Sy0 601 21

Download as pdf or txt
Download as pdf or txt
You are on page 1of 20
At a glance
Powered by AI
The key takeaways are about the importance of physical security controls to protect sites and resources.

Physical security controls discussed include authentication, authorization, accounting, site layout, fencing, and lighting.

Lock types mentioned include physical, electronic, cipher/combination, magnetic swipe card, smart card/proximity reader, and biometric locks. Access control methods include mantraps and turnstiles.

Lesson 21

Explaining Physical Security


Topic 21A
Explain the Importance of Physical Site Security
Controls

CompTIA Security+ Lesson 21 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 2
Syllabus Objectives Covered

• 1.2 Given a scenario, analyze potential indicators to determine the type of


attack
• 2.7 Explain the importance of physical security controls

CompTIA Security+ Lesson 21 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 3
Physical Security Controls

• Authentication
• Create access lists and identification mechanisms to allow approved persons
through barriers
• Authorization
• Create barriers around a resource so that access can be controlled through
defined entry and exit points
• Accounting
• Keep a record of when entry/exit points are used and detect security breaches

CompTIA Security+ Lesson 21 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 4
Site Layout, Fencing, and Lighting

• Site layout
• Zone-based design to accommodate traffic flows and surveillance
• Signage
• Industrial camouflage
• Barricades and entry/exit points
• Bollards
• Fencing
• Lighting
• Make staff feel secure
• Assist surveillance

CompTIA Security+ Lesson 21 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 5
Gateways and Locks

• Lock types
• Physical (conventional/deadbolt)
• Electronic
• Cipher/combination
• Magnetic swipe card
• Smart card/proximity reader
Images from user macrovector © 123RF.com.
• Biometric
• Access control
vestibules/mantraps and turnstiles
• Cable locks

Images from user macrovector © 123RF.com.

CompTIA Security+ Lesson 21 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 6
Physical Attacks Against Smart Cards and USB

• Smart card attacks


• Cloning
• Skimming
• Card types and vulnerability level
• Malicious USB/juice-jacking
• USB data blocker

CompTIA Security+ Lesson 21 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 7
Alarm and Sensor Systems

• Circuit
• Open or closed
• Detect intrusion through a barrier
• Motion detection
• Radar or infrared
• Detect intrusion in a space
• Noise detection
• Proximity readers
• Duress
• Fixed or mobile

CompTIA Security+ Lesson 21 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 8
Security Guards and Cameras

• Security guards
• Police entry points
• Operate surveillance mechanisms
• Respond to alarms
• Remote surveillance and
monitoring
• Video/CCTV
• Motion recognition
• Object detection
Image by Dario Lo Presti © 123RF.com.
• Robot sentries
• Drones/UAV

CompTIA Security+ Lesson 21 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 9
Reception Personnel and ID Badges

• Challenge policy
• Reception personnel and visitor logs
• Sign-in/sign-out
• Visitor information
• Two-person integrity/control
• ID badges

CompTIA Security+ Lesson 21 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 10
Topic 21B
Explain the Importance of Physical Host Security
Controls

CompTIA Security+ Lesson 21 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 11
Syllabus Objectives Covered

• 2.7 Explain the importance of physical security controls


• 4.1 Given a scenario, use the appropriate tool to assess organizational
security (Data sanitization only)

CompTIA Security+ Lesson 21 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 12
Secure Areas

• Server rooms and data centers


• Lockable cabinets
• Colocation cages
• Air gaps and demilitarized zones
Image © 123RF.com.
• Safes
• Vaults

Image © Chris Dag and shared with CC BY 2.0


Image © 123RF.com. flickr.com/photos/chrisdag/865711871.

CompTIA Security+ Lesson 21 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 13
Protected Distribution and Faraday Cages

• Protected cable distribution/protected distribution system (PDS)


• Prevent eavesdropping
• Prevent/delay cable cutting DoS
• Faraday cage
• Transient Electromagnetic Pulse Emanation Standard (TEMPEST)

CompTIA Security+ Lesson 21 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 14
Heating, Ventilation, Air Conditioning

• Cooling/warming, humidity, dust control


• Optimum temperature and humidity levels
• Moisture detection sensors
• Temperature detection sensors
• HVAC sizing
• Equipment wattage
• British Thermal Units (BTU)/hour
• Air flow
• Positive air pressure to remove contaminants

CompTIA Security+ Lesson 21 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 15
Hot and Cold Aisles

• Optimize air flow


• Place servers back-to-back
• Hot aisle/cold aisle
• Do not allow contamination of
cooled air by warmed air

Image © 123RF.com.

CompTIA Security+ Lesson 21 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 16
Fire Detection and Suppression

• Fire safety
• Fire exits and evacuation procedures
• Fire-resistant building design
• Smoke/flame detectors/alarms
• Personal fire extinguishers
• Class C for use around electrical hazard
• Sprinklers
• Dry pipe
• Pre-action
• Halon
• Clean Agent

CompTIA Security+ Lesson 21 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 17
Secure Data Destruction

• Media sanitization/remnant
removal
• Physical destruction
• Burning/incineration
• Shredding/pulping
• Pulverizing
• Degaussing
Photo by monsterkoi on Pixabay.
• Use of third-parties and
certificates of destruction

CompTIA Security+ Lesson 21 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 18
Data Sanitization Tools

• Secure disposal of electronic data


remnants
• Overwriting/disk wiping
• Zero filling
• Multiple passes
• Secure Erase (SE)
• Hard disk drives (HDD)
• Solid state drives (SSD)/flash media
• Instant Secure Erase (ISE)/crypto
erase
• Self-encrypting drives (SED)
• Delete media encryption key

Screenshot used with permission from LSoft Technologies, Inc.

CompTIA Security+ Lesson 21 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 19
Lesson 21
Summary

CompTIA Security+ Lesson 21 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 20

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy