SlideShare une entreprise Scribd logo
1  sur  34
Chapter 8 Physical Security
Objectives ,[object Object],[object Object],[object Object],[object Object]
Physical Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Problems of Dispersion and Diversity ,[object Object],[object Object],[object Object],[object Object],[object Object]
Problems of Dispersion and Diversity ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Joy of Secure Space  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Joy of Secure Space  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Physical Security Process and Plan ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Physical Security Process ,[object Object],[object Object],[object Object],[object Object],[object Object]
Physical Security Plan ,[object Object],[object Object],[object Object],[object Object]
Physical Security Plan ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Physical Security Plan ,[object Object],[object Object],[object Object],[object Object],[object Object]
Physical Security Targets and Threats   ,[object Object],[object Object],[object Object],[object Object],[object Object]
Threats to the Facility ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Threats to the Facility ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Safeguarding  Equipment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Safeguarding  Equipment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Safeguarding  Equipment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Controlling Access by People ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Controlling Access by People ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Controlling Access by People ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Controlling Access by People ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Controlling Access by People ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Controlling Access by People ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Controlling Access by People ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Controlling Access by People ,[object Object],[object Object],[object Object],[object Object],[object Object]
Controlling Access by People ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Controlling Access by People ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mitigating the Effects of Natural Disasters and Fires ,[object Object],[object Object],[object Object],[object Object],[object Object]
Mitigating the Effects of Natural Disasters and Fires ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mitigating the Effects of Natural Disasters and Fires ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mitigating the Effects of Natural Disasters and Fires ,[object Object],[object Object],[object Object]
Mitigating the Effects of Natural Disasters and Fires ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mitigating the Effects of Natural Disasters and Fires ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances

Rothke Patchlink
Rothke    PatchlinkRothke    Patchlink
Rothke PatchlinkBen Rothke
 
The information security audit
The information security auditThe information security audit
The information security auditDhani Ahmad
 
IT Audit methodologies
IT Audit methodologiesIT Audit methodologies
IT Audit methodologiesgenetics
 
Information system audit 2
Information system audit 2 Information system audit 2
Information system audit 2 Jayant Dalvi
 
Developing ics cyber security improvement plan(5)
Developing ics cyber security improvement plan(5)Developing ics cyber security improvement plan(5)
Developing ics cyber security improvement plan(5)Nicole Valerio
 
Security Audit Best-Practices
Security Audit Best-PracticesSecurity Audit Best-Practices
Security Audit Best-PracticesMarco Raposo
 
Information Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management FrameworkInformation Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management FrameworkWilliam McBorrough
 
Security Baselines and Risk Assessments
Security Baselines and Risk AssessmentsSecurity Baselines and Risk Assessments
Security Baselines and Risk AssessmentsPriyank Hada
 
HIPAA and Security Management for Physician Practices
HIPAA and Security Management for Physician PracticesHIPAA and Security Management for Physician Practices
HIPAA and Security Management for Physician PracticesCole Libby
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life CycleUnderstanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life CycleDonald E. Hester
 
General and Application Control - Security and Control Issues in Informatio...
General and Application Control - Security  and Control Issues in  Informatio...General and Application Control - Security  and Control Issues in  Informatio...
General and Application Control - Security and Control Issues in Informatio...Dr. Rosemarie Sibbaluca-Guirre
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniYaser Alrefai
 
Security
SecuritySecurity
Securitya1aass
 

Tendances (20)

Rothke Patchlink
Rothke    PatchlinkRothke    Patchlink
Rothke Patchlink
 
The information security audit
The information security auditThe information security audit
The information security audit
 
IT Audit methodologies
IT Audit methodologiesIT Audit methodologies
IT Audit methodologies
 
System Security Plans 101
System Security Plans 101System Security Plans 101
System Security Plans 101
 
Information system audit 2
Information system audit 2 Information system audit 2
Information system audit 2
 
Developing ics cyber security improvement plan(5)
Developing ics cyber security improvement plan(5)Developing ics cyber security improvement plan(5)
Developing ics cyber security improvement plan(5)
 
Security Audit Best-Practices
Security Audit Best-PracticesSecurity Audit Best-Practices
Security Audit Best-Practices
 
IS audit checklist
IS audit checklistIS audit checklist
IS audit checklist
 
Information Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management FrameworkInformation Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management Framework
 
Chapter003
Chapter003Chapter003
Chapter003
 
Security Baselines and Risk Assessments
Security Baselines and Risk AssessmentsSecurity Baselines and Risk Assessments
Security Baselines and Risk Assessments
 
IT System & Security Audit
IT System & Security AuditIT System & Security Audit
IT System & Security Audit
 
Auditing information System
Auditing information SystemAuditing information System
Auditing information System
 
HIPAA and Security Management for Physician Practices
HIPAA and Security Management for Physician PracticesHIPAA and Security Management for Physician Practices
HIPAA and Security Management for Physician Practices
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life CycleUnderstanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
 
