Chapter 7. Physical and Environmental Security

Chapter Objectives

After reading this chapter and completing the exercises, you will be able to do the following:

Image Define the concept of physical security and how it relates to information security.

Image Evaluate the security requirements of facilities, offices, and equipment.

Image Understand the environmental risks posed to physical structures, areas within those structures, and equipment.

Image Enumerate the vulnerabilities related to reusing and disposing of equipment.

Image Recognize the risks posed by the loss or theft of mobile devices and media.

Image Develop policies designed to ensure the physical and environmental security of information, information systems, and information-processing and storage facilities.

In the beginning of the computer age, it was easy to protect the systems; they were locked away in a lab, weighed thousands of pounds, and only a select few were granted access. Today, computing devices are ubiquitous. We are tasked with protecting devices that range from massive cloud-based multiplex systems to tiny handheld devices. The explosion of both distributed and mobile computing means that computing devices can be located anywhere in the world and are subject to local law and custom. Possession requires that each individual user take responsibility for mobile device security.

Security professionals are often so focused on technical controls that they overlook the importance of physical controls. The simple reality is that physical access is the most direct path to malicious activity, including unauthorized access, theft, damage, and destruction. Protection mechanisms include controlling the physical security perimeter and physical entry, creating secure offices, rooms, and facilities, and implementing barriers to access, such as encryption, monitoring, and alerting. Section 11 of ISO 27002:2013 encompasses both physical and environmental security. Environmental security refers to the workplace environment, which includes the design and construction of the facilities, how and where people move, where equipment is stored, how the equipment is secured, and protection from natural and man-made disasters.

In previous chapters, you learned that to properly protect organizational information we must first know where it is and how critical it is to the organization. Just as we shouldn’t spend as much money or resources to protect noncritical information as we would to protect critical information, so it goes that we shouldn’t spend the same amount to protect a broom closet as we should to protect information-processing facilities such as data centers, server rooms, or even offices containing client information.

Information security professionals rarely have the expertise to address this security domain on their own. It is critical to involve facilities and physical security personnel in strategic and tactical decisions, policies, and procedures. For example, the information security expert designs a server room with a double steel door, card-reading lock, and a camera outside the door. A facilities expert may question the construction of the walls, floor, vents, and ceilings, the capability of the HVAC and fire suppression systems, as well as the potential for a natural disaster, such as an earthquake, fire, or flood. A physical security expert may question the location, the topography, and even the traffic patterns of pedestrians, automobiles, and airplanes. Creating and maintaining physical and environmental security is a team effort.

In this chapter, we will be focusing on design, obstacles, monitoring, and response as they relate to secure areas, equipment security, and environmental controls. We will examine the security issues, related best practices, and of course physical and environmental security policies.


FYI: ISO/IEC 27002:2013 and NIST Guidance

Section 11 of ISO 27002:2013 is dedicated to physical and environmental security, with the objective of maintaining a secure physical environment to prevent unauthorized access, damage, and interference to business premises. Special attention is paid to disposal and destruction.

Corresponding NIST guidance is provided in the following documents:

Image SP 800-12: An Introduction to Computer Security—The NIST Handbook

Image SP 800-14: Generally Accepted Principles and Practices for Securing Information Technology Systems

Image SP 800-88: Guidelines for Media Sanitization

Image SP 800-100: Information Security Handbook: A Guide for Managers


Understanding the Secure Facility Layered Defense Model

The premise of a layered defense model is that if an intruder can bypass one layer of controls, the next layer of controls should provide additional deterrence or detection capabilities. Layered defense is both physical and psychological. The mere fact that an area appears to be secure is in itself a deterrent. Imagine the design of a medieval castle. The castle itself was built of stone. It was sited high on a hill within a walled property. There may have been a moat and an entry drawbridge. There were certainly lookouts and guards. In order for intruders to launch a successful attack, they had to overcome and penetrate each of these obstacles. The same concept is used in designing security buildings and areas.


FYI: Where the Internet Lives

In late 2012, The New York Times had a special series of articles detailing the environment and societal impact of mega data centers. Some of their major statistics included the following:

Image There are more than three million data centers widely varying in size worldwide.

Image Electricity used in global data centers likely accounted for between 1.1% and 1.5% in 2010.

Image Worldwide data centers use about 30 billion watts of electricity, equivalent to the output of 30 nuclear power plants.

Image Federal data centers grew from 432 in 1998 to 2,094 in 2010.

Why are these server farms mushrooming? According to IBM, 90% of the data in the world today has been created in the last two years alone.

To take a look at Google’s data centers, go to www.google.com/about/datacenters.

You can view a photo gallery, take a “street view” tour, or even go on a guided video tour!


How Do We Secure the Site?

Depending on the size of the organization, information-processing facilities can range from a closet with one server to an entire complex of buildings with several thousand or even hundreds of thousands of computers. In addressing site physical security, we need to think of the most obvious risks, such as theft and other malicious activity, but we also must consider accidental damage and destruction related to natural disasters.

