82
Physical Security & Biometrics By Prashant Mali

Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Embed Size (px)

Citation preview

Page 1: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Physical Security& Biometrics

By Prashant Mali

Page 2: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Objectives• To address the threats, vulnerabilities, and

countermeasures which can be utilized to physically

protect an enterprise’s resources and sensitive

information to include people, facilities, data,

equipment, support systems, media, and supplies.

• To discuss considerations for choosing a secure

site, its design and configuration, and the methods

for securing the facility against unauthorized

access, theft of equipment and information, and the

environmental and safety measures needed to

protect people, the facility, and its resources.

Page 3: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Session Agenda

1. Physical Access Threats and Exposures

2. Site Location and Design

3. Physical Access Controls

4. Environmental Protection

5. Audit And Evaluation of Physical Access Controls

Page 4: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Threat Components• Threat Components

• Agents• Motives• Results

• Human Threats• Theft• Vandalism• Sabotage• Espionage• Errors• Blackmail

Page 5: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Human Threats

Exposures resulting by means of

• Unauthorized entry

• Damage, vandalism and theft of equipment or

documents

• Copying, viewing, or alteration of sensitive

information

• Public disclosure of sensitive information

• Abuse of data processing resources

• Blackmail

• Embezzlement

Page 6: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Human Threats

Possible perpetrators can be employees who are:

• Disgruntled or on strike

• Experiencing financial or emotional problems

• Threatened with disciplinary action

• Addicted to a substance or gambling

• Notified of their termination

• Hired by a competing company

Page 7: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Personnel Access Controls

• Position Sensitivity Designation

• Management Review of Access Lists

• Background Screening/Re-Screening

• Termination/Transfer Controls

• Counseling for Disgruntled Employees

Page 8: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

External / Internal Threats• External Threats

• Wind/Tornado• Flooding• Lightning• Earthquake• Cold and Ice• Fire• Chemical

• Internal Physical Threats• Fire• Environmental Failure• Electrical Interruption

Page 9: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

External / Internal Threats• Are hardware facilities controlled to reduce the risk

of unauthorized access?

• Are hardware facilities reasonably protected against

forced entry?

• Are smart terminals locked or otherwise secured to

prevent removal of boards, chips, or the entire

computer itself?

• Are authorized passes required before computer

equipment can be removed from its normally

secure environment?

Page 10: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

External / Internal ThreatsFacilities to be protected:

• Computer room, operator consoles, and terminals

• Programming area

• Tape library, disks, and all magnetic media

• Storage room and supplies

• Off-site backup file storage facility

• Input / Output control room

• Power sources

• Disposal sites

Page 11: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Site Location and Design• Local Crime

• Visibility

• Emergency Access

• Natural Hazards

• Air and Surface Traffic

• Joint Tenants

• Stable Power Supply

• Existing Boundary Protection (Barriers/Fencing/Gates)

Page 12: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Site Boundary Protection• Area Designation: Facilitates Enforcement• Vehicular Access• Personnel Access

• Occupants• Visitors (Escort & Logging)

• Fences• Deter Casual Trespassing• Compliments Other Access Controls• Aesthetics• Won’t Stop Determined Intruder

Page 13: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Site Boundary Protection• Lighting

• Entrances• Parking Areas• Critical Areas

• Perimeter Detection Systems• Does Not Prevent Penetration• Alerts Response Force• Requires Response• Nuisance Alarms• Costly

Page 14: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Site Boundary Protection• CCTV (Closed Circuit TV)

• Efficiency• Requires Human Response• Limitations

• Staffing• Access Control Points• Patrols• Employees

Page 15: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Physical Access Controls• Guards

• Fences

• Barriers

• Lighting

• Keys and Locks

• Badges

• Escorts

• Property Controls

• Monitoring/Detection Systems

Page 16: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Physical Access Controls

Common Physical Access controls are:

• Computer Terminal Locks

• Video Cameras

• Security Guards, Alarm System

• Controlled Visitor Access

• Bonded personnel

• Confidential Location of Sensitive Facilities

• Controlled Single point of Entry and Exit

• Motion Detection System

Page 17: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Physical Access Controls