General and Application Control - Security and Control Issues in Informatio...
General and Application Control - Security  and Control Issues in  Informatio...General and Application Control - Security  and Control Issues in  Informatio...
General and Application Control - Security and Control Issues in Informatio...
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
E1804012536
E1804012536E1804012536
E1804012536
 
Security and Control Issues in information Systems
Security and Control Issues in information SystemsSecurity and Control Issues in information Systems
Security and Control Issues in information Systems
 
Security
SecuritySecurity
Security
 

En vedette (20)

ISM424 RM
ISM424 RMISM424 RM
ISM424 RM
 
Henz new
Henz newHenz new
Henz new
 
Honey
HoneyHoney
Honey
 
Chapter006
Chapter006Chapter006
Chapter006
 
01 Introduction
01 Introduction01 Introduction
01 Introduction
 
02 Computer Evolution And Performance
02  Computer  Evolution And  Performance02  Computer  Evolution And  Performance
02 Computer Evolution And Performance
 
abc
abcabc
abc
 
02 computer evolution and performance
02 computer evolution and performance02 computer evolution and performance
02 computer evolution and performance
 
03 Buses
03 Buses03 Buses
03 Buses
 
Powerpoint Exercise 2
Powerpoint Exercise 2Powerpoint Exercise 2
Powerpoint Exercise 2
 
10 Instruction Sets Characteristics
10  Instruction  Sets Characteristics10  Instruction  Sets Characteristics
10 Instruction Sets Characteristics
 
Pentium 3
Pentium 3Pentium 3
Pentium 3
 
09 Arithmetic
09  Arithmetic09  Arithmetic
09 Arithmetic
 
06 External Memory
06  External  Memory06  External  Memory
06 External Memory
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
08 Operating System Support
08  Operating  System  Support08  Operating  System  Support
08 Operating System Support
 
07 Input Output
07  Input  Output07  Input  Output
07 Input Output
 
05 Internal Memory
05  Internal  Memory05  Internal  Memory
05 Internal Memory
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 

Similaire à Chapter008

4. Define communication security, information security, network secu.pdf
4. Define communication security, information security, network secu.pdf4. Define communication security, information security, network secu.pdf
4. Define communication security, information security, network secu.pdfarvindarora20042013
 
Beyond Firewalls: The Unsung Hero of Cybersecurity - Physical Architecture By...
Beyond Firewalls: The Unsung Hero of Cybersecurity - Physical Architecture By...Beyond Firewalls: The Unsung Hero of Cybersecurity - Physical Architecture By...
Beyond Firewalls: The Unsung Hero of Cybersecurity - Physical Architecture By...Cybernous Cyber security training
 
Decision-Making Support in Biometric-Based Physical Access Control Systems
Decision-Making Support in Biometric-Based Physical Access Control SystemsDecision-Making Support in Biometric-Based Physical Access Control Systems
Decision-Making Support in Biometric-Based Physical Access Control SystemsSahithiKotha2
 
Operations SecurityWeek 5Incident Management, Investigatio.docx
Operations SecurityWeek 5Incident Management, Investigatio.docxOperations SecurityWeek 5Incident Management, Investigatio.docx
Operations SecurityWeek 5Incident Management, Investigatio.docxcherishwinsland
 
Security Education and Training1111.pdf
Security Education and Training1111.pdfSecurity Education and Training1111.pdf
Security Education and Training1111.pdfakkashkumar055
 
Secure physical infrastructure
Secure physical infrastructureSecure physical infrastructure
Secure physical infrastructurePallavi Agarwal
 
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comCh08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comphanleson
 
Applying Security Control to Implement EFG FCU Standards
Applying Security Control to Implement EFG FCU Standards Applying Security Control to Implement EFG FCU Standards
Applying Security Control to Implement EFG FCU Standards Lillian Ekwosi-Egbulem
 
Physical security.docx
Physical security.docxPhysical security.docx
Physical security.docxMVNVKUMAR
 
Roadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesRoadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesGreenway Health
 
Mis presentation by suraj vaidya
Mis presentation by suraj vaidyaMis presentation by suraj vaidya
Mis presentation by suraj vaidyaSuraj Vaidya
 
The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)stevemeltzer
 
The Six Stages of Incident Response - Auscert 2016
The Six Stages of Incident Response - Auscert 2016The Six Stages of Incident Response - Auscert 2016
The Six Stages of Incident Response - Auscert 2016Ashley Deuble
 
The Six Stages of Incident Response
The Six Stages of Incident Response The Six Stages of Incident Response
The Six Stages of Incident Response Darren Pauli
 
ICT-security-Lesson-4.pdf
ICT-security-Lesson-4.pdfICT-security-Lesson-4.pdf
ICT-security-Lesson-4.pdfasdfg hjkl
 