Location

The design of a secure site starts with the location. Location-based threats that need to be evaluated include political stability, susceptibility to terrorism, the crime rate, adjacent buildings, roadways, flight paths, utility stability, and vulnerability to natural disasters. Historical and predictive data can be used to establish both criminal and natural disaster chronology for a geographic area. The outcome will influence the type of security measures that an organization should implement. Best practices dictate that critical information-processing facilities be inconspicuous and unremarkable. They should not have signage relating to their purpose, nor should their outward appearance hint at what may be inside.


FYI: Crime Prevention Through Environmental Design (CPTED)

CPTED (pronounced sep-ted) has as its basic premise that the proper design and effective use of the physical environment can lead to a reduction in the incidence and fear of crime. CPTED is a psychological and sociological method of looking at security based upon three constructs:

Image People protect territory they feel is their own, and people have a certain respect for the territory of others.

Image Intruders do not want to be seen.

Image Limiting access discourages intruders and/or marks them as intruders.

The International CPTED Association (ICA) is committed to creating safer environments and improving the quality of life through the use of CPTED principles and strategies. You can learn more about this design concept at www.cpted.net.


Perimeter Security

The three elements to security are obstacles that deter trivial attackers and delay serious ones, detection systems that make it more likely that the attack will be noticed, and a response capability to repel or catch attackers. Obstacles include physical elements such as berms, fences, gates, and bollards. Lighting is also a valuable deterrent. Entrances, exits, pathways, and parking lots should be illuminated. Fences should be at least eight feet in height, with a two-foot parameter of light used to illuminate along the top portion of the fence. The candlepower of the lighting must observe security standards. Detection systems include IP cameras, closed-circuit TV, alarms, motion sensors, and security guards. Response systems include locking gates and doors, on-site or remote security personnel notification, and direct communication with local, county, or state police.

How Is Physical Access Controlled?

Our next area to consider is physical entry and exit controls. What does it take to get in and out? How is trouble detected and reported? Depending on the site and level of security required, a plethora of access controls are available, including cameras, security guards, mantraps, locks, barriers, metal detectors, biometric scanners, fire-resistant exterior walls that are solid and heavy, and unbreakable/shatterproof glass. The biggest challenge is authorized entry.

Authorizing Entry

How does a company identify authorized personnel such employees, contractors, vendors, and visitors? Of greatest concern becomes the fraudulent or forged credentials obtained through careful profiling or the carelessness of authenticated employees. One commonly used option is a badging system. Badges may also function as access cards. Visitors to secure areas should be credentialed and authorized. A number of visitor management systems facilitate ID scanning and verification, photo storage, credentialing, check-in and check-out, notifications, and monitoring. Visitors should be required to wear some kind of identification that can be evaluated from a distance. For instance, we might choose to have three different colored badges for visitors, which tell our employees what level of supervision should be expected, even if they view the person from across a 100-foot room. If a blue badge denotes close supervision, and you see someone wearing a blue badge without any supervision, you would know immediately to report the visitor or perhaps activate a silent alarm without having to confront or even come within close proximity of the individual.

Securing Offices, Rooms, and Facilities

In addition to securing building access, the organization needs to secure the workspaces within the building. Workspaces should be classified based on the level of protection required. The classification system should address personnel security, information systems security, and document security. The security controls must take into consideration workplace violence, intentional crime, and environmental hazards.

Secure design controls for spaces within a building include (but are not limited to) the following:

Image Structural protection such as full height walls, fireproof ceilings, and restricted vent access

Image Alarmed solid, fireproof, lockable, and observable doors

Image Alarmed locking, unbreakable windows

Image Monitored and recorded entry controls (keypad, biometric, card swipe)

Image Monitored and recorded activity

Working in Secure Areas

It is not enough to just physically secure an area. Close attention must be paid to who is allowed to access the area and what they are allowed to do. Access control lists should be reviewed frequently. If the area is continually monitored, there should be guidelines specifying what is considered “suspicious” activity. If the area is videoed and not continually monitored, then there should be documented procedures regarding how often and by whom the video should be reviewed. Depending on the circumstances, it may be prudent to restrict cameras or recording devices, including smartphones, tablets, and USB drives, from being taken into the area.

Ensuring Clear Desks and Clear Screens

Documents containing protected and confidential information are subject to intentional or accidental unauthorized disclosure unless secured from viewing by unauthorized personnel when not in use. The same holds true for computer screens. Companies have a responsibility to protect physical and digital information both during the workday and during non-business hours. All too often, organizations make it easy for unauthorized users to view information. Unauthorized access can be the result of viewing a document left unattended or in plain sight, removing (or reprinting) a document from a printer, copier, or fax machine, stealing digital media such as a DVD or USB drive, and even shoulder surfing, which is the act of looking over someone’s shoulder to see what is displayed on a monitor or device.

Protected or confidential documents should never be viewable by unauthorized personnel. When not in use, documents should be locked in file rooms, cabinets, or desk drawers. Copiers, scanners, and fax machines should be located in non-public areas and require use codes. Printers should be assigned to users with similar access rights and permissions and located close to the designated users. Users should be trained to retrieve printed documents immediately. Monitors and device screens should be situated to ensure privacy. Password-protected screen savers should be automated to engage automatically. Users should be trained to lock their screens when leaving devices unattended. Physical security expectations and requirements should be included in organizational acceptable use agreements.


