Preface |
|
xiii | |
Acknowledgements |
|
xv | |
Introduction |
|
xvii | |
|
Physical Security Overview |
|
|
1 | (18) |
|
Why Physical Security Is Important |
|
|
2 | (1) |
|
The Relationship Between Physical and Cyber Security |
|
|
3 | (1) |
|
Guard Against Disgruntled Employees and Angry Former Employees |
|
|
4 | (1) |
|
How Activists and Corporate Foes Can Hurt You |
|
|
5 | (1) |
|
Vandals Who Damage for Fun |
|
|
6 | (1) |
|
Saboteurs Who Work for Profit |
|
|
7 | (2) |
|
Thieves and Spies Are Everywhere |
|
|
9 | (1) |
|
Domestic Terrorists Are Still a Threat |
|
|
10 | (2) |
|
International Terrorist Are a Growing Threat |
|
|
12 | (2) |
|
Physical Security for Natural Disasters |
|
|
14 | (1) |
|
Physical Security for Random Incidents |
|
|
15 | (1) |
|
Action Steps to Improve Physical IT Security |
|
|
16 | (3) |
|
Establishing a Physical IT Security Function |
|
|
19 | (16) |
|
Organizational Placement of the IT Physical Security Function |
|
|
20 | (2) |
|
Interdepartmental Relationships for Physical Security |
|
|
22 | (1) |
|
Evaluating Financial Resources |
|
|
23 | (1) |
|
The Role of Corporate Security |
|
|
24 | (1) |
|
|
25 | (1) |
|
The Role of Network Security |
|
|
26 | (1) |
|
Relationships with Law Enforcement |
|
|
27 | (2) |
|
Relationships with Private Security Providers |
|
|
29 | (1) |
|
Establishing and Utilizing an Alert System |
|
|
30 | (2) |
|
Action Steps to Improve Physical IT Security |
|
|
32 | (3) |
|
Developing an IT Physical Security Plan |
|
|
35 | (16) |
|
Overview of the Planning Process |
|
|
36 | (2) |
|
Developing the IT Physical Security Plan |
|
|
38 | (1) |
|
Utilizing Existing Risk Exposure Analysis |
|
|
39 | (1) |
|
Integrating Physical IT Security and Cyber Security Planning |
|
|
40 | (1) |
|
Integrating Physical IT Security and Disaster Recovery Planning |
|
|
41 | (1) |
|
Integrating Physical IT Security and Business Continuity Planning |
|
|
42 | (1) |
|
Working with Your Insurance Company |
|
|
43 | (1) |
|
Evaluating Regulatory Requirements |
|
|
44 | (4) |
|
Action Steps to Improve Physical IT Security |
|
|
48 | (3) |
|
Major Elements of a Physical IT Security Plan |
|
|
51 | (16) |
|
Overview and Mission Statement |
|
|
54 | (1) |
|
Organizational Responsibilities |
|
|
54 | (1) |
|
|
55 | (1) |
|
|
56 | (1) |
|
Security Procedures for Data Centers |
|
|
56 | (2) |
|
Security Procedures for Wiring and Cabling |
|
|
58 | (1) |
|
Security Procedures for Remote Computers |
|
|
59 | (1) |
|
Security Procedures for Desktops |
|
|
60 | (1) |
|
Security Procedures for Department-Based Servers |
|
|
61 | (1) |
|
Security Procedures for Telecom and Datacom Equipment |
|
|
62 | (1) |
|
Security Procedures for Manufacturing Control Equipment |
|
|
63 | (1) |
|
Security Procedures for Surveillance and Alarm Systems |
|
|
64 | (1) |
|
Action Steps to Improve Physical IT Security |
|
|
65 | (2) |
|
Developing and Documenting Methods and Procedures |
|
|
67 | (12) |
|
The Process of Developing Methods and Procedures |
|
|
68 | (1) |
|
Devising a Format for Documenting Procedures |
|
|
69 | (1) |
|
Physical Security Procedures for Data Centers |
|
|
70 | (1) |
|
Physical Security Procedures for Wiring and Cabling |
|
|
71 | (1) |
|
Physical Security Procedures for Remote Computers |
|
|
72 | (1) |
|
Physical Security Procedures for Desktops |
|
|
72 | (1) |
|
Physical Security Procedures for Department-Based Servers |
|
|
73 | (1) |
|
Physical Security Procedures for Telecom and Datacom Equipment |
|
|
74 | (1) |
|
Physical Security Procedures for Manufacturing Control Equipment |
|
|
75 | (1) |
|
Physical Security Procedures for Surveillance and Alarm Systems |
|
|
76 | (1) |
|
