsPACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental ControlsPace IT at Edmonds Community College
 
11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docxmoggdede
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatanceKudzi Chikwatu
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security BackgroundNicholas Davis
 
Information security background
Information security backgroundInformation security background
Information security backgroundNicholas Davis
 
Take the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security ProtectionTake the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security ProtectionVTECH SOLUTION
 
Week 11 - Physical 2.pdf
Week 11 - Physical 2.pdfWeek 11 - Physical 2.pdf
Week 11 - Physical 2.pdfVinc2ntCabrera
 
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newJupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newMaxpromotion
 
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newJupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newMaxpromotion
 
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newJupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newMaxpromotion
 
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newJupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newMaxpromotion
 
IT Network Security Policy
IT Network Security PolicyIT Network Security Policy
IT Network Security Policyssuser06c4a6
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security madunix
 
CYBERSECURITY.pptx
CYBERSECURITY.pptxCYBERSECURITY.pptx
CYBERSECURITY.pptxItzRoswell1
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMChristopher Nanchengwa
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence SystemJoseph Yosi Margalit
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxMohanPandey31
 

Similar to Secure physical infrastructure (20)

PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental ControlsPACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
 
11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
08 pdf show-239
08   pdf show-23908   pdf show-239
08 pdf show-239
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatance
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
 
Information security background
Information security backgroundInformation security background
Information security background
 
Take the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security ProtectionTake the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security Protection
 
Week 11 - Physical 2.pdf
Week 11 - Physical 2.pdfWeek 11 - Physical 2.pdf
Week 11 - Physical 2.pdf
 
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newJupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 new
 
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newJupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 new
 
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newJupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 new
 
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newJupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 new
 
IT Network Security Policy
IT Network Security PolicyIT Network Security Policy
IT Network Security Policy
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 
CYBERSECURITY.pptx
CYBERSECURITY.pptxCYBERSECURITY.pptx
CYBERSECURITY.pptx
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
 
Information Security - I.T Project Management
Information Security - I.T Project ManagementInformation Security - I.T Project Management
Information Security - I.T Project Management
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence System
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptx
 

More from Pallavi Agarwal

Smoothing in Digital Image Processing
Smoothing in Digital Image ProcessingSmoothing in Digital Image Processing
Smoothing in Digital Image ProcessingPallavi Agarwal
 
Presentation on Software Piracy
Presentation on Software PiracyPresentation on Software Piracy
Presentation on Software PiracyPallavi Agarwal
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETPallavi Agarwal
 
VANET for Security using Cryptography
VANET for Security using Cryptography VANET for Security using Cryptography
VANET for Security using Cryptography Pallavi Agarwal
 
VANET: Trust and Hashing
VANET: Trust and HashingVANET: Trust and Hashing
VANET: Trust and HashingPallavi Agarwal
 
Overview of Trust and Cryptography in VANET
Overview of Trust and Cryptography in VANET Overview of Trust and Cryptography in VANET
Overview of Trust and Cryptography in VANET Pallavi Agarwal
 
Security and Trust Management in VANET
Security and Trust Management in VANETSecurity and Trust Management in VANET
Security and Trust Management in VANETPallavi Agarwal
 

More from Pallavi Agarwal (10)

Smoothing in Digital Image Processing
Smoothing in Digital Image ProcessingSmoothing in Digital Image Processing
Smoothing in Digital Image Processing
 
Facial Recognition
Facial RecognitionFacial Recognition
Facial Recognition
 
Presentation on Software Piracy
Presentation on Software PiracyPresentation on Software Piracy
Presentation on Software Piracy
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANET
 
VANET for Security using Cryptography
VANET for Security using Cryptography VANET for Security using Cryptography
VANET for Security using Cryptography
 
Introduction of VANET
Introduction of VANETIntroduction of VANET
Introduction of VANET
 
VANET: Trust and Hashing
VANET: Trust and HashingVANET: Trust and Hashing
VANET: Trust and Hashing
 
Overview of Trust and Cryptography in VANET
Overview of Trust and Cryptography in VANET Overview of Trust and Cryptography in VANET
Overview of Trust and Cryptography in VANET
 
Security and Trust Management in VANET
Security and Trust Management in VANETSecurity and Trust Management in VANET
Security and Trust Management in VANET
 
Review Paper on VANET
Review Paper on VANETReview Paper on VANET
Review Paper on VANET
 

Recently uploaded

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 

Recently uploaded (20)

