2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet400/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   396   397   398   399   400   401   402   403   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Lighting
Lighting
is a commonly used form of perimeter security control. The primary purpose of 
lighting is to discourage casual intruders, trespassers, prowlers, or would-be thieves who 
would rather perform their misdeeds in the dark. However, lighting is not a strong deter-
rent. It should not be used as the primary or sole protection mechanism except in areas 
with a low threat level.
Lighting should not illuminate the positions of guards, dogs, patrol posts, or other 
similar security elements. It should be combined with guards, dogs, CCTV, or some other 
form of intrusion detection or surveillance mechanism. Lighting must not cause a nuisance 
or problem for nearby residents, roads, railways, airports, and so on. It should also never 
cause glare or reflective distraction to guards, dogs, and monitoring equipment, which 
could otherwise aid attackers during break-in attempts.
It is generally accepted as a de facto standard that lighting used for perimeter protection 
should illuminate critical areas with 2 foot-candles of power. Another common issue for 
the use of lighting is the placement of the lights. Standards seem to indicate that light poles 
should be placed the same distance apart as the diameter of the illuminated area created by 
illumination elements. Thus, if a lighted area is 40 feet in diameter, poles should be 40 feet 
apart.
Security Guards and Dogs
All physical security controls, whether static deterrents or active detection and surveil-
lance mechanisms, ultimately rely on personnel to intervene and stop actual intrusions and 
attacks. Security guards exist to fulfill this need. Guards can be posted around a perimeter 
or inside to monitor access points or watch detection and surveillance monitors. The real 
benefit of guards is that they are able to adapt and react to various conditions or situations. 
Guards can learn and recognize attack and intrusion activities and patterns, can adjust to 
a changing environment, and can make decisions and judgment calls. Security guards are 
often an appropriate security control when immediate situation handling and decision mak-
ing onsite is necessary.
Unfortunately, using security guards is not a perfect solution. There are numerous disad-
vantages to deploying, maintaining, and relying on security guards. Not all environments 
and facilities support security guards. This may be because of actual human incompatibility 
or the layout, design, location, and construction of the facility. Not all security guards are 
themselves reliable. Prescreening, bonding, and training do not guarantee that you won’t 
end up with an ineffective or unreliable security guard.


Implement and Manage Physical Security 
425
Even if a guard is initially reliable, guards are subject to physical injury and illness, take 
vacations, can become distracted, are vulnerable to social engineering, and may become 
unemployable because of substance abuse. In addition, security guards usually offer 
protection only up to the point at which their life is endangered. Additionally, security 
guards are usually unaware of the scope of the operations within a facility and are there-
fore not thoroughly equipped to know how to respond to every situation. Finally, security 
guards are expensive.
Guard dogs can be an alternative to security guards. They can often be deployed as 
a perimeter security control. As a detection and deterrent, dogs are extremely effective. 
However, dogs are costly, require a high level of maintenance, and impose serious insur-
ance and liability requirements.
deploying Physical access Controls
In the real world, you will deploy multiple layers of physical access controls to manage 
the traffic of authorized and unauthorized individuals within your facility. The outermost 
layer will be lighting. The entire outer perimeter of your site should be clearly lit. This 
enables easy identification of personnel and makes it easier to notice intrusions and 
intimidate potential intruders. Just inside the lighted area, place a fence or wall designed 
to prevent intrusion. Specific controlled points along that fence or wall should be points 
for entry or exit. These should have gates, turnstiles, or mantraps all monitored by CCTV 
and security guards. Also bollards can be used to prevent ramming of access points with 
vehicles. Identification and authentication should be required at all entry points before 
entrance is granted.
Within the facility, areas of different sensitivity or confidentiality levels should be dis-
tinctly separated and compartmentalized. This is especially true for public areas and 
areas accessible to visitors. An additional identification/authentication process to validate 
the need to enter should be required when anyone moves from one area to another. The 
most sensitive resources and systems should be isolated from all but the most privileged 
personnel and located at the center or core of the facility.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   396   397   398   399   400   401   402   403   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish