• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.701 ■ Fall 2024 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit #1: Understanding an Organization’s Risk Environment
      • Unit #2: Case Study 1 – Snowfall and stolen laptop
      • Unit #2: Data Classification Process and Models
      • Unit #3: Risk Evaluation
      • Unit #4 Case #2: Autopsy of a Data Breach: The Target Case
      • Unit #5: Creating a Security Aware Organization
      • Unit #6: Physical and Environmental Security
    • Second Half of the Semester
      • Unit #8 Case Study 3 – A Hospital Catches the “Millennium Bug”
      • Unit #9: Business Continuity and Disaster Recovery Planning
      • Unit #10: Network Security
      • Unit #11: Cryptography, Public Key Encryption and Digital Signatures
      • Unit #12: Identity Management and Access Control
      • Unit #13: Computer Application Security
  • Deliverables
    • Weekly Deliverables
      • “In the News” Articles
      • Answers to Reading Discussion Questions
      • Comments on Reading Discussion Question and Other Students’ Answers
    • Case Studies
    • Team Project
  • Zoom link

Unit #6 – Question 1

September 25, 2024 by David Lanter 26 Comments

What physical security risks are created by an organization’s implementation of a PHYSBITS solution? What mitigations would you recommend to lesson them?

Use this link for the reference to Physical Security Bridge to IT Security PHYSBITS

 

Filed Under: Unit 06: Physical and Environmental Security Tagged With:

Reader Interactions

Comments

  1. Nelson Ezeatuegwu says

    September 26, 2024 at 8:37 pm

    The physical security risks created by an organization’s implementation of PHYSBITS solution are (1) creation of lager attack surface: the integration of physical security with IT security gives attackers access to an organizations network; if the physical security is breached, an attacker who physically breaches a facility could have access to critical IT infrastructures and sensitive data. (2) Management: integrating the physical security to IT systems can create challenges in managing and maintaining security protocols across both physical and logical environments. (3) Configurations: human error could lead to improper configurations thereby creating more vulnerabilities that will be exploited by an attacker.
    I will recommend network segmentation to mitigate the vulnerability of lager attack surface created by PHYSBITS implementation. Secondly, I will recommend a targeted training for staff on both physical and IT security to reduce the risk of human error. Lastly, I will recommend periodic assessment of PHYSBITS systems to identify and mitigate any vulnerability in the findings.

    Log in to Reply
  2. Cyrena Haynes says

    September 28, 2024 at 3:16 pm

    PHYSBITS integrates physical security systems with IT infrastructure, centralizing control of functions like access and surveillance. This creates risks such as attackers controlling multiple security layers if compromised. To mitigate this, segment critical systems, use strong access controls, and enforce multi-factor authentication (MFA). IT vulnerabilities can also be exploited to manipulate physical security features; regular updates, encryption, and cybersecurity practices are essential. Physical tampering with devices is a threat, so secure them with tamper-resistant enclosures and detection alarms. Power failures can disrupt security; use redundant power and fail-safe modes. Protect network infrastructure with encryption and physical barriers. Insider threats can be managed through background checks, activity monitoring, and audit logs.

    Log in to Reply
    • Christopher Williams says

      September 28, 2024 at 8:34 pm

      You made some great points about the risks of combining physical security systems with IT infrastructure, especially when it comes to tampering. The fact that attackers could take control of several security layers if they break into the system should be the main concern. Using tamper-resistant enclosures and detection alarms is a smart idea to help prevent this. It’s important for organizations to stay alert and take steps to protect both their physical and digital assets. Your suggestions about using strong access controls and keeping everything updated show just how important a complete security plan is.

      Log in to Reply
      • Cyrena Haynes says

        September 30, 2024 at 6:25 pm

        Thank you for your response. An additional point to consider is the importance of network segmentation. By separating IT infrastructure from physical security systems on different networks, an attacker’s ability to escalate privileges if one is composted is significantly limited. This can act as an additional layer of defense, ensuring that even if an attacker breaches one segment, they won’t necessarily have free reign across the entire system.

        Log in to Reply
  3. Christopher Williams says

    September 28, 2024 at 7:30 pm

    Implementing a PHYSBITS solution, which connects physical and IT security, can create a few physical security risks. Using different tokens for building and IT access can lead to problems, especially considering human errors as well if the systems don’t work well together, potentially leaving certain areas unprotected. If physical access logs don’t match up with IT access logs, it can make investigations harder. There’s also a risk that delays in setting up or removing access for employees can leave unauthorized people with access to important areas.
    To address these risks, it’s important to integrate physical and IT security systems, so the same access tokens work for both. Automating the process of giving or removing access when new people are hired or leave the company can help prevent delays. Using a centralized system to monitor both physical and IT security can also improve real time detection and response to threats.

