Physical Security and Surveillance Networking Solutions

Total Page:16

File Type:pdf, Size:1020Kb

Load more

® Physical Security and Surveillance Networking Solutions Powerful solutions that extend physical security into harsh and outdoor environments. ® GarrettCom Makes IP Video Surveillance Easy and Secure The old guard is changing – and fast. What used to be protected by human bodies is now under the watchful eye of sophisticated, multifaceted IT-based systems ranging from basic access control to electronic surveillance, biometrics and complex perimeter intrusion measures. New security technologies are trending toward IP-based video surveillance and access control systems. The increasing sophistication of these tools enables security professionals to look at physical security design from a more proactive perspective. The table below defines critical considerations for this technology- based approach in outdoor or uncontrolled environmental applications. This network architecture example shows a common deployment for a medium-sized outdoor surveillance configuration. Key Things to Consider for Outdoor Applications How GarrettCom Benefits You Hardened enclosure to prevent water/dust from leaking-in and high Small footprint, hardened enclosure for harsh outdoors deployments humidity in some areas Fan-less design with convection cooling to reduce failure points and Operating temperature range of -40C to 85C with convection cooling improve product lifetime Wider operational temperature range to keep system running and ensure Operating temperature range of -40C to 85C with convection cooling network availability for mission-critical surveillance tasks Long Distance Fiber link back to central office or control center High-bandwidth, long distance Fiber connection to network backbone Compact form factor in order to minimize real estate cost and flexible to fit Small footprint, hardened enclosure for harsh outdoors deployments with any structure Long MTBF for high reliability and network uptime Industry leading MTBF numbers for longer lifetime PoE ports to power IP-based cameras Flexible port configuration coupled with PoE/PoE+ support High Redundancy support through software feature and topology Advanced traffic management and security features Small Deployments with 2-4 cameras Magnum 6KL Family Magnum 6KL is an Industrial Ethernet Edge Switch with full-featured MNS-6K software. The base unit also has four 10/100 Magnum 6KQE Family copper ports. Up to four 100Mb fiber ports (SC, ST, LC, and MTRJ), four 10Mb fiber ST ports, or up to four more 10/100 copper ports (or combinations) may also be configured. Up to 2 Gb ports are optional. All four PoE ports support PoE 802.3af. It also includes -48V DC terminal block for power input, an alarm contact for status monitoring and panel-mounted brackets. DIN-Rail mounting bracket optional. Magnum 6KQE is a Heavy Duty Edge Switch that occupies the same footprint as the Magnum 6KQ. The port configurations are different in the 6KQE. The base unit also has four 10/100 copper ports. Up to three 100Mb fiber ports or up to four more 10/100 copper ports (or combinations) may also be configured. 10 ports maximum. Up to 2 Gb ports are optional. Gb SFP Special Typical Applications Common Configurations 10/100RJ-45 Gb SFP Ports List Price Notes Transceivers Add 6KLP-48VDC + 6KL- 1 - SX, for 550m cost efficient 4 PoE 2 PoE $1,325.00 2GSFP + 1 SFP-SX distance solution. More reliable 6KLP-48VDC + 6KL- 2 - SX, for 550m 4 PoE 2 PoE $1,480.00 solution with 2GSFP + 2 SFP-SX distance redundant uplinks Small Deployments with 2-4 cameras 6KQEP-48VDC + 6KQE- 1 - SX, for 550m cost efficient and 4 PoE 1 PoE $2,075.00 1GSFP + 1 SFP-SX distance compact solution More reliable 6KQEP-48VDC + 6KQE- 2 - SX, for 550m solution in compact 4 PoE 2 PoE $2,230.00 2GSFP + 2 SFP-SX distance form factor with redundant uplinks Selected Alternative Configuration Options: SFP-ESX Gigabit SFP Transiever, SX for 2 kM Distance SFP-SX Gigabit SFP Transiever, SX for 550m Distance SFP-GTP Gigabit SFP Transciever, Copper 5-8 Camera Deployments Magnum 6KL Family Magnum 6KL is an Industrial Ethernet Edge Switch with full-featured MNS-6K software. The base unit also has four 10/100 copper Magnum 6kQ Family ports. Up to four 100Mb fiber ports (SC, ST, LC, and MTRJ), four 10Mb fiber ST ports, or up to four more 10/100 copper ports (or combinations) may also be configured. Up to 2 Gb ports are optional. All four PoE ports support PoE 802.3af. It also includes -48V DC terminal block for power input, an alarm contact for status monitoring and panel-mounted brackets. DIN-Rail mounting bracket optional. The 6KL’s sealed metal case serves as a heat sink, enabling the 6KL to operate in the harshest environments and achieves high EMI noise immunity. The 6KL is available with Conformal Coating options and is rated IP52 for dust and water resistance. Magnum 6KQ is a Heavy Duty Field Switch for industrial networking applications. The base unit has four 10/100 copper ports. It may be configured with a variety of 10/100/1000 Mb fiber and copper port connector types from a family of port modules. 