FYI: CERT Case Files on Insider Theft

According to the CERT Insider Threat Blog entry from May 10, 2011, about 8% of crimes involving IT sabotage, theft of intellectual property, and fraud are related to physical access. Here are some of the cases they reviewed:

Image For more than a year, a contract janitor stole customer account and personally identifiable information (PII) from hard-copy documents at a major U.S. bank. The janitor and two co-conspirators used this information to steal the identities of more than 250 people. They were able to open credit cards and then submit online change-of-address requests so the victims would not receive bank statements or other notifications of fraudulent activity. The insiders drained customers’ accounts, and the loss to the organization exceeded $200,000.

Image A communications director showed an expired ID badge to a security guard to gain unauthorized access to a data backup facility. Once inside, the director unplugged security cameras and stole backup tapes containing records for up to 80,000 employees.

Image A contract security guard used a key to obtain physical access to a hospital’s heating, ventilating, and air conditioning (HVAC) computer and another workstation. The guard used password-cracking software to obtain access and install malicious software on the machines. The incident could have affected temperature-sensitive patients, drugs, and supplies.

Image An insider stole an organization’s trade-secret drawings that were marked for destruction and sold them to a competing organization. The victim organization estimated its losses at $100 million. The competing organization that received the stolen documents was forced to declare bankruptcy after a lawsuit.


Protecting Equipment

Now that we have defined how facilities and work areas will be secured, we must address the security of the equipment within these facilities. Traditionally, protection controls were limited to company-owned equipment. This is no longer the case. Increasingly, organizations are encouraging employees and contractors to “bring your own device” to work (referred to as BYOD). These devices may store, process, or transmit company information. In developing policies, we need to consider how best to protect both company- and employee-owned equipment from unauthorized access, theft, damage, and destruction.

No Power, No Processing?

No power, no processing—it’s that simple. Long before computers took over the business world, organizations have been taking steps to ensure that power is available. Of course, it is now more important than ever. All information systems rely on clean, consistent, and abundant supplies of electrical power. Even portable devices that run on battery power require electricity for replenishment. Power is not free. Quite the contrary: Power can be very expensive, and excessive use has an environmental and geopolitical impact.

Energy Consumption

After lighting, computers and monitors have the highest energy consumption in office environments. As power consumption and costs rise, saving energy is becoming a significant issue. Using less energy depletes fuel at a lower rate, creates less pollution, and means less counterbalancing energy usage (for example, when the heat generated by a computer requires more air conditioning). Universities and Fortune 500 organizations have been leaders in the sustainable “green” computing movement. The goals of sustainable computing are to reduce the use of hazardous materials, maximize energy efficiency during the product’s lifetime, and promote the recyclability or biodegradability of defunct products and factory waste. One way to reduce consumption is to purchase Energy Star–certificated devices. Energy Star is a joint program of the U.S. Environmental Protection Agency and the U.S. Department of Energy to protect the environment through energy-efficient products and practices. There are strict guidelines that must be met, and only a limited percentage of products are accepted into the program. According to Google, one of the ways they have reduced data center energy consumption is to reduce cooling. Contrary to the misconception that data centers need to be kept chilly, most IT equipment can safely operate at 80°F or higher. Saving energy results in lower costs, less environmental impact, and a decreased dependence on global politics.


FYI: Reducing Energy Consumption

The following is an excerpt from Cornell University’s Facilities Services Sustainable Computing Guide:

“A typical workstation consists of energy eating devices such as a computer, monitor, and any number of peripherals. It is possible to reduce daily consumption by up to 88%:

ImageTurn off peripherals when not in use. Peripherals generally make up 10% of the total energy usage. Assuming an eight-hour workday, turning the peripherals off for the remaining 16 hours in the day would reduce the daily energy usage in the example by 6.7%.

ImageTurn off monitors when not in use. Assuming that a typical user is only at their desk eight hours during the workday, this leaves 16 hours in which the monitor is not in use. Workstations configured to place the monitor into PowerSave mode during unused time could reduce daily energy usage by 24.5%.

ImageTurn off computers when not in use. Powering down or placing a computer in standby mode will result in the largest drop in energy usage. Turning off the workstation for 16 of the 24 hours in a day would reduce the daily energy usage of that workstation by 62.3%.

“It is a myth that turning your computer off uses more energy than leaving it on. The surge of power used by a CPU to boot up is far less than the energy used by the unit when left on for over three minutes. One computer left on 24 hours a day dumps 1,500 pounds of CO2 into the atmosphere annually. A tree absorbs between 3–15 pounds of CO2 each year. That means that 100–500 trees would be needed to offset the yearly emissions of one computer left on all the time.”


Power Protection

To function properly, our systems need consistent power delivered at the correct voltage level. Systems need to be protected from power loss, power degradation, and even from too much power, all of which can damage equipment. Common causes of voltage variation include lightning; damage to overhead lines from storms, trees, birds, or animals; vehicles striking poles or equipment; and load changes or equipment failure on the network. Heat waves can also contribute to power interruptions as the demand in electricity (that is, air conditioners) can sometimes exceed supply. The variation may be minor or significant.

