Category: Security & Privacy

  • Considerations for key control

    • The assignment and monitoring of key holders.
    • The decision whether or not to hold master keys.
    • The limitations and controls placed on the duplication of keys.
    • The need for patented cylinder locks, depending on security requirements.
  • Safes, Vaults and secured containers

    • Vault security classifications are supplied by the underwriters laboratory
    • The underwriters laboratory provides standards for the construction of vault doors, floors, walls and ceilings
    • The weight of a safe contributes to its security classification.
  • Instakey and Intellikey

    InstaKey

    A key device that can be used to disable a using one turn of a master key to change a lock.

    IntelliKey

    A key device that contains a built-in microprocessor, microcomputer, and key-exchange data.

  • Characteristics of compartmentalized areas

    • Contains sensitive data that, if lost, could cause serious harm to the organization or others.
    • The access rights of personnel into the area are frequently verified.
  • Intrusion Detection Technology: Examples

    • Acoustical detection: A bio-hazard laboratory is in a hermetically sealed area of a building.
    • Motion detection: A large warehouse needs after hours protection.
    • Electrostatic detection: A expensive painting on display needs protection.
    • Electro-Mechanical detection: the door to a server room.
    • Electro-Mechanical detection: detects breaks in electrical circuit.
    • Passive Infrared: Detects fluctuations in energy and particle temperature within the protected area.
    • Motion detection: A large warehouse needs after hours protection.
    • Electrostatic detection: detects capacitance changes in a defined field.
  • Components of layered defense

    • Mechanisms for preventing unauthorized access to rooms where sensitive data is stored.
    • Bars on windows that represent possible building entry points.
    • Surveillance devices for securing the perimeter of the organizations’s premisses.
    • A security gate for restricting access to a suite of offices.
  • Securing a safe

    • Create strong combinations for the safelock and change these frequently
    • Install the safe in reinforced concrete
  • Secure HVAC systems

    HVAC is short for „Heating, Ventilation and Air Conditioning“.

    • Installing separate air conditioning for data centers.
    • Maintain positive pressurization

    Also, in the context of access control:

    • Implementing access control for cable runs.
    • Securing ventilation registers from unauthorized access.
  • Preventing Power Problems

    • Install static controls.
    • Use power line conditioners.
    • Installing regulators to ensure clean power.
    • Installing single-socket power line filter suppressant.
  • Disaster Response Roles

    • Responsible for carrying out the recovery processes and tasks: Emergency Response Team
    • Responsible for contaction the organization’s lawyer an/or legal team: Primary site restoration team
    • Responsible for interfacing with the media: Company executives
    • Responsible for setting the emergency plans into motion: Emergency management team