16 ports maximum. Up to 2 Gb ports are optional. Gb SFP Gb SFP Typical Applications Common Configurations 10/100 RJ-45 List Price Notes Ports Transceivers 6KLP-48VDC + P6KL4-RJ45 + 1 - SX, for 550m 8 PoE 1 SFP $1,765.00 Cost efficient solution 6KL-2GSFP + 1 SFP-SX distance 6KLP-48VDC + P6KL4-RJ45 + 2 - SX, for 550m Cost efficient with uplink 8 PoE 2 SFP $1,920.00 6KL-2GSFP + 2 SFP-SX distance redundancy 6KLP-48VDC + PP6KL4-RJ45 + 1 - SX, for 550m 4 PoE and 4 PoE+ 1 SFP $1,900.00 Cost-efficient PoE+ solution 6KL-2GSFP + 1 SFP-SX distance Deployments with 5-8 cameras 6KLP-48VDC + PP6KL4-RJ45 + 2 - SX, for 550m PoE+ solution with uplink 4 PoE and 4 PoE+ 2 SFP $2,055.00 6KL-2GSFP + 2 SFP-SX distance redundancy 6KQP-48VDC + P6KQ4-RJ45 + 1 - SX, for 550m Cost efficient and compact 8 PoE 1 SFP $2,760.00 6KQ-1GSFP + SFP-SX distance solution 6KQP-48VDC + P6KQ4-RJ45 + 2 - SX, for 550m Compact solution with uplink 8 PoE 2 SFP $2,915.00 6KQ-2GSFP + 2 SFP-SX distance redundancy Be Certain with Belden High-Density Deployments Magnum 10KT Magnum 10KT Switch provides high PoE port counts, ideal to support high-density camera deployment. It comes with rack-mount form factor and industrial hardened enclosure suitable for industrial environment as well as any outdoor applications. It has advanced port configurability and can provide flexible fiber port count needed to carry traffic for long distance back to the data center. Advanced thermal design techniques enable the 10KT to deliver high reliability and configurability even at extended operating temperatures. The Magnum 10KT also offers configurable Dual Hot-Swappable power supplies for redundancy and increased reliability. Specifications: The 10 port configuration slots in the Magnum 10KT provide the flexibility for designers to configure up to 4 Fiber or Copper Gigabit ports and up to 32 100Mb SFP Fiber or Copper ports. In addition, copper ports can be optionally Power-Sourcing PoE. This unit is rated for operating temperatures of -40° to 185°F (-40° to 85°C) 10/100 RJ- Gb SFP Typical Applications Common Part Numbers Gb SFP Transceivers Special Add List Price Notes 45 Ports Slots 10KTP-LL + 10K2-2GSFP + 2 - SX for 2km Front Mount, Hot Swap Dual Power 24 PoE 2 $5,100 2 SFP-ESX + 6 10K4P-RJ45 Distance Supplies, PoE version High-density camera deployments which 10KTP-HSPLL + 2 HSPM-L + require hardened switches 2 - SX for 2km hot swappable Front Mount, Dual Fixed Power 10K2-2GSFP+ 2 SFP-ESX+ 6 24 PoE 2 $5,350 Distance power supplies Supplies, PoE version 10K4P-RJ45 Selected Alternative Configuration Options: 10K4P-RJ45 4 Port 10/100 Slot option with PoE 10K4PX-RJ45 4 Port 10/100 Slot option with PoE+ SFP-ESX Gigabit SFP Transiever, SX for 2 kM Distance SFP-SX Gigabit SFP Transiever, SX for 550m Distance SFP-GTP Gigabit SFP Transciever, Copper SECURITY MANAGEMENT AND CONTROL SYSTEM GIGABITÊBACKBONE MENU STREAM 10KG 10KG H264 VIDEO DECODER ENTRANCE POE IP SECURITY CAMERA DVR PERIMETER POE TOFINO XENON IP SECURITY CAMERA SECURITY APPLIANCE LA5 PWR LA6 F/H F/H 5 6 3 4 6K32 6K32 6K32 LA1 LA3 LA2 LA4 1 2 10/100 10/100 RX RX TX TX PES42 REDUNDANTÊGIGABITÊRING REDUNDANTÊGIGABITÊRING 6KQ 6KQ ENTRANCE SECURITY DEVICES MONITORING 6K32 6K32 ANALOG TO IP ENCODER MENU STREAM STREAM H264 ANALOG TO MENU IP ENCODER H264 LA5 PWR LA6 F/H F/H 5 6 IP CELLING MOUNT SECURITY CAMERAS IP CELLING MOUNT SECURITY CAMERAS 3 4 LA1 LA3 LA2 LA4 1 2 10/100 10/100 RX RX TX TX PES42 PERIMETER POE IP POE CELLING MOUNT IP SECURITY CAMERA SECURITY CAMERAS TOFINO XENON ENTRANCE SECURITY APPLIANCE SECURITY ENTRANCE POE DEVICES IP SECURITY CAMERA Belden can help you with an industrial-hardened, end-to-end solution for physical security, strengthened with scalability and resiliency ® Unmanaged Edge Switches Magnum PES42H Family The Magnum PES42H, Power-Sourcing Edge Switch, 6-port hardened PoE solution has four 10/100 RJ-45 PoE ports plus two non-PoE ports which may be 100Mb fiber, regular 10/100 copper, or one of each type. This compact industrial-grade, metal-cased device is rated for tough environments. All four PoE ports support PoE 802.3af. It also includes -48V DC terminal block for power input, an alarm contact for status monitoring and panel-mounted brackets. DIN-Rail mounting bracket optional. Common Part Numbers Power 10/100 RJ-45 10MB Fiber SFF Gigabit Special Add List Price Notes PES42H-48VDC 48VDC 2 plus 4 PoE+ 0 0 - $365.00 Rated -25C to 60C 2 MM w/ST PES42H-2ST-48VDC 48VDC 4 PoE+ 0 - $680.00 Rated -25C to 60C Connectors 2 MM w/SC PES42H-2SC-48VDC 48VDC 4 PoE+
Recommended publications
  • Designing Physical Security Monitoring for Water Quality Surveillance and Response Systems