    Log in to Reply
    • James Nyamokoh says

      September 29, 2024 at 1:59 pm

      Hi Chris,

      I agree with your assessment that integrating physical and IT security through a PHYSBITS solution presents risks, particularly with the potential for mismatched access tokens and delays in updating permissions. However, I would also highlight the importance of addressing not just the technical integration but the organizational processes that support it. For example, streamlining cross-departmental communication between HR, IT, and security can prevent delays in provisioning or de-provisioning access. Additionally, while automation is key, there’s a need to ensure regular audits to catch any gaps that automation might miss. A question to consider: How would you handle access revocation during an emergency, when automation might be too slow or insufficient?

      Log in to Reply
      • Gbolahan Afolabi says

        September 29, 2024 at 4:46 pm

        In an emergency, there would be established processes in place to revoke physical and IT access. It is likely that the user’s profile would be switched to inactive and be removed from all groups. In Identity and Access Management (IAM), best practice is to provide groups with rights, roles, and attributes. This makes it efficient to quickly remove the user from all applicable groups and combats the human nature of forgetting to remove all rights. This is the same procedure used when an employee moves to a different team, they are removed from the groups associated with their old team and added to the groups related to their new job functions.

        Log in to Reply
  4. Jocque Sims says

    September 29, 2024 at 12:13 am

    The greatest security risk created by PHYSBITS is that in the event of an attack in which the attacker is able to breach the physical layer of the company’s physical security systems, the intruder will have access to the organization’s data and IT network. Furthermore, the creation and implementation of policies to manage both environments would be complex due to the ever-evolving security threats and ways to mitigate or stop them. Lastly, the human error factor would be a significant concern, as it can likely lead to exploitable vulnerabilities.

    The greatest ways to mitigate the risks are to ensure personnel are adequately trained in both physical and IT security, that separation of duties policies are enforced, and that assessments of PHYSBITS systems are scheduled to ensure vulnerabilities are identified.

    Log in to Reply
    • Tache Johnson says

      October 1, 2024 at 10:40 pm

      You bring up some strong points, particularly around the complexity of managing integrated security policies and the ever-present risk of human error. Considering the evolving nature of security threats, how do you suggest companies keep their training programs up-to-date to effectively address new vulnerabilities that might arise within a PHYSBITS system?

      Log in to Reply
  5. James Nyamokoh says

    September 29, 2024 at 1:16 pm

    When an organization integrates its physical and IT security systems using PHYSBITS, it opens up new risks, like unauthorized access to buildings or tampering with security devices, which can affect both physical and IT environments. The PHYSBITS highlights that there can be “incompatibilities between building access hardware tokens and IT access tokens,” making it difficult to track or investigate potential threats. It also points out that “monitoring systems do not provide a situational awareness of coordinated physical and IT attacks,” which could leave the organization vulnerable. To prevent these issues, it’s important to use encrypted credentials, have real-time centralized monitoring to catch suspicious activity quickly, and regularly maintain tamper-resistant security devices to ensure they’re always functioning correctly.

    Log in to Reply
  6. Gbolahan Afolabi says

    September 29, 2024 at 4:20 pm

    The PHYSBITS solution is an integration of physical security management and IT Security management. It aims to marry both modules under one business process where it claims reduce administrative overhead, enhance security, more effective reporting, and cost savings. The concept itself seeks to manage people, facilities, and IT systems under one integration.

    The risk of administering a system proposed by the PHYSBITS Framework is that it leaves corporations with a single point of failure. The framework creates a vulnerability for corporations by bringing IT security and physical security closer in which threat actors can exploit with tools such as Advanced Persistent Threats (APT). This kind of system would make it easier for threat actors to traverse between systems and potentially grant them access to both physical virtual resources. Another vulnerability introduced is that an outage of the security management service now affects various parts of operations and recovery/business continuity would be delayed. In the instance that the application is down, access control for buildings and rooms is now hindered which may permit unauthorized access in states of confusion derived from chaos.

    In conclusion, the de-segmentation of security functions is not worth the cost savings in any term. It exposes an organization’s assets and personnel to unnecessary risks and makes it more effortless for threat actors to gain heightened access to different types of assets. It also restricts organizations to a specific tool and goes against best practices of customizing services and tools to fit the dynamic needs of businesses. Most organizations already have ways of managing physical and IT security separately that are tailored-fit for operations.

