Physical Security
Physical Security
Security
Module 12
Introduction
As you learned in Chapter 1, information security requires the protection of both
data and physical assets. You have already learned about many of the
mechanisms used to protect data, including firewalls, intrusion detection systems,
COURSE MODULE
Before learning more about physical access controls, you need to understand what
makes a facility secure. An organization’s general management oversees its
physical security. Commonly, a building’s access controls are operated by a group
called facilities management. Larger organizations may have an entire staff
dedicated to facilities management, while smaller organizations often outsource
these duties.
In facilities management, a secure facility is a physical location that has in place
controls to minimize the risk of attacks from physical threats. The term secure facility
might bring to mind military bases, maximum-security prisons, and nuclear power
plants, but while securing a facility requires some adherence to rules and
procedures, the environment does not necessarily have to be that constrained. It is
also not necessary that a facility resemble a fortress to minimize risk from physical
attacks. In fact, a secure facility can sometimes use its natural terrain, local traffic
flow, and surrounding development to enhance its physical security, along with
protection mechanisms such as fences, gates, walls, guards, and alarms.
Physical Security Controls
There are a number of physical security controls that an organization’s communities
of interest should consider when implementing physical security inside and outside
the facility. Some of the major controls are:
Walls, fencing, and gates
Guards
Dogs
ID Cards and Badges
Locks and Keys
Mantraps
Electronic Monitoring
COURSE MODULE
Walls, Fencing, and Gates Some of the oldest and most reliable elements of
physical security are walls, fencing, and gates. While not every organization needs
to implement external perimeter controls, walls and fences with suitable gates are
an essential starting point for organizations whose employees require access to
physical locations the organization owns or controls. These types of controls vary
widely in appearance and function, ranging from chain link or privacy fences that
control where people should park or walk, to imposing concrete or masonry barriers
designed to withstand the blast of a car bomb. Each exterior perimeter control
requires expert planning to ensure that it fulfills the security goals and that it presents
an image appropriate to the organization.
Guards Controls like fences and walls with gates are static, and are therefore
unresponsive to actions, unless they are programmed to respond with specific
actions to specific stimuli, such as opening for someone who has the correct key.
Guards, on the other hand, can evaluate each situation as it arises and make
reasoned responses. Most guards have clear standard operating procedures (SOPs)
that help them to act decisively in unfamiliar situations. In the military, for example,
guards are given general orders (see the Offline on guard duty), as well as special
orders that are particular to their posts.
Locks and Keys There are two types of lock mechanisms: mechanical and
electromechanical. The mechanical lock may rely on a key that is a carefully
shaped piece of metal, which is rotated to turn tumblers that release secured loops
of steel, aluminum, or brass (as in, for example, brass padlocks). Alternatively, a
mechanical lock may have a dial that rotates slotted discs until the slots on multiple
disks are aligned, and then retracts a securing bolt (as in combination and safe
locks). Although mechanical locks are conceptually simple, some of the
technologies that go into their development are quite complex. Some of these
modern enhancements have led to the creation of the electromechanical lock.
COURSE MODULE
individual user to enter a personal code and open the door. These locks usually use
battery backups to power the keypad in case of a power failure.
Mantraps A common
enhancement for locks in
high security areas is the
mantrap. A mantrap is a
small enclosure that has
separate entry and exit
points. To gain access to the
facility, area, or room, a
person enters the mantrap,
requests access via some
form of electronic or
biometric lock and key, and
if confirmed, exits the
mantrap into the facility.
TRY THIS!
Type your activity here
Electronic Monitoring Monitoring equipment can be used to record events within
a specific area that guards and dogs might miss, or in areas where other types of
physical controls are not practical. Although you may not know it, many of you are,
thanks to the silver globes attached to the ceilings of many retail stores, already
subject to cameras viewing you from odd corners—that is, video monitoring.
Attached to these cameras are video cassette recorders (VCRs) and related
machinery that capture the video feed. Electronic monitoring includes closed-
circuit television (CCT) systems. Some CCT systems collect constant video feeds,
while others rotate input from a number of cameras, sampling each area in turn.
These
video
COURSE MODULE
monitoring systems have drawbacks: for the most part they are passive and do not
prevent access or prohibited activity.