    Designing Physical Security Monitoring for Water Quality Surveillance and Response Systems

    United States Environmental Protection Agency Designing Physical Security Monitoring For Water Quality Surveillance and Response Systems Office of Water (AWBERC, MS 140) EPA 817-B-17-001 September 2017 Disclaimer The Water Security Division of the Office of Ground Water and Drinking Water has reviewed and approved this document for publication. This document does not impose legally binding requirements on any party. The information in this document is intended solely to recommend or suggest and does not imply any requirements. Neither the U.S. Government nor any of its employees, contractors or their employees make any warranty, expressed or implied, or assumes any legal liability or responsibility for any third party’s use of any information, product or process discussed in this document, or represents that its use by such party would not infringe on privately owned rights. Mention of trade names or commercial products does not constitute endorsement or recommendation for use. Version History: The 2019 version is the second release of the document, originally published in September 2017. This release includes updated component names (Enhanced Security Monitoring was changed to Physical Security Monitoring and Consequence Management was changed to Water Contamination Response), an updated version of Figure 1.1 that reflects the component name changes and includes the Advanced Metering Infrastructure component, an updated Glossary, updated target capabilities, and updated links to external resources. “Enhanced” was replaced with “Physical” in this document to avoid any implication of a baseline standard, and better describe the type of security. Questions concerning this document should be addressed to [email protected] or the following contacts: Nelson Mix U.S.
  • Standards for Building Materials, Equipment and Systems Used in Detention and Correctional Facilities

    Standards for Building Materials, Equipment and Systems Used in Detention and Correctional Facilities

