Sara - Unit-4
Sara - Unit-4
Sara - Unit-4
Security policies exist at many different levels, from high-level constructs that describe an
enterprise’s general security goals and principles to documents addressing specific
issues, such as remote access or Wi-Fi use.
These documents work together to help the company achieve its security goals. The
policy defines the overall strategy and security stance, with the other documents helping
build structure around that practice.
Security policies may seem like just another layer of bureaucracy, but in truth, they are a
vitally important component in any information security program. Some of the benefits of
a well-designed and implemented security policy include:
A security policy doesn’t provide specific low-level technical guidance, but it does spell
out the intentions and expectations of senior management in regard to security. It’s then
up to the security or IT teams to translate these intentions into specific technical actions.
For example, a policy might state that only authorized users should be granted access to
proprietary company information. The specific authentication systems and access control
rules used to implement this policy can change over time, but the general intent remains
the same.
1|Page
2. Sets clear expectations
Without a security policy, each employee or user will be left to his or her own judgment
in deciding what’s appropriate and what’s not. This can lead to disaster when different
employees apply different standards.
Documented security policies are a requirement of legislation like HIPAA and Sarbanes-
Oxley, as well as regulations and standards like PCI-DSS, ISO 27001, and SOC2. Even
when not explicitly required, a security policy is often a practical necessity in crafting a
strategy to meet increasingly stringent security and data privacy requirements.
A good security policy can enhance an organization’s efficiency. Its policies get everyone
on the same page, avoid duplication of effort, and provide consistency in monitoring and
enforcing compliance. Security policies should also provide clear guidance for when
policy exceptions are granted, and by whom.
1. Program policy
2. Issue-specific policy
3. System-specific policy
1. Program policy
2. Issue-specific policy
Issue-specific policies build upon the generic security policy and provide more concrete
guidance on certain issues relevant to an organization’s workforce. Common examples
could include a network security policy, bring-your-own-device (BYOD) policy, social
media policy, or remote work policy. These may address specific technology areas but are
2|Page
usually more generic. A remote access policy might state that offsite access is only
possible through a company-approved and supported VPN, but that policy probably
won’t name a specific VPN client. This way, the company can change vendors without
major updates.
3. System-specific policy
This is especially important for program policies. Remember that many employees have
little knowledge of security threats, and may view any type of security control as a
burden. A clear mission statement or purpose spelled out at the top level of a security
policy should help the entire organization understand the importance of information
security.
Security policies are meant to communicate intent from senior management, ideally at
the C-suite or board level. Without buy-in from this level of leadership, any security
program is likely to fail. To succeed, your policies need to be communicated to
employees, updated regularly, and enforced consistently. A lack of management support
makes all of this difficult if not impossible.
3|Page
While it might be tempting to base your security policy on a model of perfection, you
must remember that your employees live in the real world. An overly burdensome policy
isn’t likely to be widely adopted. Likewise, a policy with no mechanism for enforcement
could easily be ignored by a significant number of employees.
Remember that the audience for a security policy is often non-technical. Concise and
jargon-free language is important, and any technical terms in the document should be
clearly defined.
Risk can never be completely eliminated, but it’s up to each organization’s management
to decide what level of risk is acceptable. A security policy must take this risk appetite
into account, as it will affect the types of topics covered.
7. Up-to-date information
Security policy updates are crucial to maintaining effectiveness. While the program or
master policy may not need to change frequently, it should still be reviewed on a regular
basis. Issue-specific policies will need to be updated more often as technology, workforce
trends, and other factors change. You may find new policies are also needed over time:
BYOD and remote access policies are great examples of policies that have become
ubiquitous only over the last decade or so.
A large and complex enterprise might have dozens of different IT security policies
covering different areas. The policies you choose to implement will depend on the
technologies in use, as well as the company culture and risk appetite. That said, the
following represent some of the most common policies:
2. Acceptable use policy: This is an issue-specific policy that defines the acceptable
conditions under which an employee can access and use the company’s
information resources.
4|Page
3. Remote access policy: This issue-specific policy spells out how and when
employees can remotely access company resources.
4. Data security policy: Data security can be addressed in the program policy, but it
may also be helpful to have a dedicated policy describing data classification,
ownership, and encryption principles for the organization.
physical security is the protection of your people, property and assets. This includes the
physical protection of equipment and tech, including data storage, servers and
employee computers.
Physical security is often jokingly referred to as just being “guards and gates”, but
modern physical security systems consist of multiple elements and measures,
for example:
Site layout and security configuration: where are your weak points? What
needs the most protection?
Visibility of critical areas: including lighting and video cameras
Access control: from simple locks through to keypads and biometric access
Perimeter protection: the “guards and gates” aspect of physical security
Intrusion detection: including motion sensors, cameras and tripwire alarms
Infrastructure protection: including power, fire, network connectivity and water
Staff training and incident response: do your employees know how to handle an
incident, and do you have an emergency response process in place?
