Security Systems Analysis Security Services Copyright Texas Education

  • Slides: 25
Download presentation
Security Systems Analysis Security Services

Security Systems Analysis Security Services

Copyright © Texas Education Agency, 2017. These Materials are copyrighted © and trademarked ™

Copyright © Texas Education Agency, 2017. These Materials are copyrighted © and trademarked ™ as the property of the Texas Education Agency (TEA) and may not be reproduced without the express written permission of TEA, except under the following conditions: 1) Texas public school districts, charter schools, and Education Service Centers may reproduce and use copies of the Materials and Related Materials for the districts’ and schools’ educational use without obtaining permission from TEA. 2) Residents of the state of Texas may reproduce and use copies of the Materials and Related Materials for individual personal use only, without obtaining written permission of TEA. 3) Any portion reproduced must be reproduced in its entirety and remain unedited, unaltered and unchanged in any way. 4) No monetary charge can be made for the reproduced materials or any document containing them; however, a reasonable charge to cover only the cost of reproduction and distribution may be charged. Private entities or persons located in Texas that are not Texas public school districts, Texas Education Service Centers, or Texas charter schools or any entity, whether public or private, educational or non-educational, located outside the state of Texas MUST obtain written approval from TEA and will be required to enter into a license agreement that may involve the payment of a licensing fee or a royalty. For information contact: Office of Copyrights, Trademarks, License Agreements, and Royalties, Texas Education Agency, 1701 N. Congress Ave. , Austin, TX 78701 -1494; phone 512 -463 -7004; email: copyrights@tea. state. tx. us. Copyright © Texas Education Agency, 2017. All rights reserved. 2

Security Awareness > An attitude held by security personnel and non-security client employees that

Security Awareness > An attitude held by security personnel and non-security client employees that places a high value on detecting, deterring, and reporting security exposures such as crime, safety hazards, fire hazards, theft, intrusions, and vandalism > Requires security personnel to protect the client’s employees, property, guests, and image, and assist the client’s personnel and visitors > Requires that non-security client employees be aware of the security program’s goals and methods and support the security program, abiding by its policies Copyright © Texas Education Agency, 2017. All rights reserved. 3

Security Awareness > Founded on the concept of preventative security > The three main

Security Awareness > Founded on the concept of preventative security > The three main security principles • Availability • Integrity • Confidentiality Copyright © Texas Education Agency, 2017. All rights reserved. 4

Physical Security > Two basic duties of performing physical security • Observe • Report

Physical Security > Two basic duties of performing physical security • Observe • Report > Three initial steps taken with a security threat • Identify it • Report it • Discuss and develop a solution that eliminates the problem Copyright © Texas Education Agency, 2017. All rights reserved. 5

Physical Security > Cultivates security awareness among the clients and requires conscientious and highly

Physical Security > Cultivates security awareness among the clients and requires conscientious and highly visible security officers > A priority concern of top-level management of businesses, industries, and institutions > Has the ultimate goal of loss prevention which results in the maximum return on investments Copyright © Texas Education Agency, 2017. All rights reserved. 6

Physical Security > Requires two basic investigative skills • Communication skills • Surveillance capabilities

Physical Security > Requires two basic investigative skills • Communication skills • Surveillance capabilities > Defines the primary hardware systems traditionally with • Locks • Security alarms • Access controls • Surveillance video Copyright © Texas Education Agency, 2017. All rights reserved. 7

Electronic Access Control Systems > Security devices that allow the user and the system

Electronic Access Control Systems > Security devices that allow the user and the system to communicate with each other > These include • Controller • Card reader • Door contacts • Control locking device > Not security alarm systems; the two systems do have a lot in common, but are usually implemented separately Copyright © Texas Education Agency, 2017. All rights reserved. 8

Electronic Access Control Systems > Strategically positioned as a natural focal point for a

Electronic Access Control Systems > Strategically positioned as a natural focal point for a security officer to initiate ownership of the physical security systems, systems that are traditionally supported by facilities personnel > Require access credentials which are used in conjunction with access controls, typically in the form of access cards and card readers > Require communication between the card and the controller using the card data and the reader data stream Copyright © Texas Education Agency, 2017. All rights reserved. 9

Electronic Access Control Systems > Distinct functions of security and access control • Identification

Electronic Access Control Systems > Distinct functions of security and access control • Identification • Authentication • Authorization • Biometrics – based on an individual’s unique characteristics > Most common biometric systems • • • Fingerprint Palm Scan Hand Geometry Iris Scan Signature Dynamics Keyboard Dynamics Voice Print Facial Scan Hand Topography Copyright © Texas Education Agency, 2017. All rights reserved. 10

Electronic Access Control Systems > Access control key points and mechanisms include • Passwords

Electronic Access Control Systems > Access control key points and mechanisms include • Passwords • Passphrase • Cryptographic keys • Centralized access control administration • Preventative administrative controls • Preventative physical controls • Preventative technical controls Copyright © Texas Education Agency, 2017. All rights reserved. 11

Surveillance Systems > Many people continue to rely on old-fashioned security methods such as

Surveillance Systems > Many people continue to rely on old-fashioned security methods such as door and window locks, but it is more practical to invest in surveillance cameras > Surveillance cameras • Currently among the most popular and in-demand security devices • Capable of obtaining 24 -hour steady video Copyright © Texas Education Agency, 2017. All rights reserved. 12

Surveillance Systems > Ideal for industrial and official establishments, and individual homes > Commonly

Surveillance Systems > Ideal for industrial and official establishments, and individual homes > Commonly used for standard property monitoring > Used indoors and outdoors > Used visibly and hidden > Serve a variety of purposes including employee theft and monitoring children (i. e. nanny cams) Copyright © Texas Education Agency, 2017. All rights reserved. 13

