• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Syllabus
  • Schedule
    • Section 1
      • Week 1: Course Introduction
      • Week 2: Access Controls
      • Week 3: Systems Software Security
      • Week 4: Applications Software Security
      • Week 5: Cryptography Protocols
      • Week 6: Practical Cryptography
      • Week 7: Midterm Exam
    • Section 2
      • Week 8: Business Continuity & Disaster Recovery
      • Week 9: Security Operations
      • Week 10: Physical & Environmental Security
      • Week 11: Security Architecture & Design
      • Week 12: – Network Protocols
      • Week 13: Telecommunications and Network Security
      • Week 14: Risk Management and Compliance
      • Week 15: Final Exam
  • Course Material
    • Case Studies
      • C2.1 (9/11)
      • C4.1 (9/25)
      • C6.1 (10/9)
      • C8.1 (10/23)
      • C9.1 (10/30)
      • C10.1 (11/6)
      • C11.1 (11/13)
    • Practical Assignments
      • PA1.1 (Due 9/11)
      • PA2.1 (Due 9/18)
      • PA4.1 (Due 10/2)
      • PA5 (Due 10/9)
        • PA5.1
        • PA5.2
        • PA5.3
      • PA8.1 (Due 10/30)
      • PA9.1 (Due 11/6)
      • PA10.1 (Due 11/13)
      • PA11.1 ( Due 11/20)
      • PA12.1 (Due 11/27)
      • PA13 (Due 12/4)
        • PA13.1
        • PA13.2
        • PA13.3
    • Written Assignments
      • WA2.1 (Due 9/18)
      • WA3.1 (Due 9/25)
      • WA4.1 (Due 10/2)
      • WA6.1 (Due 10/16)
      • WA8.1 (Due 10/30)
      • WA9.1 (Due 11/6)
      • WA10.1 (Due 11/13)
      • WA12.1 (Due 11/27)
      • WA13.1 (Due 12/4)
  • Webex
  • Gradebook

ITACS 5209 F17

Temple University

11/6- Physical & Environmental Security

Overview

We will take a short break from the technical topics this week, and look at physical security.  These are the controls designed to ensure that our IT infrastructure is physically secure.  Physical facilities that house information systems are a sought-after target—although the equipment is certainly expensive, in many organizations the data is even more valuable.

We will look at the various methods of protecting physical infrastructure, and some of the standards in the industry.

The (ISC)2 Common Body of Knowledge (CBK) defines the key areas of knowledge for physical and environmental security in this way:

The Physical (Environmental) Security domain addresses the threats, vulnerabilities, and countermeasures that can be utilized to physically protect an enterprise’s resources and sensitive information. These resources include people, the facility in which they work, and the data, equipment, support systems, media, and supplies they utilize.

Physical security describes measures that are designed to deny access to unauthorized personnel (including attackers) from physically accessing a building, facility, resource, or stored information; and guidance on how to design structures to resist potentially hostile acts.

The candidate will be expected to know the elements involved in choosing a secure site, its design and configuration, and the methods for securing the facility against unauthorized access, theft of equipment and information, and the environmental and safety measures needed to protect people, the facility, and its resources.

Key areas of knowledge:

 

  • Understand site and facility design considerations
  • Support the implementation and operation of perimeter security
  • Support the implementation and operation of internal security
  • Support the implementation and operation of facility security
  • Support the protection and securing of equipment
  • Understand personnel privacy and safety

 

This week’s topics:

  • Site Access Controls
  • Secure Siting
  • Equipment Protection
  • Environmental Controls

 

In this unit, plan to:

  • Read: pages 294-317 in the Security Essentials text
  • Complete: this week’s written assignment
  • Complete: this week’s practical assignment
  • Prepare: for the Case Study Review

Practical Assignment

Written Assignment

Case Study

Primary Sidebar

Weekly Discussions

  • Uncategorized (12)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in