As you can see, the physical security examples above are extremely varied, touching on
every aspect of a site and its functions. Some physical security plans are determined by
environmental factors, such as your site layout, whilst some are behavioral, like staff
training. So, to revisit the physical security definition above, successful protection of
people,
5|Page
PHYSICAL SECURITY MEASURES AND METHODS
There are all kinds of physical security measures, but the main types of physical security
fall into four broad categories: Deter, Detect, Delay and Respond.
As the diagram shows, the different physical security methods work together in stages.
These levels of physical security begin with Deter at the outermost level, working
inwards until finally, if all other levels are breached, a Response is needed.
Deter – Deterrence physical security measures are focused on keeping intruders out of
the secured area. Common methods include tall perimeter fences, barbed wire, clear
signs stating that the site has active security, commercial video cameras and access
controls. All of these are designed to give a clear message to criminals that trespassing is
not only difficult, it is also highly likely that they will be caught.
Detect – Detection works to catch any intruders if they manage to get past the deterrence
measures mentioned above. Some criminals might slip in behind an employee — known
as tailgating — or they might find a way of scaling barriers. In these cases, a physical
security measure that can detect their presence quickly is crucial. These include many
types of physical security system that you are probably familiar with. Physical security
controls examples include CCTV cameras, motion sensors, intruder alarms and smart
alerting technology like AI analytics. If an intruder is spotted quickly, it makes it much
easier for security staff to delay them getting any further, and to contact law enforcement
if needed.
Delay – You will notice that several physical security systems have multiple roles: they
can deter as well as detect. Many of the physical security measures above also effectively
delay intruders. Access control systems require credentials to open a locked door,
slowing an intruder down and making it easier to apprehend them.
Respond – Having the technology and processes to respond to intruders and take action
is crucial for physical security, yet often overlooked. Response physical security measures
include communication systems, security guards, designated first responders and
processes for locking down a site and alerting law enforcement.
Physical security controls come in a variety of forms — from perimeter fences, to guards
and security camera system recorders. Many physical security components have more
than one function, and when several methods are combined, they are very effective at
preventing or intercepting intruders and criminal activity.
6|Page
PHYSICAL SECURITY CONTROL TECHNOLOGY
Physical security technologies have evolved in leaps and bounds in recent years, offering
advanced protection at accessible price points. Physical security devices now use cloud
technology and artificial intelligence for even smarter processing in real time.
One of the great things about physical security technology is that it is scalable, so you can
implement it flexibly. If you are testing physical security technology out, you might start
with a small number of cameras, locks, sensors or keypads, and see how they perform.
However, for a more robust plan required for properties like municipalities,
extensive government cameras, access control and security technology are most likely
necessary and should be planned accordingly. When connected to the cloud or a secure
network, physical security technology can also collect useful data for audit trails and
analysis. It is also useful for demonstrating the merits of your physical security plan to
stakeholders.
Video security
Video security is primarily a Detect form of physical security control. Using a live
connection and smart cameras, it is possible to spot suspicious activity in real time. They
can also be used to Deter intruders, since the sight of cameras around a premises can
discourage criminals from attempting to break in.
Access control
Access control technology is another cornerstone of physical security systems. Like video
security, access control systems give you an overview of who is entering and exiting your
premises. It also gives you physical controls to keep certain people out and authorize
people to enter. Access control systems can help Detect and Delay intruders from
entering. They can also Deter intruders by making it too difficult to attempt entry. As with
security cameras, there are many different types of access control devices.
7|Page
Physical security technologies can log large quantities of data around the clock. Now, this
information can be enhanced with smart analytics. Analytics powered by artificial
intelligence (AI) can process all this data and provide helpful digests for your security
team, saving them valuable time and helping them to make faster, better informed
decisions. Many types of physical security technology now have AI analytics included as
part of their core functionality; however there are many options available on the market
for a more tailored setup.
The best way to uncover any potential weak spots is to conduct a thorough risk
assessment. Stress testing physical security rigorously will reveal where your main
challenges are. This in turn directs you on priority areas for your physical security
investment plan. You can conduct this risk assessment yourself, or you can consult
a specialist physical security company to do it for you.
Physical security failures are not always the direct result of a poor physical security
system. Sometimes, even with many of the right physical security measures, problems
can arise because of weaknesses or challenges in other business areas. Some of these
challenges are not immediately obvious, but will require stress testing or investigations
to reveal them.
Staff shortages can also put pressure on physical security systems. Even with the most
advanced physical security technology in place, businesses still need personnel to
oversee larger systems and make decisions about how and when to take action. In the
wake of the coronavirus pandemic, many businesses suffered from recruitment
shortages. Not having enough people to implement your physical security plan can put
a strain on morale and cause operational issues. Even if you can recruit new staff
members, if they are not sufficiently trained in the physical security technology you use,
or your company’s physical security policies, then this can also create bottlenecks that
leave you exposed to risk.
8|Page
how they feed information back into your physical security system. If your devices are
not compatible, or they are not properly integrated, critical information might be missed.
One way to minimize the likelihood of this happening is to use devices that comply
with ONVIF camera physical security standards. ONVIF is a set of standards specifically
designed to enable many different types of physical security technology to interface
seamlessly, regardless of manufacturer. For more advice on how to integrate technology
into your physical security system, go to the section in this guide on physical
security planning.