Common Physical Access controls are:

• Bolting Door Locks

• Cipher or Keypad Locks

• Electronic Door Locks

• Biometric Access Controls

• Deadman Door Locks

• Manual Logging, Electronic Logging

• Identification Badges

Page 18: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Environmental Protection• Computing Facility

• Electrical Power controls

• Air Conditioning

• Fire Prevention, Detection, and Suppression

• Media Storage Protection

• Other Considerations

Page 19: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Audit and Evaluation

Check the location of:

• All operator consoles

• Printer rooms

• Computer storage rooms

• UPS/Generator rooms

• Communications

equipment

• Tape library

• Off-site storage facility

Page 20: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Audit and Evaluation

Check the following paths of physical entry:

• All entry doors

• Glass windows and walls

• Movable walls and modular furniture

• Above false ceilings and below raised floors

• Ventilation systems

Page 21: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Keypad Locks

Electronic (Keypad Systems): Digital Keyboard

• Number of Combinations

• Number of Digits in Code

• Frequency of Code Change

• Error Lock-Out

• Error Alarms

Page 22: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Keypad Locks

Page 23: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Electronic Door LocksThe system uses a magnetic or embedded chip-

based plastic card to be used as a swipe card to

gain access to a restricted area.

• Through a special internal code, cards can be

assigned to an identifiable individual

• Individuals can be given selective access to areas

based on needs, time of day restrictions, etc.

• The cards should be difficult to duplicate.

• Card entry can be easily deactivated for

terminated employees or if a card is reported lost

or stolen.

Page 24: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Access Controls - Dumb Cards

Dumb Cards

• Photo Identification Badges

• Manual Visual Verification

• Can be Combined with Smart Technology

Page 25: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Access Controls - Smart Cards

Digital Coded (Smart) Cards

• Often Require Use of PIN Number with Card

• Card Readers: Card Insertion, Card Swipe & Proximity

Page 26: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically
Page 27: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Types of Access Cards• Photo ID Cards

• Optical Coded Cards (Magnetic Dot)

• Electric Circuit Cards (Embedded Wire)

• Magnetic Cards (Magnetic Particles)

• Metallic Stripe Card (Copper Strips)

Page 28: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Types of Access Cards• GemClub Memo has been winning the confidence of

application developers since 1998. GemClub Memo is the proven and the secure Memory technology in the smart card market, with several million of cards in the field and 100 live applications such as:

• Public ( Transportation, driving license, health care, fleet cards),

• Reward (loyalty, Voucher, Pre paid...)

• Access control (logical or physical).

• Electronic purse (in closed payment schemes),

Page 29: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Biometrics - Access Controls• Authenticating a user via human characteristics

• An individual’s unique body features such as

fingerprint, signature, voice, retina can be used to

identify the individual.

• Complicated and expensive

• Used for extremely sensitive facilities, such as in

the military

Page 30: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Biometrics - Access Controls

• Fingerprint/Thumbprint Scan

• Hand Geometry

• Voice Verification

• Retinal Scanning

• Iris Scanning

• Signature Verification

• Facial Recognition

• Keystroke Recorders

• Vein Biometric Systems

Page 31: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Fingerprint Verification Fingerprint scanning products are the most common

type on the market today. Properly implemented, fingerprints offer potential for high accuracy.

The readers tend to be small - easily incorporated into a keyboard for example

Have a relatively low cost, and integration is usually easy.

Cuts or dirt on the finger can cause some systems not to recognize a valid fingerprint.

Some fingerprint scanners will scan for pulse as well as the fingerprint.

Page 32: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

The State of Connecticut began using fingerprint readers in 1996 to catch welfare cheats who came in to pickup cheques.

The fingerprint scanners, which cost about $200 from Identix Corp., use a digital camera to capture the fingerprints. Imaging software from National Registry Inc. is used to compare the scanned image with the one stored on a server.

The $5.1 million project is said to have saved the state $9 million in welfare fraud.