    NATIONAL INSTITUTE OF STANDARDS & TECHNOLOGY Research Information Center Gaithersburg, MD 20890 PUBLICATIONS NBSIR 87-3687 Standards for Building Materials, Equipment and Systems Used in Detention and Correctional Facilities Robert D. Dikkers Belinda C. Reeder U.S. DEPARTMENT OF COMMERCE National Bureau of Standards National Engineering Laboratory Center for Building Technology Building Environment Division Gaithersburg, MD 20899 November 1987 Prepared for: -QC ment of Justice 100 ititute of Corrections i, DC 20534 . U56 87-3687 1987 C . 2 Research Information Center National Bureau of Standards Gaithersburg, Maryland NBSIR 87-3687 20899 STANDARDS FOR BUILDING MATERIALS, EQUIPMENT AND SYSTEMS USED IN u - DETENTION AND CORRECTIONAL FACILITIES Robert D. Dikkers Belinda C. Reeder U.S. DEPARTMENT OF COMMERCE National Bureau of Standards National Engineering Laboratory Center for Building Technology Building Environment Division Gaithersburg, MD 20899 November 1987 Prepared for: U.S. Department of Justice National Institute of Corrections Washington, DC 20534 U.S. DEPARTMENT OF COMMERCE, C. William Verity, Secretary NATIONAL BUREAU OF STANDARDS, Ernest Ambler, Director TABLE OF CONTENTS Page Preface . vi Acknowledgements vii Executive Summary ix I . INTRODUCTION 1 A. Background , 1 B. Objectives and Scope of NBS Study 3 II. FACILITY DESIGN AND CONSTRUCTION 6 A. Facility Development Process 6 1 . Needs Assessment ........................................ 6 2 . Master Plan 6 3 . Mission Statement . 6 4. Architectural Program 7 5. Schematic Design and Design Development 7 6 . Construction 9 B. Security Levels 10 C . ACA S tandar ds 13 . III MATERIALS , EQUIPMENT AND SYSTEMS .... 14 A. Introduction 14 B. Performance Problems 15 C. Available Standards/Guide Specifications 20 iii TABLE OF CONTENTS (continued) 5 Page D« Perimeter Systems 21 1 .
  • Physical Access Control Systems (PACS) Customer Ordering Guide

    Physical Access Control Systems (PACS) Customer Ordering Guide

    Physical Access Control Systems (PACS) Customer Ordering Guide Revised January 2017 1 Physical Access Control Systems (PACS) Customer Ordering Guide Table of Contents Purpose ...................................................................................................................3 Background .............................................................................................................3 Recent Policy Announcements ...............................................................................4 What is PACS? .......................................................................................................5 As an end-user agency, where do I start and what steps are involved? ................. 7 Where do I purchase PACS Solutions from GSA? ..............................................10 How do I purchase a PACS Solution using GSA eBuy? .....................................11 Frequently Asked Questions (FAQs) ...................................................................12 GSA Points of Contact for PACS .........................................................................15 Reference Documents ...........................................................................................16 Sample Statement of Work (SOW) ......................................................................18 2 Physical Access Control Systems (PACS) Customer Ordering Guide Purpose The purpose of this document is to create a comprehensive ordering guide that assists ordering agencies, particularly contracting officers, to
  • HIPAA Security Standards: Physical Safeguards

    HIPAA Security Standards: Physical Safeguards

    Security SERIES HIPAA Security 3 Security Standards: Physical Safeguards Topics What is the Security Series? 1. The security series of papers will provide guidance from the Centers for Security 101 for Medicare & Medicaid Services (CMS) on the rule titled “Security Standards Covered Entities for the Protection of Electronic Protected Health Information,” found at 45 CFR Part 160 and Part 164, Subparts A and C. This rule, commonly known 2. as the Security Rule, was adopted to implement provisions of the Health Security Standards Insurance Portability and Accountability Act of 1996 (HIPAA). The series - Administrative will contain seven papers, each focused on a specific topic related to the Safeguards Security Rule. The papers, which cover the topics listed to the left, are designed to give HIPAA covered entities 3. insight into the Security Rule, and Compliance Deadlines assistance with implementation of the No later than April 20, 2005 Security for all covered entities except Standards security standards. This series aims to small health plans which have - Physical explain specific requirements, the thought Safeguards until no later than April 20, process behind those requirements, and 2006. 4. possible ways to address the provisions. Security Standards - Technical CMS recommends that covered entities read the first paper in this series, Safeguards “Security 101 for Covered Entities” before reading the other papers. The first paper clarifies important Security Rule concepts that will help covered entities as they plan for implementation. This third paper in the series is 5. devoted to the standards for Physical Safeguards and their implementation Security Standards - Organizational, specifications and assumes the reader has a basic understanding of the Policies and Security Rule.
  • How to Manage Physical Security Risk

