Is Two Marks
Is Two Marks
COM
Unit 1
• The protection of information and its critical elements, including the systems and hardware that
use, store, and transmit that information
• Tools, such as policy, awareness, training, education, and technology are necessary
2. What is C.I.A?
The C.I.A. triangle was the standard based on confidentiality, integrity, and availability. The
C.I.A. triangle has expanded into a list of critical characteristics of information
Computer security began immediately after the first mainframes were developed
Groups developing code-breaking computations during World War II created the first modern
computers
Physical controls were needed to limit access to authorized personnel to sensitive military
locations
Only rudimentary controls were available to defend against physical theft, espionage, and
sabotage
Information Security began with Rand Corporation Report R-609, The Rand Report was the first
widely recognized published document to identify the role of management and policy issues in
computer security.
WWW.VIDYARTHIPLUS.COM V+ TEAM
WWW.VIDYARTHIPLUS.COM
6. What is Security?
Physical Security – to protect physical items, objects or areas of organization from unauthorized
access and misuse
Personal Security involves protection of individuals or group of individuals who are authorized
to access the organization and its operations
Operations security focuses on the protection of the details of particular operations or series of
activities.
WWW.VIDYARTHIPLUS.COM V+ TEAM
WWW.VIDYARTHIPLUS.COM
Information security – is the protection of information and its critical elements, including the
systems and hardware that use ,store, and transmit the information
Availability
Accuracy
Authenticity
Confidentiality
Integrity
Utility
Possession
This refers to “The National Security Telecommunications and Information Systems Security
Committee” document. This document presents a comprehensive model for information security.
The model consists of three dimensions
An Information System (IS) is much more than computer hardware; it is the entire set of
software, hardware, data, people, and procedures necessary to use information as a resource in
the organization
• To achieve balance, the level of security must allow reasonable access, yet protect against
threats
17. What are the approaches used for implementing information security?
Bottom Up Approach
Top-down Approach
• Information security must be managed in a manner similar to any other major system
implemented in the organization
• Using a methodology
• The same phases used in the traditional SDLC adapted to support the specialized
implementation of a security project
WWW.VIDYARTHIPLUS.COM V+ TEAM
WWW.VIDYARTHIPLUS.COM
• The SecSDLC is a coherent program rather than a series of random, seemingly unconnected
actions
• Security begins and ends with the people that interact with the system
• Security administrators can greatly reduce the levels of risk caused by end users, and create
more acceptable and supportable security profiles
22. What are the information security roles to be played by various professionals in a typical
organization?
– The champion
– Security professionals
– Systems administrators
– End users
23. What are the three types of data ownership and their responsibilities?
WWW.VIDYARTHIPLUS.COM V+ TEAM
WWW.VIDYARTHIPLUS.COM
• Data Owner - responsible for the security and use of a particular set of information
• Data Custodian - responsible for the storage, maintenance, and protection of the information
• Data Users - the end systems users who work with the information to perform their daily jobs
supporting the mission of the organization
A threat is a category of objects, persons or other entities that pose a potential danger to an asset.
Threats are always present. A threat agent is a specific instance or component of a threat.
(For example All hackers in the world are a collective threat Kevin Mitnick,who was convicted
for hacking into phone systems was a threat agent.)
The exposure of an information system is a single instance when the system is open to damage.
Weakness or faults in a system expose information or protection mechanism that expose
information to attack or damage or known as vulnerabilities.
WWW.VIDYARTHIPLUS.COM V+ TEAM
WWW.VIDYARTHIPLUS.COM
The security blue print is the plan for the implementation of new security measures in the
organization. Sometimes called a framework,the blue print presents an organized approach to the
security planning process.
MULTICS was an operating system ,now obsolete. MULTICS is noewothy because it was the
first and only OS created with security as its primary goal. It was a mainframe ,time-sharing OS
developed in mid – 1960s by a consortium from GE,Bell Labs,and MIT.
26)What is ARPANET?
Information is authentic when the contents are original as it was created,palced or stored or
transmitted.The information you receive as e-mail may not be authentic when its contents are
modified what is known as E-mail spoofing.
WWW.VIDYARTHIPLUS.COM V+ TEAM
WWW.VIDYARTHIPLUS.COM
Unit 2
1) What are the four important functions, the information security performs in an organization?