Page 33: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

DigitalPersona U.are.U Personal

DigitalPersona has released a new version of its consumer-friendly fingerprint reader, the DigitalPersona U.are.U Personal. The software replaces passwords for Microsoft Windows XP, creating a more secure and more convenient solution for homes and small businesses where one PC serves many masters. Though not perfect, the U.are.U is a trouble-free convenience that will help protect your privacy.

Page 34: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

I/O Software, a California company, is marketing a fingerprint ID system to control access to a computer right after it is turned on, before booting.

Their system uses Sony’s Fingerprint Identification Unit, which plugs into the serial port. If the fingerprint does not match, the system stops the computer’s Basic Input Output System (BIOS) from starting up.

Page 35: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Sony FIU-710

PC Magazine - The Puppy was

the only model we evaluated

that performed flawlessly on

all of our tests, enrolling and

verifying 100 percent of our

test subjects - though we

could enroll only 10 people on

the Puppy, as opposed to 100

on the other devices. Plus we

were able to shuttle it easily

among different PCs.

Page 36: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

TimeCentre's BioMouseIt is the world's first mouse to offer total PC and network security with the touch of a finger!

Bring fingerprint recognition technology to a workstation! Positively identify who is accessing the PC and who is clocking in each day. The BioMouse can be used in conjunction with TimeCentre's PC entry and browser-based PC entry system on a workstation or kiosk. In a PC kiosk environment, the BioMouse can insure the identity of each valid user.

Page 37: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically
Page 38: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Hand Geometry Hand Geometry measure the physical

characteristics of the user’s hand and fingers.

Hand geometry is one of the most established methods and typically offers a good balance of performance and ease of use.

Hand geometry is most widely used in physical access control and time/attendance systems. It is not currently in wide deployment for computer security applications primarily because it requires a large scanner.

Page 39: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Biometric Hand PunchTimeCentre's Hand Punch clocks positively identify each employee by the unique size and shape of his or her hand, increasing the security and accuracy of your company's time data. It is the perfect balance between security and convenience.

Eliminates "buddy punching" and guarantees the accuracy of your punch data

Eliminates early-in punches

Eliminates unauthorized overtime punches

No cards or badges are needed to utilize the TimeCentre Biometric Hand Punch. The employee's hand is their time card!

Page 40: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Sensar is offering their iris recognition system to ATM manufacturers as an alternative to passwords and PINs. When a bank card is inserted into an ATM machine, a stereo camera locates the person’s face, zooms in on the eye, and takes a digital photograph of the eye. The features in the eye are then compared with one provided to the bank when the customer signed up.

All this can be done in less then two seconds at a distance of up to 3 feet. The system is expected to add $2,000 to $3,000 to the cost of an average ATM machine, which now can cost up to $40,000.

Several banks are testing Sensar’s system, including banks in the United States, United Kingdom, and Japan.

Page 41: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Voice Recognition Voice Recognition is perhaps the method most desirable

to users since everyone seems to want to talk to computers.

In practice, implementation is extremely difficult. While recent advances in voice recognition have greatly improved the technology, it is still subject to problems.

Local acoustics, background noise, microphone quality, the common cold, anxiety, being in a hurry, and anger can all alter the human voice enough to make voice recognition difficult or impossible.

Further, voice recognition systems tend to have the most difficult and time-consuming enrollment process and require the most space for template storage.

Page 42: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

In February 1998, Periphonics Corp., a maker of interactive voice response systems, announced they would integrate voice identification into their automated call processing applications. The system could be used by banks and credit card companies which rely heavily on interactive call systems.

When a customer phones for service, the system asks for a password. The voice sample is then compared with one taken during initialization. Periphonics says the error rate is around 1% to 2%.

The attraction of voice recognition is that it can be performed over the phone system without the need for special cameras or other equipment.

Page 43: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Retinal Scanning Retinal Scanning is well established and can provide

high accuracy. User acceptance may be a problem however – “You’re

not shooting a laser into my eye!” In reality, retinal scanners do not employ a laser, but scan using low intensity light and are considered quite safe.