Drawing up physical security plans requires input from around your business. Physical
security measures do not take place in a vacuum — they affect every aspect of your day-
to-day operations. You will see that many physical security examples in the guide below
also feed into your company’s finances, regulatory status and operations. A good practice
for physical security planning is well researched, holistic and encompasses all your
departments and functions. In the following 5-step guide, you will learn how to apply
physical security best practices at every stage of your physical security plan, from risk
assessment to implementation.
You cannot approve any physical security investment without first knowing which
physical security measures are needed. This is why a thorough risk assessment is an
invaluable asset — once you have it, you can return to it, add to it and use it to adapt your
physical security systems over time.
It might be overwhelming trying to work out where to begin. If you do not have the know-
how or bandwidth to do this yourself, there are many physical security companies who
specialize in risk assessments and penetration testing. You can also take on a physical
security company to consult on the process, guiding you on how to carry it out effectively.
Begin by considering your most common physical security threats and vulnerabilities.
Using the Deter-Detect-Delay-Respond categories above, think about which physical
security breaches might happen in your business at each stage. The most obvious starting
point is identifying any unprotected points of entry, as well as any areas of interest or
high value.
9|Page
Next, see if your company has records of any previous physical security breaches. Your
insurance will have records of past claims, and prior physical security management might
have kept a log of past incidents. This is also the point at which you should liaise with
stakeholders and different departments; the risk assessment stage is when expectations
are set, and when teams’ cooperation is required for the overall success of your project.
Do not overlook any department: from senior management to physical security in IT,
every team will have something to contribute.
Really investigate your site. Leave no stone unturned, and consider that not all physical
security measures require cameras, locks or guards. For example, poorly-lit areas might
need cameras, but simply improving the lighting conditions will make an enormous
difference to how attractive that area would be to criminals. Also look at high-traffic and
low-traffic areas; both are prone to intrusion, since criminals can slip by unnoticed in
a crowd, or when nobody is around. These are areas where detecting and delaying
intruders will be the most important.
Finally, armed with this information, you can start to map out where to position physical
security components and redundancy networks. A redundancy network is crucial as any
physical security control is at risk of not working. In these cases, a backup network will
protect you from any physical security threats.
All the information you have gained from your risk assessment will help you to ascertain
the physical security controls you can purchase and implement. The scale of your project
will depend on the resources that are already available. For example, if you plan to install
extra IP cameras over analog cameras and smart access controls, you will first need to
check if you have sufficient internet bandwidth to handle streaming all this information.
You will also need to check you have enough server space to store all the data these
physical security devices will generate.
There is then the question of whether you choose to monitor your security in-house, or
whether you plan to outsource it to a physical security company. One basic consideration
is space — do you have enough space on-site for a security operations center (SOC)? You
will also need to consider whether your existing team can handle additional information
streams from more devices, or whether you would need to recruit more staff.
Outsourcing this function can relieve some of the operational pressure, but depending on
your industry, you must check whether physical security policies and compliance require
you to keep data confidential.
This is the stage to brainstorm what physical security tools you want, what you need
immediately, and what your physical security plans are for the mid to long term. With
a thorough plan in place, it will be much easier for you to work with stakeholders on
financial approval.
10 | P a g e
3. Commercial and operational approval
At this point, you will submit your plan for business approval. The key objective during
this phase is to agree on a financially viable plan that does not compromise on physical
security and leave you open to risk.
As stakeholders and other interested parties scrutinize your plan and suggest changes,
ensure you draw up a new risk matrix for each iteration. This way you can refer back to
previous versions to check that no physical security threats go under the radar.
Documenting every stage in writing will make sure that you and your stakeholders are on
the same page, so that further down the line there is accountability for how your physical
security systems perform.
Be prepared for a situation where you will have to compromise. In these circumstances,
review the areas where you cannot devote as many resources as you would like and see if
there is a workaround. For example, a seemingly vulnerable dark area might not require
specialist thermal cameras if the lighting conditions are improved. Or, perhaps instead of
hiring a large team of operators to field alarms, you could see if your current team can
handle the extra workload with the help of smart analytics.
With stakeholder backing, your physical security plan is finally ready for implementation.
This is the stage where processes are mapped out in greater detail, along with protocols
and internal physical security policies.
At this point, you will want to finalize the Respond aspects of your physical security
system. Establish points of contact for incident response, such as who is responsible for
threat verification and when to call law enforcement. This is also when to confirm finer
details such as how to manage out-of-hours monitoring, and when to arm and disarm
your site.
This is also when to confirm KPIs and to approve all stakeholder expectations in writing.
Once your physical security measures are up and running, meet with stakeholders to
explain how you will meet their expectations, and how the “settling in” process will work.
In the first few months, set up check-in calls with stakeholders to keep them apprised of
how physical security threats are being managed, and how your plan is working.
