Principles of Computer Security: CompTIA Security+ Security+® and Beyond, Third Edition Operational and Organizational Security Chapter 3 © 2012 Principles of Computer Security: CompTIA Security+ Security+® and Beyond, Third Edition Objectives • Identify various operational aspects to security in your organization. • Describe the physical security components that can protect your computers and network. • Identify environmental factors that can affect security. • Identify factors that affect the security of the growing number of wireless cellular technologies used for data transmission. • Prevent disclosure through electronic emanations. © 2012 Principles of Computer Security: CompTIA Security+ Security+® and Beyond, Third Edition Key Terms • • • • Biometrics Bluetooth Guidelines Heating, Ventilation, and Air Conditioning (HVAC) • IEEE 802.11 • Physical security © 2012 • • • • • Policies Procedures Standards TEMPEST Uninterruptible power supply (UPS) Principles of Computer Security: CompTIA Security+ Security+® and Beyond, Third Edition Security Operations in Your Organization • The operational model of security – Protection = Prevention + (Detection + Response) • No matter how secure we attempt to make our systems, some way will always be found to circumvent the safeguards we have in place. • Prevention technologies are static. • Detection and response technologies are dynamic. © 2012 Principles of Computer Security: CompTIA Security+ Security+® and Beyond, Third Edition Security Operations in Your Organization • Policies (continued) – High-level, broad statements of what the organization wants to accomplish • Procedures – Step-by-step instructions on how to implement policies in the organization • Standards – Mandatory elements regarding the implementation of a policy • Guidelines – Recommendations relating to a policy © 2012 Principles of Computer Security: CompTIA Security+ Security+® and Beyond, Third Edition The Operational Process and Policy Lifecycle Plan for security Evaluate the effectiveness Implement the plans Monitor the implementation © 2012 Principles of Computer Security: CompTIA Security+ Security+® and Beyond, Third Edition Is This the Security Perimeter? © 2012 Principles of Computer Security: CompTIA Security+ Security+® and Beyond, Third Edition A More Complete Diagram © 2012 Principles of Computer Security: CompTIA Security+ Security+® and Beyond, Third Edition Physical Security • Physical security consists of all mechanisms used to ensure that physical access to the computer systems and networks is restricted to only authorized users. • No matter how good your computer and network security is, if a person has physical access, then can compromise the CIA of your information in some way. © 2012 Principles of Computer Security: CompTIA Security+ Security+® and Beyond, Third Edition Physical Security (continued) • Access from all six sides should be considered – – – – – – – – © 2012 Is there a false ceiling with tiles that can be removed? Is there a raised floor? Do the monitors face away from windows? Who has access to the facility? What type of access control is there to the area? Are there any guards? Who is allowed unsupervised access to the facility? Is there an alarm system or security camera set up? Principles of Computer Security: CompTIA Security+ Security+® and Beyond, Third Edition Access Controls • Authentication via – Something you have – key or card – Something you know – combination – Something you are – biometrics • Biometrics – More sophisticated and expensive – Not yet 100 percent foolproof • Two factor authentication – Using two of the methods for authentication • Other controls – Video surveillance, sign-in logs, security guards © 2012 Principles of Computer Security: CompTIA Security+ Security+® and Beyond, Third Edition Physical Barriers • Principle of layered security – – – – – – © 2012 Fences Guard at the gate Open space Walls Signs denoting public and private areas Man trap Principles of Computer Security: CompTIA Security+ Security+® and Beyond, Third Edition Environmental Issues • Heating, ventilation and air conditioning (HVAC) – Used to maintain the comfort of an office environment – Also maintained environment for computers • Heat and humidity sensitive devices and network components • Uninterruptable Power Supply (UPS) – Used for critical systems so that a loss of power will not halt processing – The larger the battery, the longer the equipment can operate during a loss of power © 2012 Principles of Computer Security: CompTIA Security+ Security+® and Beyond, Third Edition Fire Suppression • Fire is a common disaster. • Fire detectors – Smoke detection – Heat detection • Fire suppression – Sprinkler-based • Standard, but will further damage equipment – Gas-based • Halon was used and may still exist in some areas. • Halon displaces oxygen and can asphyxiate people in the area when it is dispersed. • Halon is being replaced with other gases such as argon, nitrogen, and carbon dioxide. Note that the same danger exists. © 2012 Principles of Computer Security: CompTIA Security+ Security+® and Beyond, Third Edition Wireless • By wireless we mean cellular telephones (“cell phones”) • Cell phone network – Phones – Cells with accompanying base stations – Base stations – antennas, receivers, transmitters, and amplifiers – As a person travels, they enter and exit multiple cells. • Also used for networking – Bluetooth – for short range personal area network (PAN) – IEEE 802.11 – used for local area networks (LAN) © 2012 Principles of Computer Security: CompTIA Security+ Security+® and Beyond, Third Edition Electromagnetic Eavesdropping • The van Eck phenomenon – Eavesdropping on what is being displayed on monitors by picking up and decoding the electromagnetic interference (EMI) produced by monitors. • This phenomenon also applies to printers and computers. © 2012 Principles of Computer Security: CompTIA Security+ Security+® and Beyond, Third Edition TEMPEST • Transient Electromagnetic Pulse Emanation STandard – The process for controlling emanations • Term also refers to a military program to control emanations • Three basic ways to protect emanations – Keep equipment at a safe distance. – Provide shielding for equipment. – Provide shielded enclosure, such as a room. © 2012 Principles of Computer Security: CompTIA Security+ Security+® and Beyond, Third Edition Location • Where equipment is situated can increase or decrease its exposure to risk. – Where will you place access points? – How deep in the building can you place sensitive equipment? – What is the proximity of the building to roads? – Where are the monitors? – Where are your printers? © 2012 Principles of Computer Security: CompTIA Security+ Security+® and Beyond, Third Edition Chapter Summary • Identify various operational aspects to security in your organization. • Describe the physical security components that can protect your computers and network. • Identify environmental factors that can affect security. • Identify factors that affect the security of the growing number of wireless cellular technologies used for data transmission. • Prevent disclosure through electronic emanations. © 2012