One drawback is that the user must look directly into the retinal reader. This is inconvenient for eyeglass wearers.

In public applications, there may also be concerns with the spread of germs because of the need for physical contact with the retinal scanner.

Another problem is that the user must focus on a given point for the scan. Failure to focus correctly causes a significant impact on accuracy.

Page 44: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

The EyeDentify® Biometric Retina Reader provides dual level access security. A keypad code requires Retina pattern verification which takes less than two seconds from up to 3” away. Retinal vascular patterns are the most accurate biometric recognition features which provides the highest level of biometric security. Can be easily interfaced with ECS Access Control systems or used in stand alone applications.

Page 45: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Iris Scanning Iris Scanning overcomes most of the problems of retinal

scanners.

Because the iris (the colored part of the eye) is visible from a distance, direct contact with the scanner is not required nor is it necessary to remove eyeglasses.

The technology works by scanning the unique random patterns of the iris.

Interestingly, the method does not rely on the iris color (the camera used is black-and-white). This is important because of the popularity of colored contact lenses – some vendors claim their systems will work with colored contacts and even through non-reflective sunglasses.

Page 46: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

In 1994, Iridian's John Daugman introduced the concept of iris recognition technology—capturing the unique patterns in a human iris to authenticate identity. Like fingerprints, no two irises are alike.

The Authenticam verifies a user's identity by scanning the person's iris and matching the pattern with the template stored at enrollment. Unlike a retinal scanner, which captures information necessary for authentication by shooting a laser beam into the eye while the user is in contact with the device, the iris scanner allows the user to be about 20 inches away from the camera.

Panasonic Authenticam

Iris Recognition Camera

Page 47: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Signature Verification Signature Verification enjoys a synergy the other

technologies do not since people are used to signing for things.

There is a greater feeling of normalcy. While signature verification has proved to be relatively accurate, very few products available implement the technology.

Page 48: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Facial Recognition Facial recognition is one of the newest biometric

methods. The technology has attracted a lot of attention.

Unfortunately, extravagant claims that proved difficult to substantiate cooled much of the enthusiasm.

It is not overly difficult to match two static images.

Picking an individual out of a group as some systems claim to be able to do is another matter entirely.

Progress continues to be made with this young technology, but to date facial recognition systems have had some success in practical applications.

Page 49: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

The FaceIT PC desktop software, which sells for $150, is used on a PC with a video camera. The system automatically detects human presence, locates and tracks faces, and identifies people.

The recognition process, which is based on 64 features of the face, takes less than a second. When the user steps away from the computer, FaceIT becomes a screensaver and locks the computer. The machine is unlocked only when the computer detects and recognizes the user. Files are secured through encryption.

The technology has been or will be used in other applications, including ATMs, airport passenger and baggage security, and border crossings.

Page 50: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Imagis' proprietary technology uses more than 692 facial desciptors to capture and identify a face. This is ten times more than other technologies.

At the very heart of Imagis' technology is a unique method of capturing facial data that is intrinsically more accurate. Whereas other solutions are limited through their reliance on outmoded facial recognition methods, Imagis uses a combination of spectral analysis and 3-D modeling to locate and fit a face, identifying over 692 facial descriptors in the process.

Page 51: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Once a face has been identified, it is converted into a deformable surface model. This surface modeling allows the face detection to work accurately with an infinite number of face shapes. Unlike other solutions, ID-2000 works equally well with all races and genders and is not fooled by a change in hairstyles, or the growth/ shaving of a beard.

Once a face has been captured and rendered, the software uses a proprietary algorithm to produce a wavelet that is unique to that image. It is this wavelet (compressed and encoded) that is used to make comparisons quickly in both one-to-one and one-to-many searches.

Page 52: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Vein Biometric Systems Vein biometric systems record subcutaneous Infra Red

absorption patterns to produce unique and private identification templates for users.

Veins and other subcutaneous features present large, robust, stable and largely hidden patterns. Subcutaneous features can be conveniently imaged within the wrist, palm, and dorsal surfaces of the hand.