As your physical security system beds in and grows over time, there are some physical
security best practices it is wise to maintain. The cornerstone of your evolving plan
should be accountability: who is responsible for every aspect of your company’s physical
11 | P a g e
security. To this end, create a physical security guide or playbook, which everyone can
refer to, and which can adapt along with your site.
Cabling plays a crucial role in the implementation of physical security measures. It forms
the backbone of various security systems, enabling the transmission of data, video, and
power to monitor and control access to a facility. Here are some key aspects of cabling in
physical security measures:
12 | P a g e
8. Physical Locking Systems:
Electromagnetic locks, electric strikes, and other locking devices may
require electrical cabling to control access.
Data centers are centralized locations housing computing and networking equipment,
which is also known as information technology (IT) equipment and network
infrastructure. Network infrastructure comprises gateways, routers, switches, servers,
firewalls, storage systems, and application delivery controllers for managing and storing
data and applications. Data centers store large amounts of data for processing, analyzing,
and distributing—and thereby connect organizations to service providers. Many
organizations rent space and networking equipment in an off-site data center instead of
owning one. A data center that caters to multiple organizations is known as a multi-
tenant data center or a colocation data center, and is operated by a third party.
Physical security of a data center comprises various kinds of built-in safety and security
features to protect the premises and thereby the equipment that stores critical data for
multi-tenant applications. For the safety and security of the premises, factors ranging
from location selection to authenticated access of the personnel into the data center
should be considered, monitored, and audited vigorously. To prevent any physical
attacks, the following need to be considered:
Organizations should monitor the safety and security of the data center rack room with
authenticated access through the following systems:
13 | P a g e
uninterruptible power supply (UPS)
provision of both a fire alarm system and an aspirating smoke detection system
(e.g., VESDA) in a data center. A VESDA, or aspiration, system detects and alerts
personnel before a fire breaks out and should be considered for sensitive areas.
water leakage detector panel to monitor for any water leakage in the server room
rodent repellent system in the data center. It works as an electronic pest control to
prevent rats from destroying servers and wires.
fire protection systems with double interlock. On actuation of both the detector
and sprinkler, water is released into the pipe. To protect the data and information
technology (IT) equipment, fire suppression shall be with a zoned dry-pipe
sprinkler.
cable network through a raised floor, which avoids overhead cabling, reduces the
heat load in the room, and is aesthetically appealing.
Raised floor systems are required to route cables and chilled-air piping and ducting
beneath data center racks. The floor load for a data center is shown in figure 1, which is
an engineering plan for a typical data center. The plan encompasses the five critical
systems that are part of a data center:
14 | P a g e
The electrical system includes the electrical panels, such as power distribution units
(PDUs), UPS, backup diesel generation panels, and lighting panels, that are housed in the
electrical room.
The heating, ventilation and air conditioning (HVAC) systems may include roof-top units
and air handling units to distribute conditioned air. Split units or variable refrigerant flow
might also be used for temperature control. Cooling the raised floor area and between
racks is achieved by a computer room air conditioner that sucks in the hot air above the
racks and supplies cold air through the grills in the raised floor.
The fire detection and suppression system includes fire alarm detection and fire
protection systems, as well as dry protection systems (such as FM 200) for sensitive
areas, such as the server areas. Security systems include CCTV, video, and other access
control systems, such as biometrics and perimeter monitoring systems. Plant
communication systems and other notification systems are used for making emergency
announcements, such as for evacuation.
Data center tiers are an indication of the type of data center infrastructure to be
considered for a given application. It is a standardized methodology used to define
uptime of a data center. A data center tier, or level, in other words, is used for
differentiating key data center requirements, the focus being redundant components,
cooling, load distribution paths, and other specifications. It is a measure of data center
performance, investment, and return on investment.
15 | P a g e
Each of these tiers can be defined precisely (figure 2). Tier 1 is the simplest architecture,
while Tier 4 is a robust architecture with redundancy at all levels and hence is less prone
to failures. Each higher tier is built over the previous tiers with all their features.
Tier 1 is a type of data center that has a single path for utility sources, such as power and
cooling requirements. It also has one source of servers, network links, and other
components. Tier 2 is a type of data center that has a single path for utility sources, such
as power and cooling, as well as redundant capacity components, such as servers and
network links, to support IT load. It is more robust than Tier 1 in terms of the hardware,
and gives users a customizable balance between cost management and performance.
Tier 3 is a type of data center that has a redundant path for utility sources, such as power
and cooling systems, and an N+1 availability (the amount required plus backup).
Redundant capacity components, such as servers and network links, support the IT load
so no disruption to service is envisaged during repair. However, unplanned maintenance
can still cause problems. A Tier 4 data center is completely fault tolerant and has
redundant hot standby for every component and utility source. Unplanned maintenance
does not cause disruption in service.
Security of a data center begins with its location. The following factors need to be
considered: geological activity like earthquakes, high-risk industries in the area, risk of
flooding, and risk of force majeure. Some of these risks could be mitigated by barriers or
redundancies in the physical design.
LAYERS
The most optimal and strategic way to secure a data center is to manage it in terms of
layers (figure 3). Layers provide a structured pattern of physical protection, thus making
it easy to analyze a failure. The outer layers are purely physical, whereas the inner layers
also help to deter any deliberate or accidental data breaches.
