Download - Digital physical security[present]
![Page 1: Digital physical security[present]](https://reader033.vdocument.in/reader033/viewer/2022052910/559c40051a28abfd508b457e/html5/thumbnails/1.jpg)
Physical Security and Digital
Security
MOHAMAD ZAWAWI BIN MAH HASAN
MUHAMMAD AZIZIE BIN MEZELAN
![Page 2: Digital physical security[present]](https://reader033.vdocument.in/reader033/viewer/2022052910/559c40051a28abfd508b457e/html5/thumbnails/2.jpg)
Physical security
![Page 3: Digital physical security[present]](https://reader033.vdocument.in/reader033/viewer/2022052910/559c40051a28abfd508b457e/html5/thumbnails/3.jpg)
Description
Physical security, as the name implies,
involves protecting your assets and
information from physical access by
unauthorized personnel.
In other words, you’re trying to protect
those items that can be seen, touched, and
stolen.
![Page 4: Digital physical security[present]](https://reader033.vdocument.in/reader033/viewer/2022052910/559c40051a28abfd508b457e/html5/thumbnails/4.jpg)
Physical security
Lock Door – one of the easiest way to
prevent those intent to creating problems
physically entering your environment is to
lock your doors and keep them out.
Securing physical
documents/password/shredding – in high
security and government environment,
sensitive papers should be either shredded
or burned.
![Page 5: Digital physical security[present]](https://reader033.vdocument.in/reader033/viewer/2022052910/559c40051a28abfd508b457e/html5/thumbnails/5.jpg)
Physical security
Biometrics – physical characteristic to
identify the user.(fingerprint, palm, hand
scanner, retina scanner, and soon, possibly,
DNA scanner)
Badges – can be any of form of
identification intended to differentiate the
holder from everyone else. Eg: name badge
or photo ID.
![Page 6: Digital physical security[present]](https://reader033.vdocument.in/reader033/viewer/2022052910/559c40051a28abfd508b457e/html5/thumbnails/6.jpg)
Physical security
Key Fobs – are named after the chains that
used to hold pocket watches to clothes.
RFID Badges – is a type of badge or card
that give you access to resources, including
buildings, parking lots and computer.
![Page 7: Digital physical security[present]](https://reader033.vdocument.in/reader033/viewer/2022052910/559c40051a28abfd508b457e/html5/thumbnails/7.jpg)
Physical security
RSA token – are anything that user must
have on them to access network resources
and are often associated with devices that
enables the user to generate one-time
password authenticating their identity.
Privacy Filters – either film or glass add-ons
that are placed over a monitor or laptop
screen to prevent the data on the screen
from being readable when viewed from the
sides.
![Page 8: Digital physical security[present]](https://reader033.vdocument.in/reader033/viewer/2022052910/559c40051a28abfd508b457e/html5/thumbnails/8.jpg)
![Page 9: Digital physical security[present]](https://reader033.vdocument.in/reader033/viewer/2022052910/559c40051a28abfd508b457e/html5/thumbnails/9.jpg)
Physical security
![Page 10: Digital physical security[present]](https://reader033.vdocument.in/reader033/viewer/2022052910/559c40051a28abfd508b457e/html5/thumbnails/10.jpg)
Physical security
Retinal – one form of biometric device that
can be used to identify user.
– Matches are made based upon identification of
the blood vessel in an individual retina.
– Rather expensive.
Tailgating – refers being so close to
someone when they enter a building that
you are able to come in right behind them
without needing use a key, a card, or any
other security device.
![Page 11: Digital physical security[present]](https://reader033.vdocument.in/reader033/viewer/2022052910/559c40051a28abfd508b457e/html5/thumbnails/11.jpg)
Digital Security
![Page 12: Digital physical security[present]](https://reader033.vdocument.in/reader033/viewer/2022052910/559c40051a28abfd508b457e/html5/thumbnails/12.jpg)
Description
Focused on keeping harmful data and
malware out as well as on
authorization and permissions.