Power flucuations are catagorized by changes in voltage and power loss:

Image Power surges are prolonged increases in the voltage. A power spike is a momentary increase in voltage.

Image Brownouts are prolonged periods of low voltage. A sag is a momentary low voltage.

Image Blackouts are prolonged periods of power loss. A fault is a momentary loss of power.

Companies can install protective devices to help guard their premises and assets, such as installing surge protection equipment, line filters, isolation transformers, voltage regulators, power conditioners, uninterruptible power supplies (UPSs), and back-up power supplies. These power protection devices can condition the feed for consistency, provide continuous power for critical systems, and manage a controlled shutdown in the event of total loss of power.

How Dangerous Is Fire?

Imagine the impact of a data center fire—equipment and data irrevocably destroyed, internal communications damaged, and external connectivity severed. On July 3, 2009, multiple data centers at Seattle’s Fisher Plaza were offline after a fire in an electrical vault, which left much of the complex without power and generator support. The payment portal Authorize.net was offline for hours, leaving thousands of merchants unable to process credit card payments through their websites. The downtime also affected Microsoft’s Bing Travel service, Geocaching.com, domain registrar Dotster, and web hosting provider AdHost, along with dozens of other sites.

Fire protection is composed of three elements. Active and passive fire prevention controls are the first line of defense. Fire prevention controls include hazard assessments and inspections, adhering to building and construction codes, using flame-retardant materials, and proper handling and storage procedures for flammable/combustible materials. Fire detection is recognizing that there is a fire. Fire detection devices can be smoke activated, heat activated, or flame activated. Fire containment and suppression involve actually responding to the fire. Containment and suppression equipment is specific to fire classification. Data center environments are typically at risk to Class A, B, or C fires:

Image Class A—Fire with combustible materials as its fuel source, such as wood, cloth, paper, rubber, and many plastics

Image Class B—Fire in flammable liquids, oils, greases, tars, oil-base paints, lacquers, and flammable gases

Image Class C—Fire that involves electrical equipment

Image Class D—Combustibles that involve metals

Facilities must comply with standards to test fire-extinguishing methods annually to validate full functionality.

The best-case scenario is that data centers and other critical locations are protected by an automatic fire-fighting system that spans multiple classes. Like all other major investments, it’s prudent to do a cost/benefit analysis before making a decision. In any emergency situation, human life always takes precedence. All personnel should know how to quickly and safely evacuate an area.

What About Disposal?

What do servers, workstations, laptops, tablets, smartphones, firewalls, routers, copies, scanners, printers, memory cards, cameras, and flash drives have in common? They all store data that should be permanently removed before handing down, recycling, or discarding.

The data can be apparent, hidden, temporary, cached, browser based, or metadata:

Image Apparent data files are files that authorized users can view and access.

Image Hidden files are files that the operating system by design does not display.

Image Temporary files are created to hold information temporarily while a file is being created.

Image A web cache is the temporary storage of web documents, such as HTML pages, images, and downloads.

Image A data cache is the temporary storage of data that has recently been read and, in some cases, adjacent data areas that are likely to be accessed next.

Image Browser-based data includes the following items:

Image Browsing history, which is the list of sites visted

Image Download history, which is the list of files downloaded

Image Form history, which includes the items entered into web page forms

Image Search bar history, which includes items entered into the search engines

Image Cookies, which store information about websites visited, such as site preferences and login status

Image Metadata is details about a file that describes or identifies it, such as title, author name, subject, and keywords that identify the document’s topic or contents.

Removing Data from Drives

A common misconception is that deleting a file will permanently remove its data. Deleting (or trashing) a file removes the operating system pointer to the file. Formatting a disk erases the operating system address tables. In both cases, the files still reside on the hard drive, and system recovery software can be used to restore the data. To give you an idea of how easy it is to recover information from a formatted hard drive, simply Google the phrase “data recovery” and see what comes back to you. Utilities are available for less than $50 that are quite capable of recovering data from formatted drives. Even if a drive has been formatted and a new operating system installed, the data is recoverable.

NIST Special Publication 800-88 defines data destruction as “the result of actions taken to ensure that media cannot be reused as originally intended and that information is virtually impossible to recover or prohibitively expensive.” There are two methods of permanently removing data from a drive—disk wiping (also known as scrubbing) and degaussing. The disk wiping process will overwrite the master boot record (MBR), partition table, and every sector of the hard drive with the numerals 0 and 1 several times. Then the drive is formatted. The more times the disk is overwritten and formatted, the more secure the disk wipe is. The government medium security standard (DoD 5220.22-M) specifies three iterations to completely overwrite a hard drive six times. Each iteration makes two write-passes over the entire drive; the first pass inscribes ones (1) over the drive surface and the second inscribes zeros (0) onto the surface. After the third iteration, a government-designated code of 246 is written across the drive, then it is verified by a final pass that uses a read-verify process. There are several commercially available applications that follow this standard. Disk wiping does not work reliability on solid-state drives; USB thumb drives, compact flash, and MMC/SD cards. Degaussing is the process wherein a magnetic object, such as a computer tape, hard disk drive, or CRT monitor, is exposed to a magnetic field of greater, fluctuating intensity. As applied to magnetic media, such as video, audio, computer tape, or hard drives, the movement of magnetic media through the degaussing field realigns the particles, resetting the magnetic field of the media to a near-zero state, in effect erasing all of the data previously written to the tape or hard drive. In many instances, degaussing resets the media to a like-new state so that it can be reused and recycled. In some instances, this simply wipes the media in preparation for safe and secure disposal. The National Security Agency (NSA) approves powerful degaussers that meet their specific standards and that in many cases utilize the latest technology for top-secret erasure levels.

