Physical Security
Physical Security
Types of Threats
Human Intrusion
Attackers looking to perform some sort of damage or obtain useful information
Natural Disasters*
Fire Flood Earthquake/Seismic Vibrations Power Outages/Fluctuations
Once accomplished, boot off CD or floppy (in this example, KNOPPIX), and copy.
Risk Assessment
Determine your primary threats and act accordingly A very large company participating in the global market obviously has more at stake than John Qs Computer Store. While their susceptibility of attack is the same, the large company will house more profitable information and technology. FBI statistics indicate that approximately 72% of all thefts, fraud, sabotage, and accidents are caused by a companys own employees. Only about 5% is done by external sources.
The ServPath building, located in San Francisco, is a datacenter that houses supernodes for both AT&T and MCI.
The Workstations
Workstations should ALWAYS be logged off or locked out whenever unattended Screens positioned such that they cannot be seen through the windows Hackers with telescopes to record keystrokes Workstations should be secured and physically locked while unattended
Steel cable that runs through the computer case and attaches to an anchor to prevent the tower from being removed
Secure items in the room according to value Intrusion detection systems Ensure walls extend to the physical ceiling versus ceiling panels
Attackers can gain access to the room via scaling the wall
Security Cameras
Security Mechanisms
Fire*
Extinguishers
Carbon Dioxide
Harmful to Humans
Halon
Preferred Choice, but very expensive to refill Binds with available oxygen molecules to starve the fire Harmful to the ozone
Inergen
Safer and cleaner alternative to Halon Allows a breathable atmosphere and starvation of the atmosphere without ozone harm
Fire Detectors/Alarms
Detectors
VESDA Laser smoke detection Dry pipe suppression
Flood/Water
Go to the high ground Locate sensitive equipment on the second story or above Dont allow water pipes to run through or around computer room
Earthquake/Seismic Vibrations
Airports, railroads, major thoroughfares, industrial tools, and road construction are common sources of vibration Common solutions involve supporting the foundation of computers with springs, gel-filled mats, or rubber pads. THE most effective solution:
Dont position your data center near a source of seismic vibrations
Power Outages/Fluctuations
UPS
Large solutions available to large power consumption
Generator
When UPS just isnt enough
Extreme Temperature/Humidity
Control must be maintained over the environment Larger computers run hotter and thus more susceptible to heat in the room Humidity problems with moisture developing on the inside of the machine
Redundant HVAC unit (Heating, Ventilation, and Air Conditioning) that can handle temperature and humidity control of the computer room, sheltered from the weather
Bibliography
http://www.servepath.com/why/datacenter.htm http://searchsecurity.techtarget.com/tip/1,289483,sid14_gci993832,00.html http://www.servepath.com/why/datacenter.htm http://www2.fpm.wisc.edu/safety/gsp/Fire%20Suppression%20Systems.html http://www.reliablefire.com/inergenfolder/inergen.html http://www.reliablefire.com/vesdafolder/vesdalaserplus.html http://www.sans.org/rr/whitepapers/physcial/ http://www.servepath.com/why/datacenter.htm http://en.wikipedia.org/wiki/Computer_security http://security.uchicago.edu/docs/physicalsec.shtml http://searchsecurity.techtarget.com/generic/0,295582,sid14_gci1131341,00.html?tra ck=top10oct http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1131405,00.h tml?track=top10oct http://www.cccure.org/Documents/HISM/675-680.html https://my.tennessee.edu/portal/page?_pageid=40,38376&_dad=portal&_schema=P ORTAL http://www.securityfocus.com/archive/101/383003
Physical Security