16 | P a g e
The security measures can be categorized into four layers: perimeter security, facility
controls, computer room controls, and cabinet controls. Layering prevents unauthorized
entry from outside into the data center. The inner layers also help mitigate insider
threats.
First layer of protection: perimeter security. The first layer of data center security is to
discourage, detect, and delay any unauthorized entry of personnel at the perimeter. This
can be achieved through a high-resolution video surveillance system, motion-activated
security lighting, fiber-optic cable, etc. Video content analytics (VCA) can detect
individuals and objects and check for any illegal activity. Track movements of people and
avoid false alarms.
Second layer of protection: facility controls. In case of any breach in the perimeter
monitoring, the second layer of defense restricts access. It is an access control system
using card swipes or biometrics. High-resolution video surveillance and analytics can
identify the person entering and also prevent tailgating. More complex VCA can read
license plates, conduct facial recognition, and detect smoke and fire threats.
Third layer of protection: computer room controls. The third layer of physical security
further restricts access through diverse verification methods including: monitoring all
restricted areas, deploying entry restrictions such as turnstile, providing VCA, providing
biometric access control devices to verify finger and thumb prints, irises, or vascular
pattern, and using radio frequency identification. Use of multiple systems helps restrict
access by requiring multiple verifications.
Fourth layer of protection: cabinet controls. The first three layers ensure entry of only
authorized personnel. However, further security to restrict access includes cabinet
locking mechanisms. This layer addresses the fear of an “insider threat,” such as a
malicious employee. After implementing the first three layers well, cabinets housing the
racks inside the computer room also need to be protected to avoid any costly data breach.
There are multiple significant considerations for the critical fourth layer, like providing
server cabinets with electronic locking systems. To ensure secured access, the same
smart card can be used to access the cabinets. In addition, biometrics may be provided.
The above systems can be linked with the networked video cameras to capture the image
of the person and his or her activities, and log the data automatically for further analysis
and audit. PTZ cameras can be preset to positions based on cabinet door openings.
An integrated IP network of the four layers of security can create an effective, efficient,
and comprehensive system for any application. Further integration with the Internet
allows for centralized searching, storing, recording, sending, sharing, and retrieving
capabilities.
17 | P a g e
4.7 ENVIRONMENTAL CONTROLS IN PHYSICAL SECURITY
Environmental controls in physical security refer to measures and strategies put in place
to protect a facility or assets from various environmental threats and hazards. These
controls are essential for maintaining the integrity, availability, and functionality of
physical security systems and assets. Here are some key aspects of environmental
controls in physical security:
1. Climate Control: Maintaining proper temperature and humidity levels is critical for
sensitive equipment, data centers, and archives. Climate control systems, such as HVAC
(Heating, Ventilation, and Air Conditioning), are used to prevent overheating,
condensation, and other environmental factors that can damage equipment or sensitive
materials.
2. Fire Suppression Systems: Fire is a significant environmental threat. Fire suppression
systems, such as fire alarms, sprinklers, and gas-based systems (e.g., FM-200 or CO2), are
employed to detect and extinguish fires before they cause significant damage.
3. Flood Detection and Prevention: Flooding can result from various factors, including
natural disasters and plumbing failures. Flood detection systems, sump pumps, and
physical barriers like floodgates are used to prevent water damage and alert security
personnel in case of water intrusion.
4. Uninterruptible Power Supply (UPS): Environmental controls often rely on electrical
systems to function. UPS systems provide backup power to maintain critical operations
during power outages, surges, or fluctuations.
5. Backup Generators: In case of prolonged power outages, backup generators can ensure
continuous operation of security systems, including access control and surveillance
cameras.
6. Physical Barriers: Building design and construction methods can include physical
barriers to protect against environmental threats. These may include reinforced walls,
roofs, and windows that can withstand storms, vandalism, and other potential hazards.
7. Seismic Protection: In regions prone to earthquakes, buildings are constructed with
seismic-resistant designs and materials to protect against structural damage during
tremors.
8. Lightning Protection: Lightning strikes can damage electrical and electronic systems.
Lightning rods and grounding systems are used to mitigate the effects of lightning strikes.
9. Environmental Monitoring: Sensors and monitoring systems are used to detect
environmental changes and alert security personnel. These systems can include
temperature sensors, humidity sensors, and water sensors.
10. Redundancy and Disaster Recovery Planning: Environmental controls should be
complemented by robust redundancy and disaster recovery plans. These plans ensure
that critical systems can be quickly restored in case of environmental incidents.
11. Access Control: Access control measures are employed to limit access to areas containing
sensitive equipment and systems. This includes using biometric access controls,
keycards, or PIN codes to prevent unauthorized personnel from tampering with
environmental control systems.
18 | P a g e
12. Security Policies and Procedures: Well-defined security policies and procedures ensure
that personnel know how to respond to environmental threats. Training, drills, and
documentation play a crucial role in this aspect.