A threat is an object, person, or other entity that represents a constant danger to an asset
Management must be informed of the various kinds of threats facing the organization
By examining each threat category in turn, management effectively protects its information
through policy, education and training, and technology controls
o Inexperience
o Improper training
o Incorrect assumptions
o Other circumstances
WWW.VIDYARTHIPLUS.COM V+ TEAM
WWW.VIDYARTHIPLUS.COM
Much human error or failure can be prevented with training and ongoing awareness activities,but
also with controls,ranging from simple procedures like asking users to type a critical command
twice,to more complex procedures ,such as the verification of the commands by a second
party(Eg key recovery actions in PKI systems)
Intellectual property is “the ownership of ideas and control over the tangible or virtual
representation of those ideas” . Many organizations are in business to create intellectual property
o trade secrets
o copyrights
o trademarks
o patents
Enforcement of copyright has been attempted with technical security mechanisms,such as using
digital watermarks and embedded code.The most common reminder of the individual’s
obligation to fair and responsible use is the license agreement window that usually pops up
during the installation of a new software.
o Shoulder surfing can occur any place a person is accessing confidential information
Hackers uses skill, guile, or fraud to steal the property of someone else
WWW.VIDYARTHIPLUS.COM V+ TEAM
WWW.VIDYARTHIPLUS.COM
The classic perpetrator of deliberate acts of espionage or trespass is the hacker. Hackers are
“people who use and create computer software [to] gain access to information illegally”.
Generally two skill levels among hackers:
o Expert hacker
Extortion found in credit card number theft(A Russian hacker named Maxus,who hacked the
online vendor and stole everal hundred thousand credit card numbers.
• Individual or group who want to deliberately sabotage the operations of a computer system or
business, or perform acts of vandalism to either destroy an asset or damage the image of the
organization
• Organizations rely on image so Web defacing can lead to dropping consumer confidence and
sales
• Rising threat of hacktivist or cyber-activist operations – the most extreme version is cyber-
terrorism
An example was defacement of NATO web pages during the war in Kosovo.
WWW.VIDYARTHIPLUS.COM V+ TEAM
WWW.VIDYARTHIPLUS.COM
• The value of information suffers when it is copied and taken away without the owner’s
knowledge
• Physical theft can be controlled - a wide variety of measures used from locked doors to guards
or alarm systems
• Electronic theft is a more complex problem to manage and control - organizations may not
even know it has occurred
When an individual or group designs software to attack systems, they create malicious
code/software called malware
Includes:
o macro virus
o boot virus
o worms
o Trojan horses
o logic bombs
o denial-of-service attacks
o polymorphic
o hoaxes
WWW.VIDYARTHIPLUS.COM V+ TEAM
WWW.VIDYARTHIPLUS.COM
Forces of nature, force majeure, or acts of God are dangerous because they are unexpected and
can occur with very little warning
Can disrupt not only the lives of individuals, but also the storage, transmission, and use of
information
Include fire, flood, earthquake, and lightning as well as volcanic eruption and insect
infestation
Since it is not possible to avoid many of these threats, management must implement controls
to limit damage and also prepare contingency plans for continued operations
These defects can cause the system to perform outside of expected parameters, resulting in
unreliable service or lack of availability
Some errors are terminal, in that they result in the unrecoverable loss of the equipment
Some errors are intermittent, in that they only periodically manifest themselves, resulting in
faults that are not easily repeated
This category of threats comes from purchasing software with unrevealed faults
Large quantities of computer code are written, debugged, published, and sold only to
determine that not all bugs were resolved
Sometimes, unique combinations of certain software and hardware reveal new bugs
WWW.VIDYARTHIPLUS.COM V+ TEAM
WWW.VIDYARTHIPLUS.COM
Sometimes, these items aren’t errors, but are purposeful shortcuts left by programmers for
honest or dishonest reasons
Management must recognize that when technology becomes outdated, there is a risk of loss of
data integrity to threats and attacks
Ideally, proper planning by management should prevent the risks from technology obsolesce,
but when obsolescence is identified, management must take action
o A vulnerability is an identified weakness of a controlled system whose controls are not present
or are no longer effective
o An attack is then the use of an exploit to achieve the compromise of a controlled system
This kind of attack includes the execution of viruses, worms, Trojan horses, and active web
scripts with the intent to destroy or steal information. The state of the art in attacking systems in
