Blog

  • Questions for potential cloud data storage

    • What are the points of exposure for data flowing in and out of the cloud?
    • How critical is the data to be used within the cloud to the organization’s operations?
    • What data is being considered for use in the cloud?
    • Should the organization adopt a private or public cloud?
  • Security issues in grid computing

    • The grid’s quality of service needs to remain at a level acceptable to users.
    • Host machines on the grid shouldn’t be over-utilized to the extent that their local clients are denied service.
    • Trust levels need to be managed when new grid members join, or existing depart.
  • Fire prevention, suppression and detection

    Prevention

    • Use non-flammable building materials
    • Conduct training on how to respond when a fire occurs

    Suppression

    • Use portable fire extinguishers

    Detection

    • Install heat-detectors
    • Install ionization smoke detectors
  • Natural gas security measures

    Attach a shut-off wrench to a cord near the shut-off valve.

  • Considerations for key control

    • The assignment and monitoring of key holders.
    • The decision whether or not to hold master keys.
    • The limitations and controls placed on the duplication of keys.
    • The need for patented cylinder locks, depending on security requirements.
  • Safes, Vaults and secured containers

    • Vault security classifications are supplied by the underwriters laboratory
    • The underwriters laboratory provides standards for the construction of vault doors, floors, walls and ceilings
    • The weight of a safe contributes to its security classification.
  • Instakey and Intellikey

    InstaKey

    A key device that can be used to disable a using one turn of a master key to change a lock.

    IntelliKey

    A key device that contains a built-in microprocessor, microcomputer, and key-exchange data.

  • Characteristics of compartmentalized areas

    • Contains sensitive data that, if lost, could cause serious harm to the organization or others.
    • The access rights of personnel into the area are frequently verified.
  • Intrusion Detection Technology: Examples

    • Acoustical detection: A bio-hazard laboratory is in a hermetically sealed area of a building.
    • Motion detection: A large warehouse needs after hours protection.
    • Electrostatic detection: A expensive painting on display needs protection.
    • Electro-Mechanical detection: the door to a server room.
    • Electro-Mechanical detection: detects breaks in electrical circuit.
    • Passive Infrared: Detects fluctuations in energy and particle temperature within the protected area.
    • Motion detection: A large warehouse needs after hours protection.
    • Electrostatic detection: detects capacitance changes in a defined field.
  • Components of layered defense

    • Mechanisms for preventing unauthorized access to rooms where sensitive data is stored.
    • Bars on windows that represent possible building entry points.
    • Surveillance devices for securing the perimeter of the organizations’s premisses.
    • A security gate for restricting access to a suite of offices.