Destroying Materials

The objective of physical destruction is to render the device and/or the media unreadable and unusable. Devices and media can be crushed, shredded, or, in the case of hard drives, drilled in several locations perpendicular to the platters and penetrating clear through from top to bottom.

Cross-cut shredding technology, which reduces material to fine, confetti-like pieces, can be used on all media, ranging from paper to hard drives.

It is common for organizations to outsource the destruction process. Companies that offer destruction services often have specialized equipment and are cognizant of environmental and regulatory requirements. The downside is that the organization is transferring responsibility for protecting information. The media may be transported to off-site locations. The data is being handled by non-employees over whom the originating organization has no control. Selecting a destruction service is serious business, and thorough due diligence is in order.

Both in-house and out-sourced destruction procedures should require that an unbroken pre-destruction chain of custody be maintained and documented and that an itemized post-destruction certificate of destruction be issued that serves as evidence of destruction in the event of a privacy violation, complaint, or audit.


FYI: Unscrubbed Hard Drives

In December 2010, a study commissioned by Britain’s Information Commissioner’s Office (IOC) found that 11% of second-hand hard drives sold online may contain residual personal information.

The IOC engaged an independent computer forensics company (NCC Group) to purchase and analyze approximately 200 hard disk drives, 20 memory sticks, and ten mobile telephones. These were bought from a variety of sources, with most coming from online auction sites. NCC first examined the drives using no additional software to see what information was immediately evident. The drives were then studied using forensic tools freely available on the Internet. This was carried out to replicate the attempts that more knowledgeable individuals may make to try and recover data for improper usage.

Here are the findings:

Image Negligible personal data was found on the memory sticks and mobile telephones.

Image In the case of hard drives:

Image Thirty-eight percent of the devices had been wiped of data.

Image Fourteen percent were damaged/unreadable.

Image Thirty-seven percent contained non-personal data.

Image Eleven percent contained personal data, including copies of passports, birth certificates, and drivers licenses, bank statements, tax information, and medical records.

In total, some 34,000 files were found containing personal or corporate data. The most significant finding was that the drives were from computers that were either personally or corporately owned, and in some cases, the user was not authorized to store the data.


Stop, Thief!

According to the Federal Bureau of Investigation (FBI), on average, a laptop is stolen every 53 seconds and one in ten individuals will have their laptop stolen at some point. The recovery statistics of stolen laptops is even worse, with only 3% ever being recovered. This means 97% of laptops stolen will never be returned to their rightful owners. A 2010 independent study conducted by the Ponemon Institute reported that 43% of laptops were lost or stolen off-site (working from a home office or hotel room), 33% lost or stolen in travel or transit, and 12% lost or stolen in the workplace. The statistics for mobile phones and tablets is even worse. According to an American Public Media May 2013 Marketplace Morning report, cell phone theft accounts for 30% to 40% of all crime in major cities—40% in New York and Washington, D.C., and 50% in San Francisco.

The cost of lost and stolen devices is significant. The most obvious loss is the device itself. The cost of the device pales in comparison to the cost of detection, investigation, notification, after-the-fact response, and economic impact of lost customer trust and confidence, especially if the device contained legally protected information. The Ponemon Institute “2013 Cost of Data Breach Study: Global Analysis” calculated the average business cost of a breach in the United States to be $188 per record across all industries, $215 per record for financial institutions, and $233 per record for healthcare organizations.

Consider this scenario: A laptop valued at $1,500 is stolen. A file on the laptop has information about 2,000 patients. Using the Ponemon conclusion of $215 per record, the cost of the compromise would be $430,000! That cost doesn’t include potential litigation or fines.


FYI: Week of June 24, 2013—26,825 Personal Records Reported Compromised

Image


FYI: Small Business Note

Two physical security issues are specific to small business and/or remote offices: location and person identification. A majority of small business and remote offices are located in multitenant buildings, where occupants do not have input into or control of perimeter security measures. In this case, the organization must treat their entry doors as the perimeter and install commensurate detective and preventative controls. Often, tenants are required to provide access mechanisms (for example, keys, codes) to building personnel, such as maintenance and security. Unique entry codes should be assigned to third-party personnel so that entry can be audited. Rarely are employee identification badges used in a small office. This makes it all the more important that visitors be clearly identified. Because there is little distinction between public and private spaces, visitors should be escorted whenever they need to go on the premises.