    How to Manage Physical Security Risk

    How to Manage Physical Security Risk Table of Contents Introduction ........................................................................................................................................................3 What Is Physical Security Exactly? ...........................................................................................................4 Components of Physical Security ..............................................................................................................5 The Importance Of Physical Security ......................................................................................................5 How Physical Security Helps To Ensure Digital Safety ...................................................................7 The Most Common Physical Security Threats ....................................................................................9 How To Mitigate Physical Security Threats ...................................................................................... 10 Top Tips To Maintain Physical Security At Your Workplace .................................................... 12 Final Words....................................................................................................................................................... 14 Introduction Digital security has become the watchword of the day. As we step into the new decade, the world is visibly dependent on IT infrastructure for carrying out everyday business operations. Be it monetary transactions or information exchange,
  • Cyber Security and Cloud Video Surveillance

    Cyber Security and Cloud Video Surveillance

    CYBER SECURITY WHITE PAPER Page 1 of 14 Cyber Security and Cloud Video Surveillance Eagle Eye Networks | 4611 Bee Caves Rd, #200 | Austin, TX 78746 www.een.com | +1-512-473-0500 | [email protected] CYBER SECURITY WHITE PAPER Page 2 of 14 This paper explains why video surveillance system security can and should be more fully addressed within the industry, so that cyber security is not left as a problem for installers or customers to solve. Eagle Eye Networks is a leader in this respect, mitigating security concerns from the point of product research, development and deployment. Introduction Figure 1. Timeline: escalating cyber attacks on security video cameras and DVRs. Today’s networked video surveillance systems are vulnerable in many ways, and their cameras have been weaponiZed by hackers to create massive Distributed Denial of Service (DDoS) attacks on targeted systems. Figure 1 presents a timeline of recent cyber attacks and threats affecting Internet-connected security cameras and digital video recorders (DVRs). Securing today’s networked video systems can be a complex and difficult technical challenge. However, especially for small and medium siZe businesses, it doesn’t have to be that way. Video systems and equipment can be purpose-built to constitute a pre- hardened and more easily securable system, in contrast to the current installed base of networked video technology. In September of 2016, a large French web-hosting provider reported a record-breaking 1-terabit-per- second DDoS attack against their web servers, unleashed by a collection of more than 145 thousand hacked Internet-connected video cameras and digital video recorders.
  • Physical Security Models, Philosophies, and Context

    Physical Security Models, Philosophies, and Context

    Journal of International Information Management Volume 10 Issue 2 Article 9 2001 Physical security models, philosophies, and context Karen A. Forcht James Madison University S. E. Kruck James Madison University Follow this and additional works at: https://scholarworks.lib.csusb.edu/jiim Part of the Management Information Systems Commons Recommended Citation Forcht, Karen A. and Kruck, S. E. (2001) "Physical security models, philosophies, and context," Journal of International Information Management: Vol. 10 : Iss. 2 , Article 9. Available at: https://scholarworks.lib.csusb.edu/jiim/vol10/iss2/9 This Article is brought to you for free and open access by CSUSB ScholarWorks. It has been accepted for inclusion in Journal of International Information Management by an authorized editor of CSUSB ScholarWorks. For more information, please contact [email protected]. Forcht and Kruck: Physical security models, philosophies, and context Physical Security Journal of International Information Manasement Physical security models, philosophies, and context Karen A. Forcht S. E. Krnck James Madison University ABSTRACT This paper presents physical security of a computer facility within the context of a corpo­ rate environment. The context is established from several different perspectives. It first presents physical security philosophies and illustrates the philosophies via the Onion and Garlic Mod­ els. It defines a process for identifying and describing transition strategies between security levels. Once the models are defined, a Macro View of physical security is presented. This view discusses physical security goals and critical factors such as budget, monitoring and redun­ dancy. With this context established, the Micro View is presented. Its focus is on information technology (IT) facilities that protect centralized or clustered IT resources.
  • AR 190-13 the Army Physical Security Program

    AR 190-13 the Army Physical Security Program

    Army Regulation 190–13 Military Police The Army Physical Security Program Headquarters Department of the Army Washington, DC 30 September 1993 Unclassified SUMMARY of CHANGE AR 190–13 The Army Physical Security Program This revision- o Consolidates AR 190-13 and AR 15-15, Department of the Army Physical Security Review Board (DAPSRB), and incorporates policy on the purpose, function, composition of the DAPSRB (chap 7). o Addresses command responsibility for a crime prevention program (para 2-2). o Revises DA Form 4261 and DA Form 4261-1 (Physical Security Inspector Identification Card) (paras 3-1 and 3-2). o Redesignates site surveys as security engineering surveys. Modifies Physical Security Equipment Management Program objectives (para 2-14). o Identifies the establishment, purpose, functions, and composition of the Department of the Army (DA) Physical Security Equipment Action Group (PSEAG) (para 4-4). o Redesignates the Product Manager for Physical Security Equipment (PM-PSE) to the Physical Security Equipment Manager, Physical Security Equipment Management Office (PSEMO) (para 4-5). o Adds an outline of the establishment and specific functions of the Physical Security Equipment Working Group (para 4-6). o Addresses intrusion detection systems (IDS) by: revising the priority for installation of IDS based on the level of security needed (para 4-9); discussing planning for IDS (para 4-15); establishing new priorities and priority codes for the IDS (table 4-1). o Outlines security force procedures, inspections, and security patrol plans (chap 8). o Authorizes exact replication of any Department of the Army and Department of Defense forms that are prescribed in this regulation and are generated by the automated Military Police Management Information System in place of the official printed version of the forms (app A).
  • Responding to IT Security Audits: Improving Data Security Practices

    Responding to IT Security Audits: Improving Data Security Practices

    For more information please visit the Privacy Technical Assistance Center: https://studentprivacy.ed.gov Responding to IT Security Audits: Improving Data Security Practices Overview The U.S. Department of Education established the Privacy Technical Assistance Center (PTAC) as a “one- stop” resource for education stakeholders to learn about data privacy, confidentiality, and security practices related to student-level longitudinal data systems. PTAC provides timely information and updated guidance on privacy, confidentiality, and security practices through a variety of resources, including training materials and opportunities to receive direct assistance with privacy, security, and confidentiality of longitudinal data systems. More PTAC information is available on https://studentprivacy.ed.gov. Purpose Information Technology (IT) audits can help organizations identify critical gaps in data security and reduce the threat of security compromises. This issue brief explains what audits are and how they can be used to improve data security. It also provides recommended steps for developing an effective audit response plan, which is a detailed, point-by-point plan for addressing security concerns uncovered by an audit. Recommendations relate to collaborating with auditors to confirm understanding of an audit report, prioritizing audit findings, and determining corrective actions and implementation schedules. The recommendations included in this brief are intended to help educational organizations maximize the value of IT audits and improve data security. Examples of appropriate responses to audit findings are included in the appendix. What is an IT security audit and how can it benefit an education organization? An IT security audit is an assessment of an information system’s security architecture and processes, as well as all related policies and procedures for managing data in a secure manner.
  • Certification Programs Eligible for ASIS CPE Credit

    Certification Programs Eligible for ASIS CPE Credit

    Certification Programs Eligible for ASIS CPE Credit If you achieved any of the following certifications during your three-year certification cycle, you will earn 20 CPEs. The list below shows the eligible certfication programs and the ASIS designation for which you can claim the credits. Revised April 2021 Designation Full Name of Designation Organization CPP PCI PSP APP CPP Domain PCI Domain PSP Domain APP Domain IAEM - International Association of Emergency AEM Associate Emergency Manager Y N N Y Crisis Management Response Management Managers Application/Design/I AHC Architectural Hardware Consultant DHI - The Door and Hardware Institute Y N Y Y Physical Security ntegration of Security Fundamentals Physical Security APC Adjudicator Professional Certification Center for Development of Security Excellence Y Y N Y Personnel Security Case Management Security Fundamentals Business Principles Physical Security ARM Associate in Risk Mgmt. The Institutes Y N Y Y Risk Management and Practices Assessment Physical Security ARM-E Associate in Risk Mgmt.-ERM The Institutes Y N Y Y Crisis Management Risk Management Assessment Physical Security ARM-P Associate in Risk Mgmt. for Public Entities The Institutes Y N Y Y Crisis Management Risk Management Assessment Security Principles ASP Assoc.
  • Physical Access Control