Another drawback to these systems is that people must view the video output,
because there are no intelligent systems capable of reliably evaluating a video
feed. To determine if unauthorized activities have occurred, a security staff member
must constantly review the information in real time or review the information
collected in video recordings. For this reason, CCT is most often used as an evidence
collection device after an area has been broken into than as a detection
instrument. In high-security areas (such as banks, casinos, and shopping centers),
however, security personnel monitor CCT systems constantly, looking for suspicious
activity.
Alarms and Alarm Systems Closely related to monitoring are the alarm systems
that notify people or systems when a predetermined event or activity occurs.
Alarms, which are similar to the IDPSs you learned about in Chapter 7, can detect a
physical intrusion or other untoward event. This could be a fire, a break-in, an
environmental disturbance such as flooding, or an interruption in services such as a
loss of power. One example of an alarm system is the burglar alarm commonly
found in residential and commercial environments. Burglar alarms detect intrusions
into unauthorized areas and notify either a local or remote security agency to react.
To detect intrusions, these systems rely on a number of different types of sensors:
motion detectors, thermal detectors, glass breakage detectors, weight sensors, and
contact sensors. Motion detectors detect movement within a confined space and
are either active or passive. Some motion sensors emit energy beams, usually in the
form
of infrared or laser light, ultrasonic sound or sound waves, or some form of
electromagnetic radiation. If the energy from the beam projected into the area
being monitored is disrupted, the alarm is activated. Other types of motion sensors
are passive in that they constantly measure the energy (infrared or ultrasonic) from
the monitored space and detect rapid changes in this energy. The passive
measurement of these energies can be blocked or disguised and is therefore
fallible. Thermal detectors measure rates of change in the ambient temperature in
the room. They can, for example, detect when a person with a body temperature
of 98.6 degrees Fahrenheit enters a room with a temperature of 65 degrees
Fahrenheit, because the person’s presence changes the room’s ambient
temperature. Thermal detectors are also used in fire detection (as is described in
later sections). Contact and weight sensors work when two contacts are connected
as, for example, when a foot steps on a pressure sensitive pad under a rug, or a
COURSE MODULE
window is opened, triggering a pin-and-spring sensor. Vibration sensors also fall into
this category, except that they detect movement of the sensor rather than
movement in the environment.
Computer Rooms and Wiring Closets Computer rooms and wiring and
communications closets require special attention to ensure the confidentiality,
integrity, and availability of information. For an outline of the physical and
environmental controls needed for computer rooms, read the Technical Details box
entitled “Physical and Environmental Controls for Computer Rooms.” Logical access
controls are easily defeated if an attacker gains physical access to the computing
equipment. Custodial staff members are often the least scrutinized employees (or
nonemployees) who have access to an organization’s offices. Yet custodians are
given the greatest degree of unsupervised access. They are often handed the
master keys to the entire building and then ignored, even though they collect paper
from every office, dust many desks, and move large containers from every area. It
is, therefore, not difficult for this type of worker to gather critical information and
computer media or copy proprietary and classified information. All this is not to say
that an organization’s custodial staff should be under constant suspicion of
espionage, but to note that the wide-reaching access that custodians have can
be a vulnerability that attackers exploit to gain unauthorized information. Factual
accounts exist of technically trained agents working as custodians in the offices of
their competition. Thus, custodial staffs should be carefully managed not only by
the organization’s general management, but also by IT management.
Interior Walls and Doors The security of information assets can sometimes be
compromised by the nature of the construction of the walls and doors of the facility.
The walls in a facility are typically of two types: standard interior and firewall. Building
codes require that each floor have a number of firewalls, or walls that limit the
spread of damage should a fire break out in an office. While the network firewalls
discussed in an earlier chapter isolate the logical sub-networks of the organization,
physical firewalls isolate the physical spaces of the organization’s offices. Between
the firewalls, standard interior walls compartmentalize the individual offices. Unlike
firewalls, these interior walls reach only part way to the next floor, which leaves a
space above the ceiling but below the floor of the next level up. This space is called
a plenum, and is usually one to three feet to allow for ventilation systems that can
inexpensively collect return air from all the offices on the floor. For security, however,
this design is not ideal, because it means that an individual can climb over the wall
from one office to the other. As a result, all high-security areas, such as computer
rooms and wiring closets, must have firewall-grade walls surrounding them. This
provides physical security not only from potential intruders, but also from fires.
reduce the temperature of the flame in order to extinguish it and to saturate some
types of fuels (such as paper) to prevent ignition. Carbon dioxide systems (CO2) rob
fire of
It’s oxygen. Soda acid systems deny fire its fuel, preventing the fire from spreading.