Surveillance Systems > Found in various locations including • • • Public highways Parks

Surveillance Systems > Found in various locations including • • • Public highways Parks Vehicles Airplanes Ships > Found in two categories • Hardwired • Effective but can easily accumulate wires • Wireless • Easier to setup, install, and place anywhere • Clutter-free and dependable Copyright © Texas Education Agency, 2017. All rights reserved. 14

Intrusion Detection System (IDS) > A program that monitors a system for malicious activity

Intrusion Detection System (IDS) > A program that monitors a system for malicious activity and in turn reports the activity > Designed to test/analyze network system traffic/events against a given set of parameters and send out an alert or capture data when these thresholds are met > Uses collected information and a predefined knowledge-based systems to reason about the possibility of an intrusion Copyright © Texas Education Agency, 2017. All rights reserved. 15

Intrusion Detection System (IDS) > Detects attacks as soon as possible and takes the

Intrusion Detection System (IDS) > Detects attacks as soon as possible and takes the appropriate action, but does not usually take preventive measures when an attack is detected > Reactive rather than proactive > Configurable to run unattended for extended periods of time > Must recognize unusual activity and operate without unduly affecting the system’s activity Copyright © Texas Education Agency, 2017. All rights reserved. 16

Intrusion Detection System (IDS) > Consists of three components or modules • Event generator

Intrusion Detection System (IDS) > Consists of three components or modules • Event generator • Analysis engine or console • Response manager > Uses various detection approaches • Signature detection • Statistical anomaly detection Copyright © Texas Education Agency, 2017. All rights reserved. 17

Intrusion Detection System (IDS) > Types • Network • Protocol-based • Application protocol-based •

Intrusion Detection System (IDS) > Types • Network • Protocol-based • Application protocol-based • Host-based • Passive • Reactive Copyright © Texas Education Agency, 2017. All rights reserved. 18

Integrated Security Systems > Security services is one of the fastest growing areas of

Integrated Security Systems > Security services is one of the fastest growing areas of integrated building systems > Demand for security services has maintained steady growth since September 11, 2001 > Security systems inherently require an integrated approach, except for local card entry locks > Physical access control is more than the use of a simple lock; instead the lock may be integrated with a biometrics ID system Copyright © Texas Education Agency, 2017. All rights reserved. 19

Integrated Security Systems > A high-resolution digital closed circuit television (CCTV) system permits easy

Integrated Security Systems > A high-resolution digital closed circuit television (CCTV) system permits easy access to stored images and the computer analysis of the images, which aids in decision-making > Once data and control are connected on a communication link, they can easily tie in with other systems > The projected expansion of power over ethernet (Po. E) > The installation of sophisticated access control systems in commercial buildings is a new trend toward systems convergence Copyright © Texas Education Agency, 2017. All rights reserved. 20

Integrated Security Systems > This surveillance system integrates all critical security functions, such as

Integrated Security Systems > This surveillance system integrates all critical security functions, such as alarm, fire, and access systems, allowing the security staff to simultaneously monitor all systems from the centralized security command center > Also has the capability to use specific notification systems that can inform the building occupants of an event/crisis and inform them of the proper reaction Copyright © Texas Education Agency, 2017. All rights reserved. 21

Integrated Security Systems > Design services include • Enterprise systems for local, regional, or

Integrated Security Systems > Design services include • Enterprise systems for local, regional, or global monitoring • Monitoring emergency operations center and fusion center design which manages and shares information between and across operations • Video surveillance systems • Access control systems • IDS • Physical security information management systems • Network design and bandwidth planning • Intercom systems and emergency communications • Door and window selection and hardware coordination • Conduit layouts with security power requirements • Lighting layouts with photometric detail • Design services for new construction and renovations/re-fits Copyright © Texas Education Agency, 2017. All rights reserved. 22

Security Inspection > An important step toward preventing theft, burglary, and other crimes >

Security Inspection > An important step toward preventing theft, burglary, and other crimes > Can indicate features which would make entry easy or difficult for a prospective offender when completed by trained security personnel > Shows how a location’s security can be improved > Requires observation of all entry points to determine what steps can reduce vulnerability > Begins at the front door and then includes the side and rear doors, windows, locks, lights, and landscaping > Used by all professionals in the field of crime prevention, including both security services and law enforcement professionals Copyright © Texas Education Agency, 2017. All rights reserved. 23

Security Inspection > Requires the use of standard inspection forms/checklists that indicate security weaknesses

Security Inspection > Requires the use of standard inspection forms/checklists that indicate security weaknesses and/or hazards that require attention including • Front entrance • Side or rear entrance • Entrances from the garage • Upper floor windows • Garage doors and windows • Basement doors and windows • Ground floor windows • Recommendations and comments Copyright © Texas Education Agency, 2017. All rights reserved. 24

Resources > 0205592406, Introduction to Private Security: Theory Meets Practice, Cliff Roberson and Michael

Resources > 0205592406, Introduction to Private Security: Theory Meets Practice, Cliff Roberson and Michael L. Birzer, Prentice Hall, 2009 > 0750684321, Introduction to Security, Robert J. Fischer and Gion Green, Butterworth-Heinemann, 2008 > Access Control Systems & Methodology, Jeff Smith, Purdue University > Physical Access Control, Terry Martin & Alexandra Bakhto, http: //www. giac. org/cissp-papers/282. pdf > Do an Internet search of the following: security checklist David L. Berger Forensic Consultant > Investigator/Officer’s personal experience Copyright © Texas Education Agency, 2017. All rights reserved. 25