2002 is the multi-vector worm using up to six attack vectors to exploit a variety of vulnerabilities
in commonly found information system devices
WWW.VIDYARTHIPLUS.COM V+ TEAM
WWW.VIDYARTHIPLUS.COM
Virus - Each infected machine infects certain common executable or script files on all computers
to which it can write with virus code that can cause infection
Hoaxes - A more devious approach to attacking computer systems is the transmission of a virus
hoax, with a real virus attached
DDoS is an attack in which a coordinated stream of requests is launched against a target from
many locations at the same time
Back Doors - Using a known or previously unknown and newly discovered access mechanism,
an attacker can gain access to a system or network resource
The dictionary password attack narrows the field by selecting specific accounts to attack and
uses a list of commonly used passwords (the dictionary) to guide guesses
WWW.VIDYARTHIPLUS.COM V+ TEAM
WWW.VIDYARTHIPLUS.COM
• Web Browsing
• Virus
• Unprotected Shares
• Mass Mail
• SNMP
• Hoaxes
• Back Doors
• Password Crack
• Brute Force
• Dictionary
• Denial of Service
• Distributed DoS
b. so many requests are made that the target system cannot handle them successfully along with
other, legitimate requests for service
It is a technique used to gain unauthorized access whereby the intruder sends messages to a
computer with an IP address indicating that the message is coming from a trusted host
30)Define Man-in-the-Middle
WWW.VIDYARTHIPLUS.COM V+ TEAM
WWW.VIDYARTHIPLUS.COM
Man-in-the-middle is an attacker sniffs packets from the network, modifies them, and inserts
them back into the network
WWW.VIDYARTHIPLUS.COM V+ TEAM
WWW.VIDYARTHIPLUS.COM
UNIT 3
d. Confidentiality
e. Integrity
f. Availability
2. What the roles to be played by the communities of interest to manage the risks an organization
encounters?
It is the responsibility of each community of interest to manage risks; each community has a role
to play:
• Information Security
• Information Technology
• These assets are the targets of various threats and threat agents and our goal is to protect them
from these threats
This iterative process begins with the identification of assets, including all of the elements of an
organization’s system: people, procedures, data and information, software, hardware, and
networking elements
WWW.VIDYARTHIPLUS.COM V+ TEAM
WWW.VIDYARTHIPLUS.COM
• Position name/number/ID
• Supervisor
• Special skills
When deciding which information assets to track, consider including these asset attributes:
• Name
• IP address
• MAC address
• Element type
• Serial number
• Manufacturer name
• Physical location
• Logical location
• Controlling entity
WWW.VIDYARTHIPLUS.COM V+ TEAM
WWW.VIDYARTHIPLUS.COM
• Description
• Intended purpose
• Classification
• Owner/creator/manager
• Online or offline
• Where located
• confidential data
• internal data
• public data
• Informal organizations may have to organize themselves to create a useable data classification
model
• The other side of the data classification scheme is the personnel security clearance structure
WWW.VIDYARTHIPLUS.COM V+ TEAM
WWW.VIDYARTHIPLUS.COM
• Create a weighting for each category based on the answers to the previous questions
• Once each question has been weighted, calculating the importance of each asset is
straightforward
• List the assets in order of importance using a weighted factor analysis worksheet
11. What are the Questions to assist in developing the criteria to be used for asset valuation?
• Which information asset is the most critical to the success of the organization?
• Which information asset would be the most embarrassing or cause the greatest liability if
revealed?
• Information owners are responsible for classifying the information assets for which they are
responsible
• The military uses a five-level classification scheme but most organizations do not need the
detailed level of classification used by the military or federal agencies
WWW.VIDYARTHIPLUS.COM V+ TEAM
WWW.VIDYARTHIPLUS.COM
• The other side of the data classification scheme is the personnel security clearance structure
• Each user of data in the organization is assigned a single level of authorization indicating the
level of classification
• Before an individual is allowed access to a specific set of data, he or she must meet the need-to-
know requirement
• This extra level of protection ensures that the confidentiality of information is properly
maintained
Threat Identification
• Each of the threats identified so far has the potential to attack any of the assets protected
• This will quickly become more complex and overwhelm the ability to plan
• To make this part of the process manageable, each step in the threat identification and
vulnerability identification process is managed separately, and then coordinated at the end of the
process
• Each threat must be further examined to assess its potential to impact organization - this is
referred to as a threat assessment
• To frame the discussion of threat assessment, address each threat with a few questions:
• Which threats present a danger to this organization’s assets in the given environment?