Summary

The objective of physical and environmental security is to prevent unauthorized access, damage, and interference to business premises and equipment. In this chapter, with a focus on the physical environment, we discussed the three elements to security—obstacles that deter trivial attackers and delay serious ones, detection systems that make it more likely that the attack will be noticed, and a response capability to repel or catch attackers. We began at the security perimeter, worked our way gradually inward to the data center, and then back out to mobile devices. Starting at the perimeter, we saw the importance of having a layered defense model as well as incorporating CPTED (crime prevention through environmental design) concepts. Moving inside the building, we looked at entry controls and the challenge of authorized access and identification. We acknowledged that not all access is equal. Workspaces and areas need to be classified so that levels of access can be determined and appropriate controls implemented. Equipment needs to be protected from damage, including natural disasters, voltage variations (such as surges, brownouts, and blackouts), fire, and theft. Purchasing Energy Star–certified equipment and proactively reducing energy consumption supports the long-term security principle of availability.

We explored the often-overlooked risks of device and media disposal and how important it is to permanently remove data before handing down, recycling, or discarding devices. Even the most innocuous devices or media may contain business or personal data in metadata, hidden or temporary files, web or data caches, or the browser history. Deleting files or formatting drives is not sufficient. DoD-approved disk-wiping software or a degaussing process can be used to permanently remove data. The most secure method of disposal is destruction, which renders the device and/or the media unreadable and unusable.

Mobile devices that store, process, or transmit company data are the newest challenge to physical security. These devices travel the world and in some cases are not even company owned. Threats range the gamut from nosy friends and colleagues to targeted theft. The detection, investigation, notification, and after-the-fact response cost of a lost or stolen mobile device is astronomical. The economic impact of lost customer trust and confidence is long lasting. Encryption and antitheft technology solutions that enable remote locate, remote lock, and remote delete/wipe functionality must be added to the protection arsenal.

Physical and environmental security policies include perimeter security, entry controls, workspace classification, working in secure areas, clean desk and clean screen, power consumption, data center and communications facilities environmental safeguards, secure disposal, and mobile device and media security.

Test Your Skills

Multiple Choice Questions

1. Which of the following groups should be assigned responsibility for physical and environmental security?

A. Facilities management

B. Information security management

C. Building security

D. A team of experts including facilities, information security, and building security

2. Physical and environmental security control decisions should be driven by a(n) ___________.

A. educated guess

B. industry survey

C. risk assessment

D. risk management

3. Which of the following terms best describes CPTED?

A. Crime prevention through environmental design

B. Crime prevention through environmental designation

C. Criminal prevention through energy distribution

D. Criminal prosecution through environmental design

4. Which of the following is a CPTED strategy?

A. Natural surveillance.

B. Territorial reinforcement.

C. Natural access control.

D. All of the above are CPTED strategies.

5. Which of the following models is known as the construct that if an intruder can bypass one layer of controls, the next layer of controls should provide additional deterrence or detection capabilities?

A. Layered defense model

B. Perimeter defense model

C. Physical defense model

D. Security defense model

6. Which of the following is a location-based threat?

A. Flight path

B. Volcano

C. Political stability

D. All of the above

7. Best practices dictate that data centers should be ______________.

A. well marked

B. located in urban areas

C. inconspicuous and unremarkable

D. built on one level

8. Which of the following would be considered a “detection” control?

A. Lighting

B. Berms

C. Motion sensors

D. Bollards

9. Badging or an equivalent system at a secure facility should be used to identify ____________.

A. everyone who enters the building

B. employees

C. vendors

D. visitors

10. Which of the following statements best describes the concept of shoulder surfing?

A. Shoulder surfing is the use of a keylogger to capture data entry.

B. Shoulder surfing is the act of looking over someone’s shoulder to see what is on a computer screen.

C. Shoulder surfing is the act of positioning one’s shoulders to prevent fatigue.

D. None of the above.

11. The term BYOD is used to refer to devices owned by ____________.

12. Which of the following statements is not true about reducing power consumption?

A. Reducing power consumption saves energy.

B. Reducing power consumption saves money.

C. Reducing power consumption creates less pollution.

D. Reducing power consumption increases CO2 emissions.

13. The United States government Energy Star certification indicates which of the following?

A. The product is a good value.

B. The product was made in the United States.

C. The product has met energy efficiency standards.

D. The product is used by the government.

14. Which of the following actions contribute to reducing daily power consumption?

A. Turning off computers when not in use

B. Turning off monitors when not in use

C. Turning off printers when not in use

D. All of the above

15. Which of the following terms best describes a prolonged increase in voltage?

A. Power spike

B. Power surge

C. Power hit

D. Power fault

16. Common causes of voltage variations include ______________.

A. lightning, storm damage, and electric demand

B. using a power conditioner

C. turning on and off computers

D. using an uninterruptable power supply

17. Adhering to building and construction codes, using flame-retardant materials, and properly grounding equipment are examples of which of the following controls?