Action Steps to Improve Physical IT Security |
|
|
77 | (2) |
|
Auditing and Testing Procedures |
|
|
79 | (16) |
|
How to Audit and Test Procedures |
|
|
79 | (3) |
|
Auditing and Testing for Data Centers |
|
|
82 | (3) |
|
Auditing and Testing Wiring and Cabling Security |
|
|
85 | (1) |
|
Auditing and Testing Remote Computer Procedures |
|
|
86 | (1) |
|
Auditing and Testing Desktop Procedures |
|
|
87 | (1) |
|
Auditing and Testing Procedures for Department-Based Servers |
|
|
88 | (1) |
|
Auditing and Testing Telecom and Datacom Equipment Security |
|
|
89 | (1) |
|
Auditing and Testing Manufacturing Control Equipment Security |
|
|
90 | (1) |
|
Auditing and Testing in Surveillance and Alarm System Security |
|
|
91 | (1) |
|
Action Steps to Improve Physical IT Security |
|
|
92 | (3) |
|
The Role of the Incident Response Team |
|
|
95 | (22) |
|
|
97 | (2) |
|
|
99 | (1) |
|
Mobilizing the Response Team |
|
|
99 | (1) |
|
|
100 | (1) |
|
|
101 | (1) |
|
The Preservation of Evidence |
|
|
102 | (1) |
|
When to Call Law Enforcement |
|
|
103 | (1) |
|
Returning to Normal Operations |
|
|
104 | (1) |
|
Analyzing Lessons Learned |
|
|
105 | (2) |
|
The Role of the Incident Response Team During Disasters |
|
|
107 | (6) |
|
Action Steps to Improve Physical IT Security |
|
|
113 | (4) |
|
Model Training Program for Organization Staff |
|
|
117 | (26) |
|
Training for IT and Security Professionals |
|
|
118 | (1) |
|
|
119 | (1) |
|
Building Awareness About Physical Security for IT Assets |
|
|
120 | (4) |
|
Testing and Evaluating the Module |
|
|
123 | (1) |
|
How to Identify Potential Threats and Vulnerabilities |
|
|
124 | (11) |
|
Slides for Disgruntled and Angry Former Employees |
|
|
125 | (1) |
|
Slides for Social and Political Activists |
|
|
126 | (1) |
|
Slides for Random Vandals |
|
|
126 | (1) |
|
Slides for Professional Saboteurs |
|
|
127 | (1) |
|
Slides for Thieves and Spies |
|
|
128 | (1) |
|
Slides for Domestic and International Terrorists |
|
|
129 | (1) |
|
Slides for Natural Disasters |
|
|
130 | (1) |
|
Slides for Data Center Security |
|
|
131 | (1) |
|
Slides for Wiring and Cabling |
|
|
131 | (1) |
|
Slides for Remote and Mobile Computing |
|
|
132 | (1) |
|
Slides for Desktop Computers |
|
|
132 | (1) |
|
Slides for Department-Based Servers |
|
|
133 | (1) |
|
Slides for Telecom and Datacom Equipment |
|
|
133 | (1) |
|
Testing and Evaluating the Module |
|
|
134 | (1) |
|
Reporting Suspicious Behavior or Security Violations |
|
|
135 | (1) |
|
Testing and Evaluating the Module |
|
|
136 | (1) |
|
What to Expect from Different Departments |
|
|
136 | (2) |
|
Testing and Evaluating the Module |
|
|
137 | (1) |
|
How the Internal Alert System Works |
|
|
138 | (1) |
|
Testing and Evaluating the Module |
|
|
139 | (1) |
|
Performing the Administrative Aspects of a Training Program |
|
|
139 | (1) |
|
Action Steps to Improve Physical IT Security |
|
|
140 | (3) |
|
The Future of Physical Security for IT Assets |
|
|
143 | (26) |
|
The Impact of National Security Plans |
|
|
144 | (10) |
|
|
154 | (14) |
|
|
157 | (1) |
|
The Electricity Sector ISAC |
|
|
158 | (1) |
|
|
159 | (1) |
|
The Financial Sector ISAC |
|
|
160 | (1) |
|
|
161 | (1) |
|
|
161 | (1) |
|
The Information Technology ISAC |
|
|
162 | (1) |
|
The Telecommunications ISAC |
|
|
163 | (3) |
|
|
166 | (1) |
|
|
167 | (1) |
|
Action Steps to Improve Physical IT Security |
|
|
168 | (1) |
Appendix A: Physical Computer Security Resources |
|
169 | (8) |
Appendix B: Physical Security Glossary and Acronyms |
|
177 | (14) |
Appendix C: Action Step Checklists |
|
191 | (8) |
Appendix D: Physical Security Planning Checklists |
|
199 | (18) |
Index |
|
217 | |