25
Security Systems Analysis Security Services

Security Systems Analysis Security Services. Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with

Embed Size (px)

Citation preview

Security Systems AnalysisSecurity Services

2Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Copyright and Terms of Service

Copyright © Texas Education Agency, 2011. These materials are copyrighted © and trademarked ™ as the property of the Texas Education Agency (TEA) and may not be reproduced without the express written permission of TEA, except under the following conditions:

1)  Texas public school districts, charter schools, and Education Service Centers may reproduce and use copies of the Materials and Related Materials for the districts’ and schools’ educational use without obtaining permission from TEA.

2)  Residents of the state of Texas may reproduce and use copies of the Materials and Related Materials for individual personal use only, without obtaining written permission of TEA.

3)  Any portion reproduced must be reproduced in its entirety and remain unedited, unaltered and unchanged in any way.

4)  No monetary charge can be made for the reproduced materials or any document containing them; however, a reasonable charge to cover only the cost of reproduction and distribution may be charged.

Private entities or persons located in Texas that are not Texas public school districts, Texas Education Service Centers, or Texas charter schools or any entity, whether public or private, educational or non-educational, located outside the state of Texas MUST obtain written approval from TEA and will be required to enter into a license agreement that may involve the payment of a licensing fee or a royalty.

Contact TEA Copyrights with any questions you may have.

3Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Security Awareness

• An attitude held by security personnel and non-security client employees that places a high value on detecting, deterring, and reporting security exposures such as crime, safety hazards, fire hazards, theft, intrusions, and vandalism

• Requires security personnel to protect the client’s employees, property, guests, and image, and assist the client’s personnel and visitors

• Requires that non-security client employees be aware of the security program’s goals and methods and support the security program, abiding by its policies

4Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Security Awareness (continued)

• Founded on the concept of preventative security

• The three main security principles– Availability– Integrity– Confidentiality

5Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Physical Security

• Two basic duties of performing physical security– Observe– Report

• Three initial steps taken with a security threat– Identify it– Report it– Discuss and develop a

solution that eliminates the problem

6Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Physical Security (continued)

• Cultivates security awareness among the clients and requires conscientious and highly visible security officers

• A priority concern of top-level management of businesses, industries, and institutions

• Has the ultimate goal of loss prevention which results in the maximum return on investments

7Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Physical Security (continued)

• Requires two basic investigative skills– Communication skills– Surveillance capabilities

• Defines the primary hardware systems traditionally with – Locks– Security alarms– Access controls– Surveillance video

8Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Electronic Access Control Systems

• Security devices that allow the user and the system to communicate with each other

• These include– Controller– Card reader– Door contacts– Control locking device

• Not security alarm systems; the two systems do have a lot in common, but are usually implemented separately

9Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Electronic Access Control Systems (continued)

• Strategically positioned as a natural focal point for a security officer to initiate ownership of the physical security systems, systems that are traditionally supported by facilities personnel

• Require access credentials which are used in conjunction with access controls, typically in the form of access cards and card readers

• Require communication between the card and the controller using the card data and the reader data stream

10Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Electronic Access Control Systems (continued)

• Distinct functions of security and access control • Identification• Authentication• Authorization

– Biometrics – based on an individual’s unique characteristics

• Most common biometric systems– Fingerprint– Palm Scan– Hand Geometry– Iris Scan– Signature Dynamics– Keyboard Dynamics– Voice Print– Facial Scan– Hand Topography

11Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Electronic Access Control Systems (continued)

• Access control key points and mechanisms include• Passwords• Passphrase• Cryptographic keys• Centralized access control administration • Preventative administrative controls • Preventative physical controls • Preventative technical controls

12Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Surveillance Systems

• Many people continue to rely on old-fashioned security methods such as door and window locks, but it is more practical to invest in surveillance cameras

• Surveillance cameras – Currently among the most popular and in-demand

security devices– Capable of obtaining 24-hour steady video

13Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Surveillance Systems (continued)

• Ideal for industrial and official establishments, and individual homes

• Commonly used for standard property monitoring

• Used indoors and outdoors• Used visibly and hidden • Serve a variety of purposes including employee

theft and monitoring children (i.e. nanny cams)

14Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Surveillance Systems (continued)

• Found in various locations including– Public highways– Parks– Vehicles– Airplanes– Ships

• Found in two categories– Hardwired

• Effective but can easily accumulate wires

– Wireless • Easier to setup, install,

and place anywhere• Clutter-free and

dependable

15Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Intrusion Detection System (IDS)

• A program that monitors a system for malicious activity and in turn reports the activity

• Designed to test/analyze network system traffic/events against a given set of parameters and send out an alert or capture data when these thresholds are met

• Uses collected information and a predefined knowledge-based systems to reason about the possibility of an intrusion

16Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Intrusion Detection System (IDS) (continued)

• Detects attacks as soon as possible and takes the appropriate action, but does not usually take preventive measures when an attack is detected

• Reactive rather than proactive• Configurable to run unattended for extended

periods of time• Must recognize unusual activity and operate

without unduly affecting the system’s activity

17Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Intrusion Detection System (IDS) (continued)

• Consists of three components or modules– Event generator – Analysis engine or console– Response manager

• Uses various detection approaches– Signature detection– Statistical anomaly detection

18Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Intrusion Detection System (IDS) (continued)

• Types– Network– Protocol-based– Application protocol-based – Host-based– Passive– Reactive

19Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Integrated Security Systems

• Security services is one of the fastest growing areas of integrated building systems

• Demand for security services has maintained steady growth since September 11, 2001

• Security systems inherently require an integrated approach, except for local card entry locks

• Physical access control is more than the use of a simple lock; instead the lock may be integrated with a biometrics ID system

20Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Integrated Security Systems (continued)

• A high-resolution digital closed circuit television (CCTV) system permits easy access to stored images and the computer analysis of the images, which aids in decision-making

• Once data and control are connected on a communication link, they can easily tie in with other systems

• The projected expansion of power over ethernet (PoE)• The installation of sophisticated access control systems

in commercial buildings is a new trend toward systems convergence

21Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Integrated Security Systems (continued)

• This surveillance system integrates all critical security functions, such as alarm, fire, and access systems, allowing the security staff to simultaneously monitor all systems from the centralized security command center

• Also has the capability to use specific notification systems that can inform the building occupants of an event/crisis and inform them of the proper reaction

22Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Integrated Security Systems (continued)

• Design services include– Enterprise systems for local, regional, or global monitoring – Monitoring emergency operations center and fusion center design which

manages and shares information between and across operations– Video surveillance systems – Access control systems– IDS – Physical security information management systems– Network design and bandwidth planning– Intercom systems and emergency communications– Door and window selection and hardware coordination– Conduit layouts with security power requirements– Lighting layouts with photometric detail– Design services for new construction and renovations/re-fits

23Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Security Inspection• An important step toward preventing theft, burglary, and other

crimes• Can indicate features which would make entry easy or difficult for

a prospective offender when completed by trained security personnel

• Shows how a location’s security can be improved• Requires observation of all entry points to determine what steps

can reduce vulnerability• Begins at the front door and then includes the side and rear doors,

windows, locks, lights, and landscaping• Used by all professionals in the field of crime prevention,

including both security services and law enforcement professionals

24Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Security Inspection (continued)

• Requires the use of standard inspection forms/checklists that indicate security weaknesses and/or hazards that require attention including– Front entrance – Side or rear entrance – Entrances from the garage– Upper floor windows– Garage doors and windows – Basement doors and windows – Ground floor windows – Recommendations and comments

25Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Resources

• 0205592406, Introduction to Private Security: Theory Meets Practice, Cliff Roberson and Michael L. Birzer, Prentice Hall, 2009

• 0750684321, Introduction to Security, Robert J. Fischer and Gion Green, Butterworth-Heinemann, 2008

• Access Control Systems & Methodology, Jeff Smith, Purdue University

• Physical Access Control, Terry Martin & Alexandra Bakhto, http://www.giac.org/cissp-papers/282.pdf

• Do an Internet search of the following: security checklist David L. Berger Forensic Consultant

• Investigator/Officer’s personal experience