A. Fire detection controls

B. Fire containment controls

C. Fire prevention controls

D. Fire suppression controls

18. A Class C fire indicates the presence of which of the following items?

A. Electrical equipment

B. Flammable liquids

C. Combustible materials

D. Fire extinguishers

19. Classified data can reside on which of the following items?

A. Smartphones

B. Cameras

C. Scanners

D. All of the above

20. Which of the following data types includes details about a file or document?

A. Apparent data

B. Hidden data

C. Metadata

D. Cache data

21. URL history, search history, form history, and download history are stored by the device ___________.

A. operating system

B. browser

C. BIOS

D. None of the above

22. Which of the following statements about formatting a drive is not true?

A. Formatting a drive creates a bootable partition.

B. Formatting a drive overwrites data.

C. Formatting a drive fixes bad sectors.

D. Formatting a drive permanently deletes files.

23. Disk wiping works reliably on which of the following media?

A. USB thumb drives

B. Conventional hard drives

C. SD cards

D. Solid-state hard drives

24. The United States Department of Defense (DoD) medium security disk-wiping standard specifies which of the following actions?

A. Three iterations to completely overwrite a hard drive six times

B. Three iterations to completely overwrite a hard drive six times, plus 246 written across the drive

C. Three iterations to completely overwrite a hard drive six times, plus 246 written across the drive, plus a read-verify process

D. Three iterations to completely overwrite a hard drive six times, plus 246 written across the drive, plus a magnetic swipe

25. Which of the following terms best describes the process of using a realigning and resetting particle to erase data?

A. Deleting

B. Degaussing

C. Destroying

D. Debunking

26. Which of the following terms best describes the shredding technique that reduces material to fine, confetti-like pieces?

A. Cross-cut

B. Strip-cut

C. Security-cut

D. Camel-cut

27. A certificate of destruction is evidence that __________________.

A. the media has be destroyed by a third party

B. the media has been destroyed internally

C. the media has been destroyed by its owner

D. the media has been destroyed

28. Which of the following amounts represents the average per-record cost of a data breach in the United States?

A. $1

B. $18

C. $188

D. $1,188

29. Which of the following controls includes remote lock, remote wipe, and remote location?

A. Work-at-home controls

B. Mobile device antitheft controls

C. GPS controls

D. Find-my-car controls

30. In an environmental disaster, priority should be given to _______________.

A. protecting human life

B. saving key documents

C. data center continuity

D. first responder safety

Exercises

Exercise 7.1: Researching Data Destruction Services

1. Research companies in your area that offer data destruction services.

2. Document the services they offer.

3. Make a list of questions you would ask them if you were tasked with selecting a vendor for data destruction services.

Exercise 7.2: Assessing Data Center Visibility

1. Locate the data center at your school or workplace.

2. Is the facility or area marked with signage? How easy was it to find? What controls are in place to prevent unauthorized access? Document your findings.

Exercise 7.3: Reviewing Fire Containment

1. Find at least three on-campus fire extinguishers (do not touch them). Document their location, what class fire they can be used for, and when they were last inspected.

2. Find at least one fire extinguisher (do not touch it) in your dorm, off-campus apartment, or home. Document the location, what class fire it can be used for, and when it was last inspected.

Exercise 7.4: Assessing Identification Types

1. Document what type of identification is issued to students, faculty, staff, and visitors at your school. If possible, include pictures of these types of documentation.

2. Describe the process for obtaining student identification.

3. Describe the procedure for reporting lost or stolen identification.

Exercise 7.5: Finding Data

1. Access a public computer in either the library, computer lab, or classroom.

2. Find examples of files or data that other users have left behind. The files can be apparent, temporary, browser based, cached, or document metadata. Document your findings.

3. What should you do if you discover “personal” information?

Projects

Project 7.1: Assessing Physical and Environmental Security Assessment

1. You are going to conduct a physical assessment of a computing device you own. This could be a desktop computer, a laptop, a tablet, or a smartphone. Use the following table as a template to document your findings. You can add additional fields.

Image

2. Determine the physical and environmental dangers (threats); for example, losing or forgetting your laptop at school. Document your findings.

3. For each danger (threat), identify the controls that you have implemented; for example, your case is pink (recognizable) and the case and laptop are labeled with your contact information. It is expected that not all threats will have corresponding safeguards. Document your findings.

4. For threats that do not have a corresponding safeguard or ones for which you feel the current safeguards are inadequate, research the options you have for mitigating the danger. Based on your research, make recommendations. Your recommendation should include initial and ongoing costs. Compare the costs of the safeguard to the cost impact of the danger. Document your findings.

Project 7.2: Assessing Data Center Design

1. You have been tasked with recommending environmental and physical controls for a new data center to be built at your school. You are expected to present a report to the Chief Information Officer. The first part of your report should be a synopsis of the importance of data center physical and environmental security.

2. The second part of your report should address three areas: location, perimeter security, and power.

a. Location recommendations should include where the data center should be built and a description of the security of the surrounding area (for example, location-based threats include political stability, susceptibility to terrorism, the crime rate, adjacent buildings, roadways, pedestrian traffic, flight paths, utility stability, and vulnerability to natural disasters).

b. Access control recommendations should address who will be allowed in the building and how they will be identified and monitored.

c. Power recommendations should take into account power consumption as well as normal and emergency operating conditions

Project 7.3: Securing the Perimeter

1. The security perimeter is a barrier of protection from theft, malicious activity, accidental damage, and natural disaster. Almost all buildings have multiple perimeter controls. We have become so accustomed to perimeter controls that they often go unnoticed (that is, security guards). Begin this project with developing a comprehensive list of perimeter controls.

