StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Physical Security Related to Computer Systems - Term Paper Example

Cite this document
Summary
The paper is a discussion about the first layer of security called physical security. An introduction has been given as to what does physical security means in general and in particular in terms of computer information systems. Physical security related to computer systems is particularly explained…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.9% of users find it useful
Physical Security Related to Computer Systems
Read Text Preview

Extract of sample "Physical Security Related to Computer Systems"

Physical Security With the growing use of technology based systems containing sensitive information, the threat of cyber terrorism and the solutions for its determent are becoming a hot topic. This report is a discussion about the first layer of security called physical security. First of all, an introduction has been given as to what does physical security mean in general and in particular in terms of computer information systems. Physical security related to computer systems, servers and networks is more particularly explained. A list of physical security threats has been given which are very likely to occur with a technology based system. How these threats occur and what techniques an intruder may use to enter into and hack a system, has been given a consideration. Next, the approaches that can be used for the determent of physical attacks and the security measures that can be taken to secure the hardware, network and the power supply, have been discussed in detail. Suggestions have been given to improve measures to deter political security threats which are growing in today’s world of increasing violence. Proper monitoring of physical security systems is also very important and has been talked about. This report provides a good and basic understanding of the field of physical security and its importance in sustaining livelihood and success of an organization or a home-made business with a foolproof system to avoid physical access of the enemy. Keywords: physical security, threat, attack, intruder, system, network, information, sensitive, hardware, lock, access, authorization, hacking, laptop Introduction Physical security is generally defined as the measures taken to ensure the security of workforce, system devices and equipment, resources, documents and sensitive information stored on physical media (like hardware programs and networks) from damaging proceedings like unauthorized access, fire, espionage, burglary, theft, vandalism, accidental loss or intentional crime that could cause severe harm to an activity, organization or establishment. In addition to this, physical security also provides assistance on scheming of such structures which help in deterring hostile operations. In terms of computers and internet, physical security is defined as a blockade placed about a computing system using secured operating systems and other protective measures to prevent unauthorized access to the information stored on it. This kind of physical security can also be referred to as computer security or cyber security or logical security in which information is protected by operating systems and special softwares from unauthorized access. Moreover, the physical security of hardware has to be made sure alongwith the guarantee that the servers are running smoothly and have internet access. The computer systems today, thanks to the precious information stored on them, have become more prone than ever before to physical attacks like data theft, copying and selling of information, hacking and viruses. If such an attack occurs, the enemy easily gets access to the information stored on the computer system. He can use different methods to access this information like he can remove the hard disk of the target computer system and then later own run it on his own system, or he can use techniques to start the system with no passwords, or he can steal the information by copying it on disks, or he can damage the whole system by running files on it that contain viruses, or he can steal the whole system, be it a desktop, laptop or a PDA (personal digital assistance). Without proper physical security techniques, the whole system including the information saved on it would be at stake. That is why, physical security is considered to be the top-most security layer as it can be implemented with little expertise and greater common sense ensuring low-cost techniques. There will be no use of expensive security systems if they are not implemented intelligently. The main purpose and aim of physical security is that the security of people, privacy, reliability and accessibility of assets (to authorized persons) is ensured (see Figure 1). Physical Security Threats “A threat is defined as an event (for example, a tornado, theft, virus infection), the occurrence of which can have an undesirable impact on the well-being of an asset” (Kallhoff, 2007).  In the field of computers, internet and networking, the physical security threats are categorized as computer and network security threats, environmental threats, electrical threats, political threats and maintenance threats. Some of the major computer security threats include theft, fraud, backdoor, DoS (Denial of Service) attacks, data flood, malicious code, document grinding, and enumeration. Frauds, like gaining access to computers that control access to important resources as inventory systems and financial accounts, are more likely to be attempted by authorized persons who are also referred to as insiders and the situation is called employee sabotage. Bogue (2003) states that: Sometimes those who are gaining access to a system are not cyberterrorists; theyre just curious employees who want to learn more about the systems or perhaps play with some settings to see if they can allow themselves a greater ability to control their PCs. Network security threats include malware, anti-DNS pinning, banner grabbing, backjacking, hacking, land attack, blue boxing, domain hijacking, and the list continues. Environmental threats include fire, windstorms, rainstorms, snowstorms, torrents, tornados, lightning, roof leaks, very high or very low temperature, heavy dust, earthquakes and moisture which can harm the computer system or network at a very high level. Electrical threats include sudden surges or spikes in the power supply or voltage, congested electrical outlets, blackout (power loss or electricity failure) and brownout (inadequate voltage supply). Political threats are also there from which the organization, system and the information have to be secured. These include violence, bomb blasts, strikes, surveillance, and so on. Maintenance threats include shortage of spare parts, insecure cabling, or electrostatic discharge that occurs as a result of mishandling of electronic components of the system. Approaches to Deter Physical Security Attacks Here, we describe some common but very important approaches that should be used for the determent of physical security attacks. Physical Security of Hardware The first and foremost thing is that the system which contains sensitive and crucial information should be kept away from public place. You need to make sure that the enemy does not get access to the computer system (routers, control boards, servers, electronic components) as stealing of information comes at the next stage. Use the ‘lock everything’ approach. Physical security may start from as little a thing as locking the doors and windows and using security systems like burglar alarms and security cameras with automatic log footage, and end at as complex a method as securing the whole network. One must look for devices that lock the computer cases to desks and lock the disk drives and the CPU as well. There are alarms and case locks that prevent a foreign keyboard, mouse or any other electronic component to get attached to the system. Furthermore, the system must be password protected. Though the intruder may know how to break a password, it actually slows down the process for him to log in. The BIOS of the system must be configured so that it does not boot from a floppy drive being used by the intruder. Doing so helps in deterring the intruder from breaking the passwords and stealing the