    Physical Access Control

    Physical Access Control 11/14/2019 Report #: 201911141000 Agenda • Overview • Physical Access Control • Common Applications • Physical Threats to Data • Attack Scenario • Physical Access Control Systems (PACS) • Healthcare Impacts • GhostExodus • Internet-of-Things (IoT) Devices • Crime Prevention Through Environmental Design (CPTED) • Environmental Threats Slides Key: • Security Assessment Non-Technical: managerial, strategic • Supplemental Guidance and high-level (general audience) Technical: Tactical / IOCs; requiring in-depth knowledge (sysadmins, IRT) TLP: WHITE, ID# 201911141000 2 Overview • The protection of physical computer systems, organizational assets, infrastructure, and personnel are all under the scope of physical security • Physical security represents a part of an overall cybersecurity approach that is just as important as technical elements. • Physical access control incorporates numerous capabilities to prevent, detect, or correct unwanted intrusions into an organization. • Using simple techniques such as theft or accessing an on-site workstation, cybercriminals can potentially steal private data residing on enterprise systems. • Physical access control systems which are commonly used to secure businesses, have commonly seen risks associated with the integrated technology. • In healthcare, the rise of IoT systems vulnerable to proximity-based attacks highlights the need for physical security standards. • A number of examples of physical security impacts to healthcare systems exist, including multiple instances of computer theft per year, and highly sophisticated attacks done in close proximity to medical devices. • Similar to auditing computer systems and networks in an organization, a physical assessment of an organization’s physical security can identify risk areas in which to incorporate best practices. TLP: WHITE, ID# 201911141000 3 Physical Access Control • Physical Access Control (Physical Security Control) – focuses on the physical protection of information, buildings, personnel, installations, and other resources.
  • Physical Security Best Practices for the Protection of Risk-Significant Radioactive Material

    Physical Security Best Practices for the Protection of Risk-Significant Radioactive Material

    NUREG-2166 Physical Security Best Practices for the Protection of Risk-Significant Radioactive Material Office of Federal and State Materials and Environmental Management Programs AVAILABILITY OF REFERENCE MATERIALS IN NRC PUBLICATIONS NRC Reference Material Non-NRC Reference Material As of November 1999, you may electronically access Documents available from public and special technical NUREG-series publications and other NRC records at libraries include all open literature items, such as books, NRC’s Public Electronic Reading Room at journal articles, transactions, Federal Register notices, http://www.nrc.gov/reading-rm.html. Publicly released Federal and State legislation, and congressional reports. records include, to name a few, NUREG-series Such documents as theses, dissertations, foreign reports publications; Federal Register notices; applicant, and translations, and non-NRC conference proceedings licensee, and vendor documents and correspondence; may be purchased from their sponsoring organization. NRC correspondence and internal memoranda; bulletins and information notices; inspection and investigative Copies of industry codes and standards used in a reports; licensee event reports; and Commission papers substantive manner in the NRC regulatory process are and their attachments. maintained at— The NRC Technical Library NRC publications in the NUREG series, NRC Two White Flint North regulations, and Title 10, “Energy,” in the Code of 11545 Rockville Pike Federal Regulations may also be purchased from one Rockville, MD 20852–2738 of these two sources. 1. The Superintendent of Documents These standards are available in the library for reference U.S. Government Printing Office use by the public. Codes and standards are usually Mail Stop SSOP copyrighted and may be purchased from the originating Washington, DC 20402–0001 organization or, if they are American National Standards, Internet: bookstore.gpo.gov from— Telephone: 202-512-1800 American National Standards Institute nd Fax: 202-512-2250 11 West 42 Street 2.