Gas-based systems, such as Halon and its Environmental Protection Agency-
approved replacements, disrupt the fire’s chemical reaction but leave enough
oxygen for people to survive for a short time. Before a fire can be suppressed,
however, it must be detected.
Fire Detection Fire detection systems fall into two general categories: manual and
automatic. Manual fire detection systems include human responses, such as calling
the fire department, as well as manually activated alarms, such as sprinklers and
gaseous systems. Organizations must use care when manually triggered alarms are
tied directly to suppression systems, since false alarms are not uncommon.
Organizations should also ensure that proper security remains in place until all
employees and visitors have been cleared from the building and their evacuation
has been verified. During the chaos of a fire evacuation, an attacker can easily slip
into offices and obtain sensitive information. To help prevent such intrusions, fire
safety programs often designate an individual from each office area to serve as a
floor monitor. There are three basic types of fire detection systems: thermal
detection, smoke detection, and flame detection. Thermal detection systems
contain a sophisticated heat sensor that operates in one of two ways. Fixed
COURSE MODULE
A variation of the dry-pipe system is the pre-action system. This approach has a
two-phase response to a fire. Under normal conditions, the system has nothing in
the delivery pipes. When a fire is detected, the first phase is initiated, and valves
allow water to enter the system. At that point, the system resembles a wet-pipe
system.
The pre-action system does not deliver water into the protected space until the
individual sprinkler heads are triggered, at which time water flows only into the
area of the activated sprinkler head.
Water mist sprinklers are the newest form of sprinkler systems and rely on ultra-fine
mists instead of traditional shower-type systems. The water mist systems work like
traditional water system by reducing the ambient temperature around the flame,
therefore minimizing its ability to sustain the necessary temperature needed to
maintain combustion. Unlike traditional water sprinkler systems, however, these
systems produce a fog-like mist that, because the droplets are much less susceptible
to gravity, stays buoyant (airborne) much longer. As a result, a much smaller
quantity of water is required; also the fire is extinguished more quickly, which causes
less collateral damage. Relative to gaseous systems (which are discussed shortly),
water-based systems are low cost, nontoxic, and can often be created by using an
existing sprinkler system that may have been present in earlier construction.
Gaseous Emission Systems Gaseous (or chemical gas) emission systems can be
used in the suppression of fires. They are often used to protect chemical and
electrical processing areas, as well as facilities that house computing systems. A
typical configuration of such systems is shown in Figure 9-4.
COURSE MODULE
A physical security plan requires that every building have clearly marked fire exits
and maps posted throughout the facility. It is important to have drills to rehearse fire
alarm responses and designate individuals to be in charge of escorting everyone
from the location and ensuring that no one is left behind. It is also important to have
fire suppression systems that are both manual and automatic, and that are
inspected and tested regularly.
Temperature and Filtration Computer systems are electronic, and as such are
subject to damage from extreme temperature and particulate contamination.
Temperatures as low as 100 degrees Fahrenheit can damage computer media, and
at 175 degrees Fahrenheit, computer hardware can be damaged or destroyed.
When the temperature approaches 32 degrees Fahrenheit, media are susceptible
to cracking and computer components can actually freeze together. Rapid
changes in temperature, from hot to cold or from cold to hot, can produce
condensation, which can create short circuits or otherwise damage systems and
components. The optimal temperature for a computing environment (and for
people) is between 70 and 74 degrees Fahrenheit. Properly installed and
maintained systems keep the environment within the manufacturer-recommended
temperature range. In the past it was thought necessary to fully filter all particles
from the air flow from the HVAC system. Modern computing equipment is designed
to work better in typical office environments, and thus the need to provide extensive
filtration for air-conditioning is now limited to particularly sensitive environments such
as chip fabrication and component assembly areas.