    Log in to Reply
    • Gbolahan Afolabi says

      September 29, 2024 at 4:24 pm

      I recommend for companies to maintain segmented environments whenever possible. The segmentations would hinder the flow of unauthorized access from one system to the other. However, the segmentation should not being done in a way that the availability of IT services and assets is impacted. It should be done in a balance.

      Log in to Reply
  7. Ericberto Mariscal says

    September 29, 2024 at 5:51 pm

    PHYSBITS provides an approach in integrating IT security into physical security. However, risks may arise both technical and human-caused errors. For example, a power outage is a technical risk that may disrupt the PHYSBIT solution, leading to the inability to monitor and control. This can be mitigated by using back up power solutions such as backup generators. There is also room for human error as well, for example when onboarding individuals utilizing smart cards for access, the employee granting access may inadvertently provide greater access than intended mistakenly revealing sensitive information. This can be mitigated by reassessing and monitoring employee accesses on a regular basis.

    Log in to Reply
    • Andrea Baum says

      September 29, 2024 at 7:12 pm

      You raise an important point about the integration of IT and physical security through PHYSBITS, highlighting the potential risks from both technical failures and human errors. Implementing backup power solutions and conducting regular reassessments of access permissions are essential strategies to mitigate these vulnerabilities effectively.

      Log in to Reply
    • Jocque Sims says

      October 1, 2024 at 11:29 am

      Good morning Ericberto,

      I agree with your assessment and the suggestions you made. Along with reassessing and monitoring employee access, implementing changes to the organization’s initial and continuous training to include semi-specialized physical, operational, and technical procedures related to those mentioned above could also be beneficial. Great post.

      Log in to Reply
  8. Andrea Baum says

    September 29, 2024 at 6:16 pm

    The implementation of a PHYSBITS (Physical Security Bridge to IT Security) solution integrates physical and information security systems, which can introduce new physical security risks. One primary concern is the potential vulnerability of the physical access controls, such as badge systems or biometric readers, that are linked to the IT network. If these physical access points are compromised, unauthorized individuals could gain access not only to physical facilities but also to sensitive IT systems. For example, tampering with badge readers or physical access logs could allow attackers to mask or spoof their entry into secured areas, evading detection while accessing critical IT infrastructure. To mitigate this risk, organizations should implement multi-factor authentication (MFA) at both physical and digital access points, ensuring that even if one layer is compromised, unauthorized access can be prevented.

    Log in to Reply
    • Aisha Ings says

      September 30, 2024 at 9:18 pm

      Andrea, I completely agree with your points about the vulnerabilities in physical access controls integrated with IT systems. In addition to implementing multi-factor authentication (MFA), another key strategy for mitigating these risks is through strengthening perimeter security. One of the simplest and most effective ways to prevent unauthorized access to any company is by securing the building’s perimeter with security personnel, surveillance cameras, and fencing. These physical barriers can help prevent intruders from even reaching sensitive areas where IT and physical access controls intersect.

      Log in to Reply
  9. Benjamin Rooks says

    September 29, 2024 at 6:42 pm

    The biggest thing on my mind as I write this is the hurricane currently touching down at my family home in Florida. Because of that I am going to be focusing on the issues that could occur in a PHYSBITS system in the event of a natural disaster like this. The thing that comes to mind the most is how a system that is so interlinked at every level could be affected by outages. If redundancy is not built into the system then a physical outage due to a natural event could potentially prevent access for large swathes of the company. Because of this I believe that having redundant methods for employee access would be necessary.

    Log in to Reply
    • Brittany Pomish says

      October 1, 2024 at 9:16 pm

      My heart goes out to you and your family. Hopefully your family is staying safe! You bring up an interesting point about redundancy. Are you referring to applications as well, not just networks/servers?

      Log in to Reply
  10. Brittany Pomish says

    September 29, 2024 at 8:10 pm

    PHYSBITS, or Physical Security Bridge to IT Security, is an approach developed by the Open Security Exchange to facilitate collaboration between physical and IT security. This integration is crucial for ensuring comprehensive security measures. However, it can introduce physical security risks.

    One such risk is the technical threat of a power outage. This can be mitigated by implementing an uninterruptible power supply (UPS) to ensure continuous power. Another threat is human misuse and theft of equipment or information. These can be mitigated through appropriate access controls, including MFA, sufficient training, and other controls like surveillance or monitoring.

    Log in to Reply
  11. Aisha Ings says

    September 29, 2024 at 8:33 pm

    A physical security risk that is created when implementing a PHYSBITS framework is the possibility of a delay in disabling access for employees who have left the company. While their IT permissions might be deactivated promptly upon termination, their physical access card could remain active, granting them access to secure or restricted areas posing a security risk.
    To mitigate this risk, I would implement an automated deprovision system that deactivates the former employee’s IT access and physical access to the building concurrently. By doing this, you can prevent any unauthorized entry or use of company facilities and digital resources.

