Page 65 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 65

Typical
                             OSI
                                                                              Countermea
                                                                       Detection
             Category
                      Threat
                                                   Vulnerabilities
                                                               Prevention
                                  Definition
                                           Behaviors
                            Layer
                                                                                sures
                            N/A
           Physical
                                 Physical
                    Fire
           Environment
                    Damage
                                                   near potential
                                                             replication,
                                                                              FM200 fire
                                                                       smoke
                                 destruction of  destruction of
                                                                              extinguishers
                                                   fire hazards,
                                                                       alarms
                                          systems and
                                 equipment
                                                             while costly,
                                                   e.g., fuel storage  provides
                                 due to fire or
                                          supporting
                                                                              mitigate
                                 smoke
                                                             backup
                                                                              electrical and
                                                   tanks
                                          equipment
                                                                              water
                                                             capability
                                 damage
                                                                              damage
                            N/A
                                          Physical
                                                                              Computer
                                 Physical
                                                   Systems located
                    Water
                                                             Off-site system
                                                                       Water
                                 destruction of  destruction of
                                                   below ground or  replication
                                                                              rooms
                    Damage
                                                                       detection
                                          systems and
                                 equipment
                                                   near sprinkler
                                                                              equipped
                                                                       devices
                                                                              with
                                 due to water
                                          supporting
                                                   systems
                                                                              emergency
                                 (including   Physical   Systems located   Off-site system   On-site   Halon gas or
                                          equipment
                                 sprinkler)                                   drainage
                                 damage                                       capabilities
                    Power Loss   N/A   Computers or  Immediate loss  Sites fed by   Dual or   Power   Uninterrupti
                                 vital    of data due to   above ground   separate feeder   level alert   ble Power
                                 supporting   abnormal   power lines are   lines for   monitors   Supplies
                                 equipment   shutdow, even  particularly   computers and   (UPS)
                                 fail due to   after power   vulnerable    supporting   Full scale
                                 lack of power  returns    Power loss to   equipment   standby   Unit 5: Physical Security
                                          Continuing   computer room          power
                                          loss of   air conditioners          facilities
                                          capability until  can also be an    where
                                          power returns   issue               economically
                                                                              feasible
                                                                                                Notes
                    Civil   N/A   Physical   Physical   Sites located in   Low profile   Physical   Physical
                    Disorder     destruction   destruction of   some overseas   facilities (no   intrusion   access
                    Vandalism    during   systems and   environments,   overt disclosure  detection   restrictions
                                 operations   supporting   especially urban  of high value   devices   and riot
                                 other than   equipment   environments   nature of site)   contingency
                                 war                                          policies
                    Battle   N/A   Physical   Physical   Site located in   Off-site system   Network   Hardened
                    Damage       destruction   destruction of   theater   replication    monitorin  sites
                                 during   systems and        OPSEC and low   g systems
                                 military   supporting       profile to
                                 action   equipment          prevent hostile
                                                             targeting

          Self Assessment
          Fill in the blanks:
          5.   A ....................... is defined as a sudden misfortune that is ruinous to an undertaking.
          6.   ....................... is the act of destroying or of corrupting computer systems with an aim of
               destabilizing a country or of applying pressure on a government.
          5.4 Controlling Physical Access
          Access controls protect against improper access of equipment, data files, and software. To restrict
          physical access, a security system must be able to differentiate among authorized and unauthorized
          individuals. Physical access can be restricted by means of three general techniques.
          Identification: Identification depends on comparing the physical traits of the individual with
          previously accumulated information.
                 Example: An individual‘s signature, personnel number, code, voice print, palm print,
          fingerprint, teeth print, or other personal characteristic  could be  verified before  permitting
          access.
          Secondary authentication, like the user‘s place of birth, may  be needed for highly  sensitive
          information.
          User‘s Name and Passwords: Passwords depends on some memorized mixture  of letters  or
          numbers. There should be no logic to the password, so it cannot be simply presumed; Individuals
          are authorized depending on what they know. Passwords should be changed within a fixed
          period of time. Inactive passwords (like., more than 4 months old) should be removed. Passwords
          should be modified and confidential data taken from terminated employees. If a user alters a
          password, controls must appear to ensure the user does not access his old password. Passwords
          should not be shared. Access control software may be used to have a minimum password time
          period in which a new password cannot be modified or a new password comparing an old one
          will be not accepted.
          Cards/Keys: Access can also be restricted by the use of cards, keys, or badges; individuals are
          authorized depending on what they own. Improper use may be signaled by an alarm, and
          unauthorized access patterns should be examined. A smart card, which is  a small electronic
          device regarding the size of a credit card that includes electronic memory, may be used in which
          the user  enters both his or  her identification number and a random generated code  which
          modifies each time the card is used or over a specified time period. Smart cards are used for a
          numerous purposes, involving: accumulating a patient‘s medical records, accumulating digital
          cash, and generating network IDs (identical to a token).
                                           LOVELY PROFESSIONAL UNIVERSITY                                   59
   60   61   62   63   64   65   66   67   68   69   70