260 likes | 1.19k Views
Lesson 4 – Information security. Unit 7 - Organisational Systems Security. Last Session. Counterfeit Goods Information security: confidentiality integrity and completeness of data availability of data as needed. This Session. Complete assignment 1 Physical security Lock and key CCTV
E N D
Lesson 4 – Information security Unit 7 - Organisational Systems Security
Last Session • Counterfeit Goods • Information security: confidentiality • integrity and completeness of data • availability of data as needed
This Session • Complete assignment 1 • Physical security • Lock and key • CCTV • Intrusion detection • Port lockdown • Biometrics
Physical Security • Lock and Key • Equipment identification • CCTV • Intrusion detection systems • Staff and visitor identification • Access control [sign in/sign out] systems • Security personnel • Shielding network cables and wireless communication systems • Port Lockdown
Lock and Key • Secure mobile devices • Master keys for whole building • Submaster for group of rooms eg server rooms • Log of who keys are issued to • Uncuttable keys • Digital keypads/ card entry Observation of code Tail-gating Passing code on to others Building weaknesses: plasterboard partitions, ceiling spaces, unsecured doors.
Equipment identification • Deterrent • Aids recovery • Assists prosecution of offenders • Indelible ink • Ultra-violet sensitive ink • Marking with ‘DNA’ compound created for your organisation.
CCTV • ‘no official (or even unofficial) statistics on how many CCTV cameras there are. The information commissioner doesn't know, the government has repeatedly told parliament that figures are not collected’ Channel 4 Factcheck, 2008 • Estimates vary: 4.2 million (2002, Michael McCahill and Clive Norris), 1.2 million 2007 Edexcel • One camera for every 14 people (David Davies, 2008) • invasion of privacy?
CCTV • Monitor remote locations • Comprehensive record 24/7 of events • Visible cameras modify behaviour and can be a deterrent • Admissible as evidence • Technology and image quality continually improving, most can tilt, zoom and pan • Can include directional microphone • Covert surveillance
Intrusion detection systems • Detect human presence • Passive infrared detects body heat • Microphones detect movement and enable listening • Circuit breakers for doors, windows, hatches • Pressure sensitive pads for floors • Low-power lasers
Staff and visitor identification • Identity badges for staff and visitors • Used in combination with automated access • Personnel database • Can signify role, department, level of access etc • Visitor cards will have an ’expiry’ date
Access control [sign in/sign out] systems • Swipe cards • Dongles • System logs entry and exit • Can be programmed to allow access door by door or at certain times only • Keys can be disabled if not returned when employee leaves • Can be reprogrammed when roles change • May not contain info other than identifier can be used by wrong person
Security personnel • Know most people in organisation (if not all) • Can identify suspicious or unusual behaviour • Monitor buildings out-of-hours
Shielding network cables and wireless communication systems • Signal travelling along copper cable emits electromagnetic field, can be analysed to discover the data • Fibre optics requires considerable effort and possible damage • Shielded cables – dampen ‘noise’ from the cable and prevent external magnetic interference from power sources etc. • Wireless systems less secure; WEP encryption. • Total trust – preconfigure devices so that not just any device can join.
Port Lockdown • Eg wall socket which ethernet cable plugged into; if port is inactive should be ‘locked down’ in central communications room. • Achieved by remote access to switch and disabling port, or unplug the cable. • Prevents additional devices joining system
Biometrics • Fingerprint recognition • Retinal scans • Iris scans • Voice recognition • Other biometric technologies
Fingerprint recognition • Used for over 100 years, 1 in 75 million identical • Can be reproduced using super-glue and Vaseline • Fine watery solution allows detection and scanners to operate. • Some scanners may use rapid laser to detect ridges. • Or electro-static sensitive pad detects current in the small quantities of water • Often used with another system e.g. International travel combines fingerprints with passport/visa in some countries
Retinal scans Retina is the back of the eye Biologically unique configuration Very difficult to change without considerable damage – Fingerprints can be cut or burnt Remains same from birth Takes about two seconds to complete Requires close proximity of subject
Iris scans Which film? Minority report • Another unique feature of the eye • Remember Madeline McCann? • Can be carried out while subject wearing glasses or contact lenses (unlike retinal scan) • Unlikely to change at all during lifetime A public iris scanning device has been proposed in a patent from Samoff Labs in New Jersey. The device is able to scan the iris of the eye without the knowledge or consent of the person being scanned. http://www.technovelgy.com/ct/Science-Fiction-News.asp?NewsNum=930 "false match" less than one time per one hundred billion.
Voice recognition • Considerable limitations • Voices change according to circumstance: • Stress, excitement, tiredness, illness, age! • Use of other devices to circumvent eg mobile phones • Used together with other systems eg CCTV • Recent improvements used in games consoles, important for people with disability e.g. For speech to text systems
Other biometric technologies • Facial recognition systems (with CCTV) • Identifying suspicious behaviour through analysing posture/behaviour • What could be next?
Assignment 1 • Know your threats • P1 - Explain the impact of different types of threat on an organisation. • M1 - Discuss information security.