13. Regular Maintenance and Testing: Environmental control systems should be regularly
maintained and tested to ensure they are operational and reliable. This includes checking
fire suppression systems, backup power sources, and climate control systems.
Physical access control systems (PACS) are security systems designed to regulate and
restrict access to physical spaces, such as buildings, rooms, and facilities. These systems
are commonly used in various settings, including businesses, government facilities, data
centers, healthcare institutions, and residential properties. The primary purpose of a
PACS is to ensure that only authorized individuals can enter specific areas while keeping
unauthorized personnel out. Here are the key components and features of physical access
control systems:
1. Access Control Points: These are the entry and exit points where access is controlled.
Common examples include doors, gates, turnstiles, and parking barriers.
2. Access Control Credentials: To gain access, individuals need to present valid
credentials. Common types of credentials include:
Keycards: Magnetic stripe cards, proximity cards, or smart cards.
Biometric Data: Fingerprint scans, iris scans, or facial recognition.
PINs and Passwords: A personal identification number (PIN) or a password
entered via a keypad or touchscreen.
3. Access Control Panel: This is the central control unit of the PACS, responsible for
verifying credentials and managing access permissions.
4. Readers and Sensors: These devices read and capture data from access control
credentials. For instance, card readers, biometric scanners, and motion sensors.
5. Access Control Software: This software manages the PACS, including user profiles,
access policies, and monitoring. It allows administrators to configure access rules and
view access logs.
6. Database: A database stores user profiles, access privileges, and access logs, which are
used to verify credentials and track access events.
7. Locking Mechanisms: These devices physically control access by locking and unlocking
doors or gates. They can be electric strikes, magnetic locks, or motorized bolts.
8. Alarms and Notifications: The PACS can be integrated with alarms and notifications to
alert security personnel in the event of unauthorized access attempts.
9. Monitoring and Reporting: The system records and reports access events, allowing
administrators to review who entered an area and when.
10. Integration: PACS can be integrated with other security systems, such as video
surveillance, intrusion detection, and intercom systems, to enhance overall security.
11. Access Levels and Permissions: Administrators can define different access levels and
permissions for individuals or groups. For example, an employee might have access to
common areas and their office, but not to the server room.
19 | P a g e
12. Audit Trails: PACS often maintain detailed audit trails that can be used for forensic
purposes, investigations, or compliance requirements.
13. Remote Access and Control: Some PACS allow for remote management and monitoring,
enabling administrators to control access even when they are not on-site.
20 | P a g e
11. Incident Reporting: Encourage employees to report any security incidents, breaches, or
suspicious activities promptly. Have a clear reporting procedure in place and protect
whistleblowers from retaliation.
12. Data Handling: Train employees on how to handle data securely, both digitally and
physically. This includes proper data disposal, secure file sharing, and encryption
practices.
13. Remote Work Policies: Establish clear security policies for remote work, including
secure access to company resources and the protection of sensitive information on
personal devices.
14. Periodic Reviews: Regularly review and update security procedures, conduct security
audits, and assess the effectiveness of security measures.
15. Disciplinary Actions: Define consequences for violating security policies and
procedures, and apply them consistently.
1. Identification: The first step is for the user to provide their identity, usually in the form
of a username, email address, or some other identifier.
2. Authentication: After identification, the system verifies the user's claimed identity.
Authentication methods can include passwords, PINs, biometrics (like fingerprint or
facial recognition), smart cards, or two-factor authentication (2FA). The goal is to ensure
that the user is who they claim to be.
3. Authorization: Once the user's identity is confirmed, the system checks whether the user
has the necessary permissions to access the requested resource or perform a specific
action. This is usually done through role-based access control (RBAC), where users are
assigned roles, and those roles have associated permissions. It could also involve
attribute-based access control (ABAC), which takes into account various attributes or
conditions.
4. Access Control Lists (ACLs): In some cases, access authorization is governed by Access
Control Lists, which are lists of rules specifying who is allowed or denied access to
specific resources.
5. Logging and Auditing: All access attempts, whether successful or not, are often logged
for security and compliance purposes. This can help in tracking who accessed what and
when, making it easier to detect and investigate security incidents.
6. Revocation: Access permissions can be revoked or modified when necessary, especially
in the case of employee turnover or changes in user roles.
7. Access Verification: The user is granted access if they pass the authentication and
authorization checks; otherwise, their access is denied.
21 | P a g e
Access authorization/verification is employed in a wide range of settings:
Computer Systems: In operating systems and network security, access control is used to
protect data and system resources.
Web Applications: Users log in with their credentials, and the application checks if they
have the necessary privileges to access certain features or data.
Physical Security: Access control systems can use key cards, PINs, or biometrics to grant
or deny entry to secure areas.
Cloud Services: Cloud providers implement access authorization to ensure that only
authorized users can access and manage cloud resources.
Banking and Finance: Access authorization is critical in online banking and financial
systems to protect sensitive customer data.