Humidity and Static Electricity Humidity is the amount of moisture in the air. High
humidity levels create condensation problems, and low humidity levels can
increase the amount of static electricity in the environment. With condensation
comes the short circuiting of electrical equipment and the potential for mold and
rot in paper-based information storage. Static electricity is caused by a process
called triboelectrification, which occurs when two materials make contact and
exchange electrons, and results in one object becoming more positively charged
and the other more negatively charged. When a third objects with an opposite
charge or ground is encountered, electrons flow again, and a spark is produced.
One of the leading causes of damage to sensitive circuitry is electrostatic discharge
(ESD). Integrated circuits in a computer are designed to use between two and five
volts of electricity; any voltage level above this range introduces a risk of microchip
damage. Static electricity is not even noticeable to humans until levels approach
1,500 volts, and the spark can’t be seen until the level approaches 4,000 volts.
Moreover, a person can generate up to 12,000 volts of static current by merely
walking across a carpet. Table 9-2 shows some static charge voltages and the
damage they can cause to systems.
Ventilation Shafts While the ductwork in residential buildings is quite small, in large
COURSE MODULE
commercial building, it may be large enough for a person to climb through. This is
one of Hollywood’s favorite methods for villains or heroes to enter buildings, but
these ventilation shafts aren’t quite as negotiable as the movies would have you
believe. In fact, with moderate security precautions, these shafts can be completely
eliminated as security vulnerability. In most new buildings, the ducts to the individual
rooms are no larger than 12 inches in diameter and are flexible, insulated tubes. The
size and nature of the ducts precludes most people from using them, but access
may be possible via the plenum. If the ducts are much larger, the security team can
install wire mesh grids at various points to compartmentalize the runs.
Grounding and Amperage Grounding ensures that the returning flow of current
is properly discharged to the ground. If the grounding elements of the electrical
system are not properly installed, anyone touching a computer or other electrical
device could become a ground source, which would cause damage to equipment
and injury or death to the person. Computing and other electrical equipment in
areas where water can accumulate must be uniquely grounded, using ground fault
circuit interruption (GFCI) equipment. GFCI is capable of quickly identifying and
interrupting a ground fault—that is, a situation in which a person has come into
contact with water and becomes a better ground than the electrical circuit’s
current source.
Uninterruptible Power Supply (UPS) The primary power source for an organization’s
computing equipment is most often the electric utility that serves the area where
the organization’s buildings are located. This source of power can experience
interruptions. Therefore, organizations should identify the computing systems that
are critical to their operations (in other words, the systems that must continue to
operate during interruptions) and make sure those systems are connected to a
device that assures the delivery of electric power without interruption—that is, an
uninterruptible power supply (UPS).
The capacity of UPS devices is measured using the volt-ampere (or VA)
power output rating. UPS devices typically run up to 1,000 VA and can be
engineered to exceed 10,000 VA. A typical PC might use 200 VA, and a
server in a computer room may need 2,000 to 5,000 VA, depending on how
much running time is needed.
A standby or offline UPS is an offline battery backup that detects the
interruption of power to the equipment and activates a transfer switch that
provides power from batteries, through a DC to AC converter, until the
power is restored or the computer is shut down.
A ferroresonant standby UPS improves upon the standby UPS design. It is still
an offline UPS, with the electrical service providing the primary source of
power and the UPS serving as a battery backup.
The line-interactive UPS has a substantially different design than the
previously mentioned UPS models. In line-interactive UPSs, the internal
components of the standby models are replaced with a pair of inverters and
converters.
In a true online UPS, the primary power source is the battery, and the
power feed from the utility is constantly recharging this battery.
COURSE MODULE
Selecting the best UPS can be a lesson in electrical engineering, because you must
calculate the load that the protected systems require from the UPS. This can be
quite complex and proves challenging in practice. Fortunately, many UPS vendors
provide sample scenarios that can help you select the optimal device. Because a
high-quality UPS may cost several thousand dollars, it is advisable to select the
smallest UPS necessary to provide the desired effect. To calculate manually the
rating needed in a UPS, you should begin by reviewing the computer systems and
all connected support equipment to be protected. For example, the back panel of
a monitor may indicate that the monitor is rated at 110 volts and 2 amps. Since volts
times amps yields the power needs of a device, to calculate the power you need
to run this device, you multiply 110 by 2; the production of this equation is the rating
of the monitor, 220 VA. Now suppose the computer draws 3 amps at 110 volts, and
therefore has a rating of 330 VA. Together the total is 550 VA. Once you have this
information, you can select a UPS capable of supporting this power level. Generally,
UPS systems provide information on how long they would run at specific VA levels.