information. If there is an external device attached to the system like a webcam, a microphone, a card reader, or a Bluetooth device, then it would be wise to remove them from the system during off-hours. If the system under consideration is a small setup like a setup at home, then it is important to have it protected from small children and guests. Though, laptops and PDAs are much common in use nowadays, they are also prone to theft because of their size and portability. It is very important to ensure the security of these handy systems and the information they contain. If this information includes sensitive business information, then it should be ensured that unauthorized persons to not get the grant of access. This way, if the system gets stolen, the information will remain secure. Moreover, it would be a matter of common sense to keep the portable system like a laptop or a PDA along wherever one goes or lock it using cable-type security locks. Unattended laptops are a treat for thieves. One can use unconventional baggage for carrying laptops containing sensitive information so that the thief does not come to have an idea that one is carrying the system along. Another important technique is to make backups of files containing important data. This way, one will always have a copy of the information that is lost. Doing so also helps in identifying the crucial information that will be at threat and thus one can carry out necessary steps to restore the information to a certain level. Physical security of the hardware also includes proper labeling of the electronic components and secure cabling so that there is no risk of entanglement of cables or damage to the system. If the system has been logged on by the authorized person, then he should never leave the system logged on before going for a break. Spare parts should be maintained in case of emergency. Also, the environmental threats must be considered while securing the system. If the system or some of its components are locked in a small place like a cabinet or a closet, proper airing must be ensured so that the system may not heat up or get damaged. Physical Security of Networks In a network, those computers must be physically secured that hold sensitive information and network passwords on them. These may be kept in a separate room that is physically secured away from public. Again, it is important to ensure that the room or building where the network is being secured has properly locked door, windows, ceilings and gates with properly manned reception desks. All sensitive servers and networks should be secured from the enemy by means of firewalls, code encryption and decryption (cryptography) and intrusion detection system because if the server has been physically accessed, then it is very easy to reboot it and gain access to its hard drives. Once the security system for the network has been established, it must be tested to make sure it is foolproof because there are varied types of threats and attacks, always arriving out of nowhere, and hacking techniques that are being born with every passing day. Access control Access control means that the physical (and electronic) access to the information and physical resources is only and only granted to authorized persons. Without the access control system, the information will be totally naked to everybody. Access control ranges from locking the door to locking the whole network from unauthorized or unauthenticated access. Many organizations use card key system or human security to eliminate the risk of unauthorized access. With the help of this card key system, each employee can be recognized separately. Securing the Power Supply This kind of threat is most often accidental but sometimes may be intentional too. It includes fluctuations or surges in power supply, that is, sudden rise or sudden drop in the voltage, the efficiency of the supply and electricity failure. The voltage fluctuation tends to damage the computer system and the information stored in the random-access memory because it may cause the system to shut down suddenly. Thus, power smoothing becomes vital. This can be achieved by applying surge protectors on the power supply or by using devices like uninterruptible power supply (UPS) which are charged by the power main. These have built-in power smoothers which are greatly helpful if there is sudden failure of power supply like electricity blackout. The computers over the network are connected to the UPS and in case of electricity failure, they do not shut down all of a sudden. This helps in saving the vital information that was being processed. A power generator does the same purpose, that is, acts as a power supply and lets the computers continue their processing without losing the information. There should be power-linked parameters connected with both the power supply and the system which give signal before electricity failure. It is always better to use stabilizers and surplus power supplies with the system so that the power is filtered before reaching the system. Physical Security of Political Threats Terrorism and violence are mounting with every passing day. According to Rao (2007), it is very important “ to define a road map for core areas to protect physical & environmental assets of any building premises reducing vulnerability to acts of internal and external threats” and to lay down a defensive infrastructure “right from the perimeter wall of the building premises to inner layers of building where critical assets are housed”. All entry and exit points of the building, where the sensitive network has been secured, should have properly armed physical security guards and intrusion detection system like explosive detectors, scanners and mobile jammers. Monitoring of Physical Security Measures Proper monitoring of the physical security measures is very necessary to make the security perfect. Even if the door has been locked, persons who have to use the server or the system will keep on coming in and out. The door might remain open for sometime when an authorized person enters or leaves and this is when the intruder or enemy gets the opportunity. Video monitoring helps in such cases as it takes snaps and keep logs of person entering or exiting or accessing the system. Digital video cameras and other similar devices, which give signals when some kind of motion is detected, are used for this purpose. Conclusion To sum up, physical security has become vital in today’s world of catastrophic events which occur due to human error and the environment. All individuals working within an establishment should feel the responsibility of physically securing their sensitive systems and the precious information. It is very important to identify physical threats that could tamper with the network system so that measures could be taken accordingly. The more we involve technology in our infrastructure, the more are the chances of physical attacks by the intruders. If physical security is not given consideration, it can result in irreversible damage to the whole organization. References Bogue, R. (2003). What is physical security? Lock IT Down: Dont Overlook Physical Security On Your Network. Retrieved from http://articles.techrepublic.com.com/5100-10878_11- 5054057.html?tag=regPop;closeBtn# Kallhoff, J. (2007). Physical security threats. Retrieved November 6, 2009, from Global Information Assurance Certification Web site: http://www.giac.org/resources/whitepaper/physical/287.php Rao, S. (2007). Physical & environmental controls for building premises. Physical Security. Retrieved from http://www.cccure.org/modules.php?name=News&file=article&sid=1179 Figure 1: Physical security Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Physical Security Related to Computer Systems Term Paper, n.d.)
Physical Security Related to Computer Systems Term Paper. Retrieved from https://studentshare.org/information-technology/1559202-physical-security
(Physical Security Related to Computer Systems Term Paper)
Physical Security Related to Computer Systems Term Paper. https://studentshare.org/information-technology/1559202-physical-security.
“Physical Security Related to Computer Systems Term Paper”. https://studentshare.org/information-technology/1559202-physical-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Physical Security Related to Computer Systems