Healthcare: In electronic health records (EHR) systems, patient data access is strictly
controlled to comply with privacy regulations
4.11 CONTRACTORS
Contractors in the field of security play a crucial role in a variety of industries and
contexts. These contractors are typically hired by organizations, government agencies, or
individuals to provide specialized security services. Here are some common types of
security contractors and the services they offer:
1. Private Security Contractors: Private security companies offer a wide range of services,
including armed and unarmed security personnel, access control, surveillance, and
security consulting. They may provide security for businesses, residential communities,
events, and more.
2. Close Protection (Bodyguards): Close protection contractors, often referred to as
bodyguards, are hired to provide personal security to individuals, such as celebrities,
high-profile executives, or government officials. They are trained to assess and mitigate
security risks and respond to threats.
3. Information Security Contractors: These contractors specialize in protecting digital
assets and data. They may conduct penetration testing, assess vulnerabilities, and
implement cybersecurity measures to safeguard against hacking, data breaches, and
other cyber threats.
4. Physical Security Contractors: Physical security contractors focus on securing physical
assets and properties. They may install security systems, access control measures, and
surveillance equipment, as well as conduct security assessments.
5. Event Security Contractors: These contractors are hired to provide security services for
large gatherings, including concerts, sporting events, and conferences. They help
maintain crowd control, manage access, and ensure the safety of attendees.
6. Transportation Security Contractors: Contractors in this category may provide
security for the transportation industry, such as airline security, maritime security, or
armored car services.
22 | P a g e
7. Security Consulting Firms: Security consultants offer expertise in assessing security
risks and designing comprehensive security plans. They may also provide training and
advice on security best practices to organizations.
8. Government Security Contractors: Government agencies often contract private security
firms for various purposes, including protecting sensitive facilities, providing security in
conflict zones, and conducting intelligence and counterterrorism operations.
9. Cybersecurity Contractors: These contractors specialize in protecting digital assets
from cyber threats. They may offer services such as malware analysis, incident response,
and security auditing.
10. Firearms and Weapons Training: Some contractors offer training in the use of firearms
and other weapons, often for security personnel who need to carry and use weapons as
part of their job.
It's important for security contractors to adhere to local laws and regulations, and they
may need to obtain licenses and certifications depending on the type of security services
they provide. Additionally, many security contractors are subject to industry standards
and best practices to ensure the safety and security of their clients.
Regene
Systems maintenance personnel are individuals or a team responsible for the upkeep and
proper functioning of various systems within an organization. These systems can include
computer systems, machinery, equipment, or any other technology or infrastructure
crucial to the organization's operations. The primary responsibilities of systems
maintenance personnel typically include:
23 | P a g e
7. Compliance and Security: Ensuring that systems meet industry standards, security
protocols, and regulatory requirements to protect sensitive data and maintain data
integrity.
8. Documentation: Keeping detailed records of maintenance activities, repairs, and updates,
which can be useful for troubleshooting, audits, and compliance purposes.
9. Emergency Response: Being prepared to respond to system emergencies or critical
failures promptly and effectively to minimize downtime and disruptions.
10. Training and Support: Providing training and support to end-users or other staff
members who rely on the systems, helping them understand best practices and
troubleshoot common issues.
11. Asset Management: Tracking and managing hardware and software assets, ensuring their
proper utilization, and planning for replacement or upgrades as necessary.
12. Budget Management: Collaborating with management to plan and manage budgets for
maintenance and upgrades of systems and equipment.
24 | P a g e
7. Security Vetting: Collaborate with relevant government agencies or authorities, if
applicable, to conduct security vetting for employees who require access to classified or
highly sensitive information.
8. Access Control: Implement strong access controls, including physical access restrictions,
electronic authentication systems, and role-based permissions, to limit access to
authorized personnel.
9. Two-Factor Authentication: Implement two-factor authentication for access to critical
systems or data. This adds an additional layer of security to verify the identity of the
employee.
10. Reporting and Incident Response: Establish a clear process for employees to report
security incidents, breaches, or suspicious activities. Develop an incident response plan to
address security breaches promptly.
11. Termination Procedures: Define strict procedures for revoking access and security
clearances when an employee leaves the organization or changes roles. This helps
prevent unauthorized access after an employee's departure.
12. Insider Threat Mitigation: Continuously monitor and assess potential insider threats
within the organization, and have strategies in place to mitigate these risks.
13. Regular Audits: Conduct regular security audits and assessments to ensure compliance
with security policies and identify areas for improvement.
14. Encryption: Implement data encryption to protect sensitive information both in transit
and at rest.
15. Security Culture: Promote a strong security culture within the organization, encouraging
employees to be vigilant, report security concerns, and actively participate in
safeguarding the organization's assets.
Position sensitivity in security practices refers to the idea that not all individuals within
an organization should have the same level of access or authority when it comes to
sensitive information, systems, or physical locations. It's a fundamental concept in
security management and is often implemented to protect an organization's assets and
data from unauthorized access or breaches. Here are some key aspects of position
sensitivity in security practices:
1. Access Control: Different positions within an organization have varying access rights to
information systems, data, and physical areas. For example, an entry-level employee
might only have access to their own work files, while a senior executive may have access
to a broader range of company data. Access control mechanisms, such as user
authentication, role-based access control, and permissions management, are used to
enforce position-specific access privileges.