WWW.VIDYARTHIPLUS.COM V+ TEAM
WWW.VIDYARTHIPLUS.COM
16. What are the different threats faced by an information system in an Organization?
• We now face the challenge of reviewing each information asset for each threat it faces and
creating a list of the vulnerabilities that remain viable risks to the organization
• Vulnerabilities are specific avenues that threat agents can exploit to attack an information asset
• Examine how each of the threats that are possible or likely could be perpetrated and list the
organization’s assets and their vulnerabilities
• The process works best when groups of people with diverse backgrounds within the
organization work iteratively in a series of brainstorming sessions
• We can determine the relative risk for each of the vulnerabilities through a process called risk
assessment
• Risk assessment assigns a risk rating or score to each specific information asset, useful in
gauging the relative risk introduced by each vulnerable information asset and making
comparative ratings later in the risk control process
o Likelihood
o Uncertainty
WWW.VIDYARTHIPLUS.COM V+ TEAM
WWW.VIDYARTHIPLUS.COM
• Vulnerability 1 has a likelihood of 1.0 with no current controls and you estimate that
assumptions and data are 90 % accurate
• For each threat and its associated vulnerabilities that have any residual risk, create a
preliminary list of control ideas
• Residual risk is the risk that remains to the information asset even after the existing control has
been applied
• Access controls are those controls that specifically address admission of a user into a trusted
area of the organization
WWW.VIDYARTHIPLUS.COM V+ TEAM
WWW.VIDYARTHIPLUS.COM
• Nondiscretionary Controls
• Role-Based Controls
• Task-Based Controls
• Lattice-based Control
• The goal of this process has been to identify the information assets of the organization that have
specific vulnerabilities and create a list of them, ranked for focus on those most needing
protection first
• In preparing this list we have collected and preserved factual information about the assets, the
threats they face, and the vulnerabilities they experience
Four basic strategies are used to control the risks that result from vulnerabilities:
o Inform themselves of all of the consequences and accept the risk without control or mitigation
(acceptance)
• Avoidance
• Transference
• Mitigation
• Acceptance
WWW.VIDYARTHIPLUS.COM V+ TEAM
WWW.VIDYARTHIPLUS.COM
The actions an organization can perhaps should take while the incident is in progress are
documented in what is known as Incident Response Plan(IRP).
The most common mitigation procedure is Disaster Recovery Plan(DRP). The DRP includes the
entire spectrum of activities used to recover from the incident and strategies to limit losses before
and after the disaster. DRP usually include all preparations for the recovery process, strategies to
limit losses during the disaster.
The BCP is the most strategic and long term of the three plans. It encompasses the continuation
of business activities if a catastrophic event occurs,such as the loss of an entire database,building
or entire operations center. The BCP includes the planning the steps necessary to to ensure the
continuation of the organization when the scope or scale of a disaster exceeds the ability of the
DRP to restore operations.
a. Control Function
b. Architectural Layer
c. Strategy Layer
WWW.VIDYARTHIPLUS.COM V+ TEAM
WWW.VIDYARTHIPLUS.COM
WWW.VIDYARTHIPLUS.COM V+ TEAM
WWW.VIDYARTHIPLUS.COM
Unit 4
1. What is a policy?
• IT security policy
The ISSP:
ACLs regulate:
The Security Blue Print is the basis for Design,Selection and Implementation of Security
Policies,education and training programs,and technology controls.
One of the most widely referenced and often discussed security models is the Information
Technology – Code of Practice for Information Security Management, which was originally
published as British Standard BS 7799
Several countries have not adopted 17799 claiming there are fundamental problems:
o The global information security community has not defined any justification for a code of
practice as identified in the ISO/IEC 17799
o There is no reason to believe that 17799 is more useful than any other approach currently
available
WWW.VIDYARTHIPLUS.COM
o 17799 is perceived to have been hurriedly prepared given the tremendous impact its adoption
could have on industry information security controls
Objectives:
o Personnel Security
o Compliance
10.What is the alternate Security Models available other than ISO 17799/BS 7799?
o Another approach available is described in the many documents available from the Computer
Security Resource Center of the National Institute for Standards and Technology (csrc.nist.gov)
– Including:
o NIST SP 800-14 - Generally Accepted Principles and Practices for Securing IT Systems
WWW.VIDYARTHIPLUS.COM
o NIST SP 800-18 - The Guide for Developing Security Plans for IT Systems
– Risk Management
– Personnel Security
– Physical Security
– Contingency Planning
– Data Integrity
– Documentation
– Audit Trails
The “sphere of protection” overlays each of the levels of the “sphere of use” with a layer of
security, protecting that layer from direct or indirect use through the next layer
The people must become a layer of security, a human firewall that protects the information
from unauthorized access and use
o policies
o technology
o Defense in depth requires that the organization establish sufficient security controls and
safeguards, so that an intruder faces multiple layers of controls
– The point at which an organization’s security protection ends, and the outside world begins is
referred to as the security perimeter
17.What are the key technological components used for security implementation?