Some smaller-scale UPSs can run for approximately six minutes at 600 VA at full
voltage. You should look for a UPS that provides enough time for the computing
equipment to ride out minor power fluctuations, and for the user to shut down the
computer safely if necessary.
use. These devices are the last line of defense against personal injury and machine
damage in the event of flooding or sprinkler activation. The last person out of the
computer room hits the switch to stop the flow of electricity to the room, preventing
the water that might be used to extinguish the fire from short-circuiting the
computers. While it is never advisable to allow water to come into contact with a
computer, there is a much higher probability of recovering the systems if they were
not powered up when they got wet. At a minimum, hard drives and other sealed
devices may be recoverable. Some disaster recovery companies specialize in
water damage recovery.
Water Problems
Another critical utility infrastructure element is water service. On the one hand, lack
of water poses problems to systems, including fire suppression and air-conditioning
systems. On the other hand, a surplus of water, or water pressure, poses a real threat.
Flooding, leaks, and the presence of water in areas where it should not be is
catastrophic to paper and electronic storage of information. Water damage can
result in complete failure of computer systems and the structures that house them.
It is therefore important to integrate water detection systems into the alarm systems
that regulate overall facilities operations.
Structural Collapse
Unavoidable environmental factors or forces of nature can cause failures in the
structures that house the organization. Structures are designed and constructed
with specific load limits, and overloading these design limits inevitably results in
structural failure. Personal injury and potential for loss of life are also likely. Scheduling
periodic inspections by qualified civil engineers will enable managers to identify
potentially dangerous structural conditions before the structure fails.
Interception of Data
There are three methods of data interception: direct observation, interception of
data transmission, and electromagnetic interception. The first method, direct
observation, requires that an individual be close enough to the information to
breach confidentiality. The physical security mechanisms described in the previous
sections limit the possibility of an individual accessing unauthorized areas and
directly observing information. There is, however, a risk when the information is
removed from a protected facility. If an employee is browsing documents over
lunch in a restaurant or takes work home, the risk of direct observation rises
substantially. A competitor can more easily intercept vital information at a typical
employee’s home than at a secure office. Incidences of interception, such as
shoulder surfing, can be avoided if employees are prohibited from removing
sensitive information from the office or required to implement strong security at their
homes.
addition, many users keep the locations of files and clues about the storage of
information in their portable computers. Many users like the convenience of
allowing the underlying operating systems to remember their usernames and
passwords because it provides easier access and because they frequently have
multiple accounts, with different usernames and passwords, to manage. While it is
tempting to allow operating systems to enable easier access to frequently used
accounts, the downside of setting up these arrangements on a portable system is
obvious: loss of the system means loss of the access control mechanisms.
For maximum security, laptops should be secured at all times. If you are traveling
with a laptop, you should have it in your possession at all times. Special care should
be exercised when flying, as laptop thefts are common in airports. The following list
comes from the Metropolitan Police of the District of Columbia and outlines steps
you can take to prevent your laptop from being stolen or carelessly damaged:
Inventory Management
Like other organizational resources, computing equipment should be inventoried
and inspected on a regular basis. The management of computer inventory is an
important part of physical security. How else can corporate security know if an
employee has been pilfering computer supplies or a former employee has taken
organizational equipment home? Similarly, classified information should also be
inventoried and managed. In the military, whenever a classified document needs
is reproduced, a stamp is placed on the original before it is copied. This stamp states
the document’s classification level and the text imprint “of” so that the person
making the copies can mark the sequence number for each copy as well as the
total number of copies being made. If, for example, twenty-five copies are to be
made, the person responsible for copying the document writes “26” in the right
blank, makes copies, and then numbers them. Why 26 and not 25? The original is
always document number one. After the numbering, each classified copy is issued
COURSE MODULE
to the assigned person, who signs for it. While this procedure may be overkill for most
organizations, it does ensure that the inventory management of classified
documents is secure at all times. Also, the formality of having to sign for a document
cements its worth in the mind of the recipient.
Reference