Information Systems Security

The paper "Information systems Security" concerns such security systems as PIN numbers, key card accesses, and passwords that could be easily stolen and hacked.... hellip; Many public and private sector information systems have failed to meet the desired security standards and protocols defined by IT compliance rules and regulations.... The information systems are exposed to widespread risks, threats, and vulnerabilities that can adversely impact the IT work processes....
8 Pages (2000 words) Essay

Designing Human Interfaces for Operating Systems

The paper "Designing Human Interfaces for Operating systems" describes that the history of the user interface shows a lot of transformations over the year, and it is cannot be stressed enough that the future holds a lot of different avenues for better and more efficient user interfaces.... hellip; User interfaces and operating systems are important parts of a computer system that basically define their usage for different types of users.... This is where the operating systems of computers come into play, as it is them that provide a basic platform for the user to interact with the computer system through interface or human interface....
9 Pages (2250 words) Essay

The Convergence of Physical and Information Security

In this approach, there is the merging of the two historically distinct functions of security, including information security and physical security.... When we talk about the physical security, we mean the traditional form of protection that focused primarily on the use of effort to protect the assets owned by an organization (Conference Board of Canada, 2011).... physical security officers will in that case be made up of law enforcement officers....
20 Pages (5000 words) Research Paper

Virtualization and Security

Virtualization also refers to scheming technologies to run the abstraction layer among computer hardware and systems.... Virtualization can also allow the running of multiple operating systems in a single machine (Roemer, 2011, p.... The physical resources hidden from the server include operating systems, resources from software running them to create more space for data storage.... It includes designing a virtual operating system, computer hardware, and computer resource network or storage devices....
9 Pages (2250 words) Essay

Methods Available for Maintaining Computer System Security

These requirements are of paramount importance in almost all of the computer systems.... In the process related to denial of service, an adversary looks for preventing someone from using any feature of a computer system.... The paper "Methods Available for Maintaining computer System Security" states that the computer system has reached an invaluable stage.... The need for computer system increased multifold with the advent of the internet....
8 Pages (2000 words) Coursework

Access Control Methods in Information Security

This paper ''Access Control Methods in Information Technology'' tells that access control is one of the most sensitive aspects of computer and computer systems' security.... Today, most of the issues associated with information technology revolve around losing or disclosing sensitive data or computer systems.... As is evident with the masculinity of information technology as the contemporary means of capturing and storing information, access control systems must exist to protect information and information technology systems....
6 Pages (1500 words) Coursework

The Strategies Applied in Computer Security

Due to the compromising nature of the data, the most effective way to protect it involves undertaking careful technical measures, well trained staffs and physical security.... he physical threats which include fire, malicious damage and power outageThose exploits resulting from corporate espionage as well as malicious activitiesHuman errors that involve the unintended data disposal , mistaken information processing and input errorsSuccessful potential threat detection is followed with the establishment of vulnerability areas and development of relevant strategies to help in securing the data as well as information systems....
8 Pages (2000 words) Assignment

Developing a Security Plan

nbsp;Information security is the safeguarding of information and information systems.... nbsp;Information security is the safeguarding of information and information systems.... Some areas requiring information security include network security, business stability planning, record security, and information systems auditing.... … The paper "Developing a security Plan" is a wonderful example of a term paper on information technology....
15 Pages (3750 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us