Attacker scenarios and threats description.pptx
Attacker scenarios and threats description.pptxAttacker scenarios and threats description.pptx
Attacker scenarios and threats description.pptxamare63
 

Similaire à Chapter008 (20)

4. Define communication security, information security, network secu.pdf
4. Define communication security, information security, network secu.pdf4. Define communication security, information security, network secu.pdf
4. Define communication security, information security, network secu.pdf
 
Beyond Firewalls: The Unsung Hero of Cybersecurity - Physical Architecture By...
Beyond Firewalls: The Unsung Hero of Cybersecurity - Physical Architecture By...Beyond Firewalls: The Unsung Hero of Cybersecurity - Physical Architecture By...
Beyond Firewalls: The Unsung Hero of Cybersecurity - Physical Architecture By...
 
THE THREE DIMENSION-BASED PHYSICAL ACCESS CONTROL DETECTION SYSTEM, THE NATUR...
THE THREE DIMENSION-BASED PHYSICAL ACCESS CONTROL DETECTION SYSTEM, THE NATUR...THE THREE DIMENSION-BASED PHYSICAL ACCESS CONTROL DETECTION SYSTEM, THE NATUR...
THE THREE DIMENSION-BASED PHYSICAL ACCESS CONTROL DETECTION SYSTEM, THE NATUR...
 
Decision-Making Support in Biometric-Based Physical Access Control Systems
Decision-Making Support in Biometric-Based Physical Access Control SystemsDecision-Making Support in Biometric-Based Physical Access Control Systems
Decision-Making Support in Biometric-Based Physical Access Control Systems
 
Operations SecurityWeek 5Incident Management, Investigatio.docx
Operations SecurityWeek 5Incident Management, Investigatio.docxOperations SecurityWeek 5Incident Management, Investigatio.docx
Operations SecurityWeek 5Incident Management, Investigatio.docx
 
Security Education and Training1111.pdf
Security Education and Training1111.pdfSecurity Education and Training1111.pdf
Security Education and Training1111.pdf
 
Secure physical infrastructure
Secure physical infrastructureSecure physical infrastructure
Secure physical infrastructure
 
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comCh08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.com
 
Applying Security Control to Implement EFG FCU Standards
Applying Security Control to Implement EFG FCU Standards Applying Security Control to Implement EFG FCU Standards
Applying Security Control to Implement EFG FCU Standards
 
SECURITY PLANNING DESIGN (SESSION 3).ppt
SECURITY PLANNING  DESIGN (SESSION 3).pptSECURITY PLANNING  DESIGN (SESSION 3).ppt
SECURITY PLANNING DESIGN (SESSION 3).ppt
 
Physical security.docx
Physical security.docxPhysical security.docx
Physical security.docx
 
Roadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesRoadmap to IT Security Best Practices
Roadmap to IT Security Best Practices
 
Mis presentation by suraj vaidya
Mis presentation by suraj vaidyaMis presentation by suraj vaidya
Mis presentation by suraj vaidya
 
The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)
 
Bis Chapter15
Bis Chapter15Bis Chapter15
Bis Chapter15
 
The Six Stages of Incident Response - Auscert 2016
The Six Stages of Incident Response - Auscert 2016The Six Stages of Incident Response - Auscert 2016
The Six Stages of Incident Response - Auscert 2016
 
The Six Stages of Incident Response
The Six Stages of Incident Response The Six Stages of Incident Response
The Six Stages of Incident Response
 
ICT-security-Lesson-4.pdf
ICT-security-Lesson-4.pdfICT-security-Lesson-4.pdf
ICT-security-Lesson-4.pdf
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Attacker scenarios and threats description.pptx
Attacker scenarios and threats description.pptxAttacker scenarios and threats description.pptx
Attacker scenarios and threats description.pptx
 

Plus de Jeanie Delos Arcos (11)

105_2_digitalSystem_Chap_3_part_3.ppt
105_2_digitalSystem_Chap_3_part_3.ppt105_2_digitalSystem_Chap_3_part_3.ppt
105_2_digitalSystem_Chap_3_part_3.ppt
 
Chapter004
Chapter004Chapter004
Chapter004
 
Pentium II
Pentium IIPentium II
Pentium II
 
Celeron
CeleronCeleron
Celeron
 
80486
8048680486
80486
 
04 Cache Memory
04  Cache  Memory04  Cache  Memory
04 Cache Memory
 
Taralets
TaraletsTaralets
Taralets
 
six part invention
six part inventionsix part invention
six part invention
 
Accidentally InLove
Accidentally InLoveAccidentally InLove
Accidentally InLove
 
Like A Virgin
Like A VirginLike A Virgin
Like A Virgin
 
Awit sa mga Bata
Awit sa mga BataAwit sa mga Bata
Awit sa mga Bata
 

Chapter008

  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.