2. Conduct a site survey by walking around your city or town. You are looking for perimeter controls. Include in your survey results the address of the building, a summary of building occupants, type(s) of perimeter controls, and your opinion as to the effectiveness of the controls. In order to make your survey valid, you must include at least ten properties.

3. Choose one property to focus on. Taking into consideration the location, the depth security required by the occupants, and the geography, comment in detail on the perimeter controls. Based on your analysis, recommend additional physical controls to enhance perimeter security.

References

Regulations Cited

DoD 5220.22-M: National Industrial Security Program Operating Manual, February 28, 2006, revised March 28, 2013.

Other References

“About Energy Star,” Energy Star, accessed on 06/2013, www.energystar.gov.

“Computer Energy Usage Facts,” Cornell University, accessed on 06/28/2013, http://computing.fs.cornell.edu/Sustainable/fsit_facts.cfm.

Bray, Megan, “Review of Computer Energy Consumption and Potential Savings,” December 2006, accessed on 06/2013, www.dssw.co.uk/research/computer_energy_consumption.html.

“Efficiency: How we do it,” Google, accessed on 6/28/2013, www.google.com/about/datacenters/efficiency/internal/index.html#temperature.

“Facilities Services Sustainable Computing Guide,” Cornell University, accessed on 06/2013, http://computing.fs.cornell.edu/Sustainable/FSSustainableComputingGuide.pdf.

“Foundations Recovery Network notifying patients after a laptop with PHI was stolen from an employee’s car,” PHIprivacy.net, June 24, 2013, accessed on 06/2013, www.phiprivacy.net/?p=12980.

Glanz, James, “The Cloud Factories: Data Barns in a Farm Town, Gobbling Power and Flexing Muscle,” The New York Times, September 23, 2012, accessed on 06/2013, www.nytimes.com/2012/09/24/technology/data-centers-in-rural-washington-state-gobble-power.html?pagewanted=all&_r=2&.

“Tripplite Glossary,” accessed on 06/2013, www.tripplite.com/support/glossary.cfm.

“Google Data Centers,” Google.com, accessed on 06/2013, www.google.com/about/datacenters/.

“Insider Threat and Physical Security of Organizations,” CERT Insider Threat Center, May 20, 2011, accessed on 06/2013, www.cert.org/blogs/insider_threat/2011/05/insider_threat_and_physical_security_of_organizations.html.

Jeffery, C. Ray, Crime Prevention Through Environmental Design, Second Edition, Beverly Hills: Sage Publications, 1977.

“Laptop Theft Recovery,” Winthrop University, accessed on 06/2013, www.winthrop.edu/police.

“Latest Incidents,” DataLossDB, accessed on 06/2013, http://datalossdb.org/.

Marshall-Genzar, Nancy, “Cell phone theft is on the rise, but the industry isn’t helping much (Infographic),” Marketplace Morning Report for Tuesday May 14, 2013, accessed on 06/2013, www.marketplace.org/topics/business/cell-phone-theft-rise-industry-isnt-helping-much-infographic.

Miller, Rich “Major Outage at Seattle Data Center,” Data Center Knowledge, July 3, 2009, accessed on 06/2013, www.datacenterknowledge.com/archives/2009/07/03/major-outage-at-seattle-data-center.

Ponemon Institute, “The Billion Dollar Lost Laptop Problem: Benchmark Study of U.S. Organization.” October 31, 2010.

Ponemon Institute, “2013 Cost of Data Breach Study.” May, 2013.

“Stolen Laptop May Have Compromised Students Personal Info,” ABC Columbia, June 27, 2013, accessed on 06/2013, www.abccolumbia.com/news/local/Stolen-Laptop-May-Have-Compromised-Students-Personal-Info-213435101.html.

“Unscrubbed Hard Drives Report,” Information Commissioner’s Office, April 25, 2012, accessed on 06/2013, http://www.ico.org.uk/news/latest_news/2012/~/media/documents/library/Data_Protection/Research_and_reports/unscrubbed_hard_drives_report.pdf.

Vanhorn, Chris, “Cornell University Facilities Services Computing Energy Conservation Recommendations,” September 8, 2005, accessed on 06/28/2013, http://computing.fs.cornell.edu/Sustainable/ComputingEnergyConservation.pdf.

Vedder, Tracy, “Detective’s stolen laptop puts thousands at risk of identity theft,” KOMONEWS, June 24, 2013, accessed on 06/2013, www.komonews.com/news/local/Stolen-sheriffs-office-laptop-puts-thousand-at-risk-of-identity-theft-212860341.html.

“Voltage Variations,” United Energy and Multinet Gas, accessed on 6/28/2013, www.unitedenergy.com.au/customers/your-electricity/electricity-outages/voltage-variations.aspx.

“Your Guide To Degaussers,” Degausser.com, accessed on 06/2013, http://degausser.com/.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.22.216.254