o A firewall is a device that selectively discriminates against information flowing into or out of
the organization
WWW.VIDYARTHIPLUS.COM
o The DMZ (demilitarized zone) is a no-man’s land, between the inside and outside networks,
where some organizations place Web servers
o In an effort to detect unauthorized activity within the inner network, or on individual machines,
an organization may wish to implement Intrusion Detection Systems or IDS
SysSPs are frequently codified as standards and procedures used when configuring or
maintaining systems
Access control lists (ACLs) consist of the access control lists, matrices, and capability tables
governing the rights and privileges of a particular user to a particular system
The blueprint should specify the tasks to be accomplished and the order in which they are to be
realized. It should serve as a scaleable,upgradable,and comprehensive paln for the information
security needs for coming years.
Three approaches:
Unit 5
A firewall is any device that prevents a specific type of information from moving between the
untrusted network outside and the trusted network inside
Examines every incoming packet header and selectively filters packets based on
WWW.VIDYARTHIPLUS.COM V+ TEAM
WWW.VIDYARTHIPLUS.COM
The primary disadvantage of application-level firewalls is that they are designed for a specific
protocol and cannot easily be reconfigured to protect against attacks on protocols for which they
are not designed
It keeps track of each network connection established between internal and external systems
using a state table which tracks the state and context of each packet in the conversation by
recording which station sent what packet and when
The primary disadvantage is the additional processing requirements of managing and verifying
packets against the state table, which can possibly expose the system to a DoS attack. These
firewalls can track connectionless packet traffic such as UDP and remote procedure calls (RPC)
traffic
The final form of firewall is the kernel proxy, a specialized form that works under the Windows
NT Executive, which is the kernel of Windows NT. It evaluates packets at multiple layers of the
protocol stack, by checking security in the kernel as data is passed up and down the stack
1) Packet filtering
2) Application gateways
3) Circuit gateways
WWW.VIDYARTHIPLUS.COM V+ TEAM
WWW.VIDYARTHIPLUS.COM
5) Hybrids
The drawback of packet-filtering router includes a lack of auditing and strong authentication
Screened-Host firewall system allows the router to pre-screen packets to minimize the network
traffic and load on the internal proxy
An Application proxy examines an application layer protocol, such as HTTP, and performs the
proxy services
One NIC is connected to the external network, and one is connected to the internal network
With two NICs all traffic must physically go through the firewall to move between the internal
and external networks
WWW.VIDYARTHIPLUS.COM V+ TEAM
WWW.VIDYARTHIPLUS.COM
• Consists of two or more internal bastion-hosts, behind a packet-filtering router, with each host
protecting the trusted network
• The first general model consists of two filtering routers, with one or more dual-homed bastion-
host between them
• The second general model involves the connection from the outside or untrusted network
16) What are the factors to be considered while selecting a right firewall?
o What type of firewall technology offers the right balance of protection features and cost for the
needs of the organization?
o What features are included in the base price? What features are available at extra cost? Are all
cost factors known?
o How easy is it to set up and configure the firewall? How accessible are staff technicians with
the mastery to do it well?
o Can the candidate firewall adapt to the growing network in the target organization?
The SOCKS system is a proprietary circuit-level proxy server that places special SOCKS client-
side agents on each workstation
• The firewall device is always inaccessible directly from the public network
• Allow Simple Mail Transport Protocol (SMTP) data to pass through your firewall, but insure it
is all routed to a well-configured SMTP gateway to filter and route messaging traffic securely
• Block telnet (terminal emulation) access to all internal servers from the public networks
• When Web services are offered outside the firewall, deny HTTP traffic from reaching your
internal networks by using some form of proxy access or DMZ architecture
WWW.VIDYARTHIPLUS.COM V+ TEAM
WWW.VIDYARTHIPLUS.COM
• IDSs require complex configurations to provide the level of detection and response desired
a) Network-based IDS
b) Host-based IDS
c) Application-based IDS
d) Signature-based IDS
WWW.VIDYARTHIPLUS.COM V+ TEAM
WWW.VIDYARTHIPLUS.COM
26.What is LFM?