The technology is a vascular barcode reader for people!

The technology can be applied to small personal biometric systems, generic biometric applications including intelligent door handles, door locks etc.

Page 53: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Vein Biometric Systems

Vein pattern IR. grey-scale images are binarized, compressed and stored within a relational database of 2D vein images. Subjects are verified against a reference template in under 200ms providing fast, robust biometric authentication.

Page 54: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Biometrics - Advantages• Can’t be lent like a physical key or token and

can’t be forgotten like a password

• Good compromise between ease of use, template size, cost and accuracy

• Biometrics contains enough inherent variability to enable unique identification even in very large (millions of records) databases

• Basically lasts forever - or at least until amputation or dismemberment

• Makes network login & authentication effortless

Page 55: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Biometrics - Disadvantages• Still relatively expensive per user

• Companies and products are often new and immature

• No common API (Application Protocol Interface) or other standard

• Some hesitancy for user acceptance

Page 56: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Biometrics - Practical Applications• Network access control

• Staff time and attendance tracking

• Authorizing financial transactions

• Government benefits distribution (Pension, welfare,

etc.)

• Verifying identities at point of sale

• Using in conjunction with ATM , credit or smart cards

• Controlling physical access to office buildings or homes

• Protecting personal property

• Voting/Passports/Visas & Immigration

Page 57: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Biometrics - Privacy Issues

• Tracking and surveillance - Ultimately, the ability to

track a person's movement from hour to hour

• Anonymity - Biometrics links to databases could

dissolve much of our anonymity when we travel

and access services

• Profiling - Compilation of transaction data about a

particular person that creates a picture of that

person's travels, preferences, affiliations or beliefs

Page 58: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Biometrics - Tenets• The indiscriminate and inappropriate application of biometric

technologies will enslave us all.

• Biometric technologies should be used to provide individuals with enhanced privacy, security, autonomy and convenience.

• Users must insist on the application of personal biometric systems, where they own and control their own biometric data.

• The implementation of biometric technologies must safeguard the rights and privileges of the individual whilst maintaining the security of the community.

• Biometric technologies should not be used as tools to manage, control, marginalize or segregate groups or minorities within the population.

Page 59: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Deadman Door Locks• This system uses a pair of doors, between which

is a holding area.

• For the inside door to operate, the outside door

must lock and close, with only the authorized

person within the holding area.

• This can reduce the risk of piggybacking, where

an unauthorized person follows a authorized

person into a restricted area.

• Similar to the airlocks present in spacecraft.

Page 60: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Computing Facility• Walls

• True Floor to Ceiling• Fire Rating (at least 1 hour)• Penetrations• Adjacent Areas

• Doors• Interior/Exterior• Hinges• Fire Rating• Alarms• Monitoring

Page 61: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

• Windows/Openings

• Interior/Exterior

• Fixed

• Shatterproof

• Computer and Equipment Room Lay Out

• Equipment Access

• Storage

• Occupied Areas

• Water Sources

• Cable Routing

Computing Facility

Page 62: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Electrical Power Definitions:

• Blackout - Loss of Power

• Brownout - Prolonged Period of Below Normal Voltage

• Noise - Random Disturbance that Interferes with a Device

• Sag - Short Period of Low Voltage

• Spike - Momentary High Voltage

• Surge - Prolonged High Voltage

• Transient - Line Noise/Disturbance at Normal Voltage

Electrical Power

Page 63: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Electrical Power Controls

• Dedicated Circuits

• Controlled Access to:

– Power Distribution Panels

– Master Circuit Breakers

– Transformers

– Feeder Cables

• Emergency Power Off Controls

• Voltage Monitoring/Recording

• Surge Protection

Electrical Power

Page 64: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Backup Power

• Alternate Feeders

• Un-interruptible Power Supply

• Emergency Power Generator

Electrical Power

Page 65: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Backup Power Requirements