Focused on:
• antivirus software
• Firewalls
• Antispyware
• User authentication/strong passwords
• Directory permissions
![Page 13: Digital physical security[present]](https://reader033.vdocument.in/reader033/viewer/2022052910/559c40051a28abfd508b457e/html5/thumbnails/13.jpg)
Why do we need Digital Security?
• Within our society, there
are people who are
dishonest and we
must take
precautions, just like
we do when we lock
our doors, to make
sure our digital
information and
equipment are
protected!
![Page 14: Digital physical security[present]](https://reader033.vdocument.in/reader033/viewer/2022052910/559c40051a28abfd508b457e/html5/thumbnails/14.jpg)
Digital Security
Anti-virus Software Operation:
Run in the background at all time
Update the virus definition to recognize new malicious software
Signature-based detection involves searching for known patterns of data within executable code
Generic-based signature are being used to detect new virus by looking for malicious code/slight variants of code in file and will be test in sandbox to see if it performs any malicious actions.
![Page 15: Digital physical security[present]](https://reader033.vdocument.in/reader033/viewer/2022052910/559c40051a28abfd508b457e/html5/thumbnails/15.jpg)
Digital Security
Anti-virus Software Example:
AVG
Avira
Avast
Eset NOD32
Panda
![Page 16: Digital physical security[present]](https://reader033.vdocument.in/reader033/viewer/2022052910/559c40051a28abfd508b457e/html5/thumbnails/16.jpg)
Digital Security
FIREWALL• Device that provides secure connectivity between networks
(internal/external; varying levels of trust)
• Used to implement and enforce a security policy for communication between networks
• Separate local network from the Internet
Trusted hosts and
networks Firewall
RouterIntranet
DMZ Demilitarized Zone:
publicly accessible
servers and networks
![Page 17: Digital physical security[present]](https://reader033.vdocument.in/reader033/viewer/2022052910/559c40051a28abfd508b457e/html5/thumbnails/17.jpg)
Digital Security
FUNCTIONS OF FIREWALL
Restrict incoming and outgoing traffic by IP
address, ports, or users
Block invalid packets
![Page 18: Digital physical security[present]](https://reader033.vdocument.in/reader033/viewer/2022052910/559c40051a28abfd508b457e/html5/thumbnails/18.jpg)
Digital Security
Antispyware
Just as antivirus seeks out and stops viruses from
entering and spreading
Purpose of antispyware software
The OS from Microsoft are the one most affected
by spyware, and Microsoft has released
Windows Defender and Security Esentials
![Page 19: Digital physical security[present]](https://reader033.vdocument.in/reader033/viewer/2022052910/559c40051a28abfd508b457e/html5/thumbnails/19.jpg)
Digital Security
User authentication/strong passwordsA strong password is a password that meets the following guidelines:
- Be seven or fourteen characters long, due to the way in which encryption works. For obvious reasons, fourteen characters are preferable.- Contain both uppercase and lowercase letters.- Contain numbers.- Contain symbols, such as ` ! " ? $ ? % ^ & * ( ) _ - + = { [ } ] : ; @ ' ~ # | \ < , > . ? /- Contain a symbol in the second, third, fourth, fifth or sixth position (due to the way in which encryption works).- Not resemble any of your previous passwords.- Not be your name, your friend's or family member's name, or your login.- Not be a dictionary word or common name.
![Page 20: Digital physical security[present]](https://reader033.vdocument.in/reader033/viewer/2022052910/559c40051a28abfd508b457e/html5/thumbnails/20.jpg)
Digital Security
Directory permissions
Can do to improve or change the security of the
directory services deployed.
Can ensure that they don’t become a tool for
an attacker bent on compromising
organization’s security
![Page 21: Digital physical security[present]](https://reader033.vdocument.in/reader033/viewer/2022052910/559c40051a28abfd508b457e/html5/thumbnails/21.jpg)
Thank You