    Log in to Reply
    • Nelson Ezeatuegwu says

      September 29, 2024 at 9:54 pm

      You made a good point here Aisha, when the physical and logical is integrated in the security environment, human error could lead to such mistake thereby creating another vulnerability for threat actors to exploit.

      Log in to Reply
  12. Neel Patel says

    September 29, 2024 at 9:28 pm

    The implementation of the PHYSBITS solution integrates both physical and information security systems. This can make room for new physical security risks. A primary concern is the vulnerability of physical access controls like tap-in sensors (like Temple). For example, if someone wanted to get into the Fox School of Business. One can steal a student’s phone and use it to get into a building. Threats then have access to get into offices throughout the building and implement cyberattacks. This could be detrimental to staff and the university. To mitigate this, Temple can implement notifications to students if there are discrepancies with scanning in or having to open their phones before they scan into the building.
    Another vulnerability is an outage in the security management service can affect various parts of operations of the business. Another vulnerability is having access to the organization’s data and IT network. This can make situations even more complex and difficult to mitigate. A recommendation I have is Multi-factor authentication like Duo. MFA is very effective in ensuring access is not in the hands of threat actors.

    Log in to Reply
  13. Tache Johnson says

    September 29, 2024 at 11:01 pm

    PHYSBITS integrates physical and IT security data, increasing physical breach and insider threat risk. There are also risks that come with using physical security tools like smart cards and access card readers. To lower these risks, businesses should improve their physical security by putting in place strong access controls, monitoring, fingerprint identification, and encryption. Role-based access controls and multi-factor authentication make it harder for people to get into private areas. Regular tracking and gadgets that can’t be tampered with can also find strange activity. Continuous hardware updates and maintenance are necessary, along with training key personnel to handle security incidents. A PHYSBITS system can greatly lower the physical security risks it poses by keeping the gear up to date and in good shape and by teaching key staff.

    Log in to Reply
  14. Dawn Foreman says

    September 30, 2024 at 1:45 pm

    A company implementing the PHYSBITS solution faces a multitude of potential risks. Integrating physical security location and virtual data would be catastrophic if a hacker was able to enter a physical location unauthorized. For example, the video we watched in class showed someone able to have unauthorized access to a bank. If that person hacks into a branch they will not have access to the bank at large. However, if the banks servers were in that location it would cause a nationwide (in some cases worldwide) catastrophe. Additionally it would be more difficult to have access control. Individuals who have access to the physical technology may not have access to the virtual side of things. Differentiating access, intent of attacks, and managing multiple security layers could lead to gaps.
    My recommendation would be multi factor authentication at all touch points physical and virtual. Strict access control guidelines and implementation. Most of all security awareness.

    Log in to Reply
  15. Vincenzo Macolino says

    October 1, 2024 at 6:13 pm

    Implementing a PHYSBITS solution provides security and monitoring capabilities, however with that it also introduces certain physical security risks. These risks could be insider threats like employees with physical access to the infrastructure supporting the PHYSBITS solution, data leakage risks if data is improperly encrypted, and devices such as camera and access control devices that are able to be physically tampered with. To help lesson some of these risks, I would recommend role-based access control to limit access to the most critical components of the PHYSBITS solution to only authorized personnel. Furthermore, I would recommend using tamper detection mechanisms that will alert administrators if a device was accessed without permission. Lastly, I would suggest encrypting data with strong standards, using access control mechanisms on collected data, and employing redundancy in the design of the PHYSBITS architecture.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Unit 01: Understanding an Organization's Risk Environment (5)
  • Unit 02: Case Study 1 – Snowfall and a stolen laptop (1)
  • Unit 02: Data Classification Process and Models (6)
  • Unit 03: Risk Evaluation (6)
  • Unit 04: Case Study 2 – Autopsy of a Data Breach – The Target Case (4)
  • Unit 05: Creating a Security Aware Organization (6)
  • Unit 06: Physical and Environmental Security (6)
  • Unit 08: Case Study 3 – A Hospital Catches the "Millennium Bug" (2)
  • Unit 09: Business Continuity and Disaster Recovery (6)
  • Unit 10: Network Security (6)
  • Unit 11: Cryptography, Public Key Encryption and Digital Signature (6)
  • Unit 12: Identity Management and Access Control (6)
  • Unit 13: Computer Application Security (6)
  • Welcome (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in