• Lighting

• Physical Access Control Systems

• Fire Protection Systems

• Computing Equipment - Mainframes, Servers, etc

• Communications Equipment

• Telephone Systems

• Air Conditioning

Electrical Power

Page 66: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

• Dedicated

• Controllable

• Independent Power

• Emergency Shut Off Controls

• Positive Pressure

• Protected Air Intakes

• Monitoring

Air-conditioning

Page 67: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

• Humidity Controls

• Risk of Static Electricity

• Risk to Electric Connections

• Air Quality (Dust)

• Water Protection

• Falling Water

• Rising Water

• Drains

• Protective Coverings

• Moisture Detection Systems

Other Controls

Page 68: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Fire Prevention & Protection• Fire Elements:

• Fuel

• Oxygen

• Temperature

• Causes Of Computer Center Fires

• #1: Electrical Distribution Systems

• #2: Equipment

• Fire Classes

• A: Common Combustibles (use Water/Soda Acid)

• B: Liquid (CO2/Soda Acid/Halon)

• C: Electrical (CO2/Halon)

Page 69: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Fire Prevention & Protection• Temperatures When Damage Occurs

• Paper Products: 350o

• Computer Equipment: 175o

• Disks: 150o

• Magnetic Media: 100o

Page 70: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Fire Detection• Manual

• Optical (Photoelectric-Smoke Blocking Light)

• Temperature

• Ionization (Reaction to Charged Particles in Smoke)

Page 71: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Fire Detectors

• On Ceilings

• Above Suspended Ceilings

• Beneath Raised Floors

• Return Air Ducts

• Cross-Zoning

Page 72: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Fire Alarms

• Manual & Automated Activation

• Visual & Audible Indication

• Local & Remote Annunciation

Page 73: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Fire Suppression - Portable Ext.• Portable Extinguishers

• At Exits• Mark Locations and Type• Types A, B & C• Need to Inspect

Page 74: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Fire Suppression - Water

• “Dry Pipe” Systems: Less Risk of Leakage

• Employ in Throughout Building and in all Spaces

• Works to Lower Temperature

• Most Damaging to Equipment

• Conventional Systems

Page 75: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Fire Suppression - CO2

• Colorless/Odorless

• Potentially Lethal

• Removes Oxygen

• Best for Unattended Facilities

• Delayed-Activation in Manned Facilities

Page 76: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Fire Suppression - Halon• Best Protection for Equipment

– Inside Equipment Cabinets/Vaults

– Special Areas

– Above Suspended Ceilings

– Under Raised Floors

• Concentrations <10% are Safe

• Becomes Toxic at 900o

• Depletes Ozone (CFCs)

• Halon 1301: Requires Pressurization

• Halon 1211: Self-Pressurization (Portable Extinguishers)

Page 77: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Securing Storage Areas

• Forms Storage Rooms

• Increased Threat of Fire

• Combustibles

• Access Controls

• Media Storage Rooms

• Media Sensitivity

• Segregation

• Access Controls

• Environmental Controls

Page 78: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Media Protection• Storage

• Media Libraries/Special Rooms

• Cabinets

• Vaults

• Location

• Operational

• Off-Site

• Transportation

Page 79: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Protecting Wiring• Optical Fiber

• Copper Wire

• Certifying the Wiring and Cabling

• Controlling Access to Closets and Riser Rooms

Page 80: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Other Considerations• Dealing with Existing Facilities

• Planning

• Upgrade/Renovation

• Incremental New Construction

• Protecting the Protection

• Implement Physical and Environmental Controls for Security Systems

• Protect against both Intentional and Inadvertent Threats

Page 81: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Other Terms & Abbreviations• Tailgate• Piggy-Back• Stay Behind • Degauss• Remanence• Mantrap• Pass-Back• Dumpster Diving• Montreal Protocol• Duress Alarm• Tamper Alarm

• Passive Ultrasonic• Fail Safe/Fail Soft• EPO• IDS• Shoulder Surfing• Electronic

Emanation• Tsunami• RFI• Defense in Depth• EMI• Top Guard

Page 82: Physical Security & Biometrics By Prashant Mali. Objectives To address the threats, vulnerabilities, and countermeasures which can be utilized to physically

Thank You

[email protected]