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 

Secure physical infrastructure

  • 2. What is Physical Infrastructure ● The physical infrastructure is the foundation on which all enterprise systems operate – power, communication, computing, control and security. Research shows that faults within the physical infrastructure cause a majority of system downtime.
  • 3. Secure physical infrastructure ● Security can be best achieved by ensuring multiple layers of security and not depending on a single measure. The controls for physical and environmental security are defined in three areas: – Security of the premise – Security of the equipment – Secure behavior
  • 4. Security Of The Premise Components:- ● Physical security perimeter ● Physical entry controls ● Securing offices, rooms and facilities ● Isolated delivery and loading areas ● Working in secure areas
  • 5. Physical security perimeter  boundary of the premise  entry points  protective wall  doors strong enough  Entry gates controlled by cards  watchmen, guards or receptionist monitoring the entry points
  • 6. Physical entry controls  Only authorized persons should be allowed access to the secure areas.  This objective could be achieved by having a clear access control policy defining the access rights.  These measures may take the form of access controlled devices like swipe card controlled doors, logging information about visitors and visible identification badges.
  • 7. Securing offices, rooms and facilities  Support facilities like photocopier, fax machines, which are constantly accessed by everyone, should be located away from the secure area.  Suitable intruder detection systems like CCTV, motion sensors etc. should be installed and regularly tested.
  • 8. Working in secure areas  Location of the secure office within the physically secure perimeter should be chosen with care.  All the risks pertaining to fire, flood, explosion, civil unrest and other forms of natural or man made disaster should be considered.  There could also be threat from neighboring premises caused by leakage of water, spreading of fire or storage of toxic/inflammable/explosive material.  Even bulk supplies like stationery should not be stored within the secure premises.
  • 9. Isolated delivery and loading areas  In industrial premises there could be constant movement of incoming and outgoing material.  All this traffic needs to be isolated from the secure office area so that it does not pose a threat.
  • 10. Security Of The Equipment Components: ● Equipment sitting and protection ● Power supplies ● Cabling Security ● Equipment Maintenance ● Security of equipment off-premises ● Secure disposal or re-use of equipment
  • 11. Equipment sitting and protection  Information processing equipment needs to be handled carefully.  It reduce the risk from environmental threats and hazards.  Reduce opportunity for unauthorized access.
  • 12. Power supplies  Information processing will come to a halt in the absence of a suitable power supply.  So equipment should be protected from power failure.
  • 13. Cabling Security  Power and telecommunication cabling carrying data or supporting information services shall be protected from interception or damage
  • 14. Equipment Maintenance  It is normally expected that due care is taken for equipment maintenance and proper records are maintained.  One is to maintain record of faults that were noticed and the second step is to maintain records of all equipment sent off the premises for maintenance.
  • 15. Security of equipment off-premises  Security procedures and controls shall be used to secure equipment used outside any company’s premies
  • 16. Secure disposal or re-use of equipment  Every such device should be subjected to a thorough erasing and overwriting to destroy the data.  Since some reports claim that the data could be recovered even after multiple overwriting and formatting, it may be desirable to physically destroy the media containing top secret information.
  • 17. Secure Behaviour Components ● Clear desk and clear screen policy ● Removal of property
  • 18. Clear desk and clear screen policy  Lock up all documents and media when not used.  Protect the computers and terminals through use of key locks, passwords, and screen savers.  Fax and telex machines used for confidential information should not be left unattended.  Access to photocopiers and scanners is restricted after office hours.  Printing of classified information should be supervised and all printouts must be removed immediately.
  • 19. Removal of property  Any movement of equipment, information or software should be only with proper authorization.  All these movements should be logged and records maintained for all outgoing and incoming items.
  • 21. Introduction  Traditionally, organizations have relied on policies.  These documents, once issued, provide top down influence for everyone in the company—from business units to departments to individual employees.  One of the major challenges for an organization in this area is the continued growth and adaptation of the policies to mirror the transformation within the organization.
  • 22. Contd…  The fastest area of growth and change within an organization is Information Systems. With the rapid development and push toward new technologies, organizations find themselves striving to maintain current technical environments with outdated policies.  Secondly, with the emergence of new technology strategies such as Intranets and Extranets, security and the protection of informational assets has become paramount.
  • 23. Contd…  The first step is an enterprise-wide Information Systems Security Policy that is consistently enforced even as business needs change.  Unfortunately, most companies have only bits and pieces of security scattered throughout the organization. These may make some departments or individuals feel safe, but they do little to protect the enterprise as a whole.
  • 24. What is PPT methodology?  PPT stands for People, Policy, & Technology. The security process is a mixture of these three elements. Each element depends in some manner on the other elements.
  • 25.
  • 26. People  This core element is the most important. The people element comprises the people and various roles and responsibilities within the organization.  These are the people that are put in place to execute and support the process.  A few key roles include senior management, security administrators, system and IT administrators, end users, and auditors.
  • 27. Policy  This element comprises the security vision statement, security policy and standards, and the control documentation.  This is basically the written security environment— the bible that the security process will refer to for direction and guidance.
  • 28. Technology  This element includes tools, methods, and mechanisms in place to support the process.  These are core technologies—the operating systems, the databases, the applications, the security tools— embraced by the organization.  The technology then is the enforcement, monitoring, and operational tool that will facilitate the process.