Log File Monitor(LFM) is an approach to IDS that is similar to NIDS. Using LFm the system
reviews the log files generated by servers,network devices,and wven other IDSs. These systems
look for patterns and signatures in the log files that may indicate an attack or intrusion is in
process or has already succeeded.
Honey pots are decoy systems designed to lure potential attackers away from critical systems and
encourage attacks against the themselves. These systems are created for the sole purpose of
deceiving potential attackers. In Industry they are known as decoys,lures,and fly-traps.
When a collection of honey pots connects several honey pot systems on a subnet,it may be called
a honey net.
WWW.VIDYARTHIPLUS.COM V+ TEAM
WWW.VIDYARTHIPLUS.COM
A Padded Cell is a honey pot that has been protected so that it cannot be easily compromised. In
otherwords,a padded cell is a hardened honey spot..
31.What are the advantages and disadvantages of using honey pot or padded cell approach?
Advantages:
Honey pots may be effective at catching insiders who are snooping around a network.
Disadvantages:
The legal implication of using such devices are not well defined.
Honey pots and Padded cells have not yet been shown to be generally useful security
technologies.
An exper attacker,once diverted into a decoy system,may become angry and launch a hostile
attack againt an organization’s systems
Admins and security managers will need a high level of expertise to use these systems.
One of the preparatory part of the attack protocol is the collection of publicly available
information about a potential target,a process known as footprinting. Footprinting is the
organized research of the Internet addresses owned or controlled by the target organization.
The next phase of the attack protocol is a second intelligence or data-gathering process called
fingerprinting. This is systematic survey of all of the target organization’s Internet
addresses(which are collected during the footprinting phase); the survey is conducted to ascertain
the network services offered by the hostsin that range. Fingerprinting reveals useful information
WWW.VIDYARTHIPLUS.COM V+ TEAM
WWW.VIDYARTHIPLUS.COM
about the internal structure and operational nature of the target system or network for the
anticipated attack.
Vulnerability scanners are capable of scanning networks for very detailed information
As a class, they identify exposed usernames and groups, show open network shares, expose
configuration problems, and other vulnerabilities in servers
A network tool that collects copies of packets from the network and analyzes them
35.What is Cryptography?.
36.What is Cryptoanalysis?
WWW.VIDYARTHIPLUS.COM V+ TEAM
WWW.VIDYARTHIPLUS.COM
Encryption is the process of converting an original message into a form that is unreadable to
unauthorized individuals-that is,to anyone without the tools to convert the encrypted message
back to its original format.
38.Define Decryption
Decryption is the process of converting the cipher text into a message that conveys readily
understood meaning.
Public Key Infrastructure is the entire set of hardware, software, and cryptosystems necessary
to implement public key encryption
PKI systems are based on public-key cryptosystems and include digital certificates and
certificate authorities (CAs) and can:
o Authentication
o Integrity
o Privacy
o Authorization
WWW.VIDYARTHIPLUS.COM V+ TEAM
WWW.VIDYARTHIPLUS.COM
o Nonrepudiation
Encryption cryptosystems have been adapted to inject some degree of security into e-mail:
o S/MIME builds on the Multipurpose Internet Mail Extensions (MIME) encoding format by
adding encryption and authentication
o Privacy Enhanced Mail (PEM) was proposed by the Internet Engineering Task Force (IETF) as
a standard to function with the public key cryptosystems
o PEM uses 3DES symmetric key encryption and RSA for key exchanges and digital signatures
o Pretty Good Privacy (PGP) was developed by Phil Zimmerman and uses the IDEA Cipher
along with RSA for key exchange
Temperature extremes
Gases
Liquids
Living organisms
Projectiles
Movement
Energy anomalies
A secure facility is a physical location that has been engineered with controls designed to
minimize the risk of attacks from physical threats
A secure facility can use the natural terrain; traffic flow, urban development, and can
complement these features with protection mechanisms such as fences, gates, walls, guards, and
alarms
WWW.VIDYARTHIPLUS.COM V+ TEAM
WWW.VIDYARTHIPLUS.COM
Guards
Mantraps
Electronic Monitoring
Computer Rooms
o Works with the CIO on strategic plans, develops tactical plans, and works with security
managers on operational plans
WWW.VIDYARTHIPLUS.COM V+ TEAM