2. Need-to-Know Principle: The need-to-know principle is the foundation of position
sensitivity. It states that individuals should only have access to information or resources
necessary to perform their job functions. This principle minimizes the risk of
25 | P a g e
unauthorized personnel accessing sensitive data. For example, HR staff should have
access to employee records, but not financial records.
3. Security Clearance Levels: In government and highly regulated industries, security
clearance levels are used to categorize positions based on the level of trust and access
they require. Clearance levels range from low to high, and access to sensitive information
is granted according to the specific level of clearance an individual holds.
4. Physical Security: Position sensitivity extends to physical security. Certain areas within
a facility, like data centers or research laboratories, might be restricted to authorized
personnel only. This is achieved through measures such as key card access, biometric
scans, or security personnel.
5. Security Training: Different positions may require varying levels of security training.
For example, employees handling sensitive customer data should receive training on data
protection and privacy practices, while IT administrators should be trained in
cybersecurity best practices.
6. Monitoring and Auditing: Higher-level positions may be subject to more stringent
monitoring and auditing to ensure that they are not abusing their access privileges. For
example, network administrators may have their activities closely monitored to prevent
any misuse of their elevated access.
7. Data Encryption: Sensitive data should be encrypted, and the encryption keys should be
managed based on position sensitivity. Only authorized personnel should have access to
encryption keys to decode the data.
8. Incident Response: Different positions may have distinct roles in the event of a security
incident. For example, the IT team may have specific responsibilities for investigating and
mitigating a data breach, while HR may be responsible for employee communication.
26 | P a g e
4. Data Protection: Employees should understand how to handle sensitive data, including
how to classify and protect it. This training may cover encryption, data retention policies,
and secure data disposal.
5. Device Security: Training should include information about securing computers, mobile
devices, and other equipment. This can involve setting up firewalls, keeping software up
to date, and using antivirus software.
6. Safe Browsing Practices: Teach employees how to browse the internet safely, including
recognizing secure websites (HTTPS), avoiding suspicious downloads, and being cautious
about the information they share online.
7. Physical Security: Employees should be aware of physical security measures, such as
locking computers, securing access to the workplace, and preventing unauthorized access
to sensitive areas.
8. Incident Reporting: Training should cover how and when to report security incidents.
This ensures that security incidents are reported promptly and can be addressed
effectively.
9. Compliance and Regulations: Depending on the industry and location, organizations
may need to comply with various cybersecurity regulations. Training should cover the
specific requirements relevant to the organization.
10. Continuous Learning: Cyber threats are constantly evolving, so ongoing training and
awareness efforts are crucial. Regular updates, reminders, and simulated phishing
exercises can help reinforce security practices.
11. Security Culture: Fostering a culture of security within the organization is essential. This
includes encouraging employees to take responsibility for security and creating an
environment where they feel comfortable reporting security concerns.
12. Top-Down Support: Leadership and management must set an example by adhering to
security practices and supporting the training and awareness efforts.
13. Measuring Effectiveness: It's important to assess the effectiveness of security training
and awareness programs. This can be done through metrics like reduced incident rates,
successful phishing test results, and employee feedback.
14. Customization: Training programs should be tailored to the organization's specific
needs, taking into account the industry, size, and unique risks it faces.
15. User-Friendly Resources: Provide easily accessible resources, such as security
guidelines, tips, and contacts for reporting security concerns.
Copyright protection and licensing are important aspects of intellectual property law that
govern the use and distribution of creative works. Let's break down these concepts:
27 | P a g e
work, and it includes rights such as reproduction, distribution, adaptation, and public
performance.
2. Licensing: Licensing involves granting or obtaining permission to use copyrighted
works, typically through a contract or agreement. When a creator (licensor) licenses their
work to another party (licensee), they specify the terms and conditions under which the
work can be used. Licensing allows creators to retain ownership of their work while
enabling others to use it for specific purposes. It can be a source of income for creators.
There are various types of licenses, including:
Exclusive License: Grants exclusive rights to the licensee, meaning no one else
can use the work in the same way during the license period.
Non-Exclusive License: Allows multiple licensees to use the work
simultaneously.
Perpetual License: Grants rights to use the work indefinitely.
Limited Duration License: Specifies a specific time frame during which the work
can be used.
3. Creative Commons Licenses: Creative Commons licenses are a popular way to provide
more flexible terms for sharing creative works. These licenses allow creators to specify
how others can use their work, whether for commercial or non-commercial purposes,
with or without modifications, and whether or not attribution is required.
4. Fair Use: Fair use is an important doctrine in copyright law that allows limited use of
copyrighted material without permission from or payment to the copyright holder under
certain conditions, such as for purposes of criticism, comment, news reporting, teaching,
scholarship, and research. What constitutes fair use is determined on a case-by-case basis
and can vary by jurisdiction.
5. Enforcement and Protection: Copyright holders can enforce their rights through legal
action if someone uses their work without permission or in violation of the license terms.
This may involve seeking damages, injunctions, or other remedies through the legal
system.
28 | P a g e