Chapter 15 – |
Protecting the Information Infrastructure |
Franklin N. Platt
Chapter Contents:
|
15.1 |
|
Introduction
|
|
15.2 |
|
A Strategic Planning Process
|
|
15.2.1 |
|
Attractive Targets
|
|
15.2.2 |
|
Defensive Strategies
|
|
15.2.3 |
|
Who Is Responsible?
|
|
15.2.4 |
|
One Process, One Language
|
|
15.2.5 |
|
Guidelines of the Federal Emergency Management Agency
|
|
15.2.6 |
|
Segmented Secrets
|
|
15.2.7 |
|
Confidential Design Details
|
|
15.2.8 |
|
Difficulties in Protecting the Infrastructure
|
|
15.3 |
|
Elements of Good Protection
|
|
15.3.1 |
|
Reliability and Redundancy
|
|
15.3.2 |
|
Proper Installation and Maintenance
|
|
15.3.3 |
|
Threats from Smoke and Fire
|
|
15.3.4 |
|
Equipment Cabinets
|
|
15.3.5 |
|
Good Housekeeping Practices
|
|
15.3.6 |
|
Overt, Covert, and Deceptive Protections
|
|
15.4 |
|
Access Control
|
|
15.4.1 |
|
Locks and Hardware
|
|
15.4.2 |
|
Card Entry Systems
|
|
15.4.3 |
|
Proximity and Touch Cards
|
|
15.4.4 |
|
Authentication
|
|
15.4.5 |
|
Integrated Card Access Systems
|
|
15.4.6 |
|
Bypass Key
|
|
15.4.7 |
|
Intrusion Alarms
|
|
15.4.8 |
|
Other Important Alarms
|
|
15.5 |
|
Surveillance Systems
|
|
15.5.1 |
|
Surveillance Cameras
|
|
15.5.2 |
|
Camera Locations and Mounts
|
|
15.5.3 |
|
Recording Systems
|
|
15.5.4 |
|
Camera Control Systems
|
|
15.5.5 |
|
Broadband Connections
|
|
15.6 |
|
Other Design Considerations
|
|
15.6.1 |
|
Choosing Safe Sites
|
|
15.6.2 |
|
Physical Access
|
|
15.6.3 |
|
Protective Construction
|
|
15.6.4 |
|
Using Existing Premises Alarms
|
|
15.6.5 |
|
Clean Electrical Power
|
|
15.6.6 |
|
Emergency Power
|
|
15.6.7 |
|
Climate Control
|
|
15.6.8 |
|
Smoke and Fire Protection
|
|
15.7 |
|
Mitigating Specific Threats
|
|
15.7.1 |
|
Preventing Wiretaps
|
|
15.7.2 |
|
Remote Spying Devices
|
|
15.7.3 |
|
Bombs, Threats, Violence, and Attacks
|
|
15.7.4 |
|
Medical Emergencies
|
|
15.8 |
|
Information Not Publicly Available
|
|
15.9 |
|
Completing the Security Planning Process
|
|
15.9.1 |
|
A Cost-Value Approach
|
|
15.9.2 |
|
Plan Ahead
|
|
15.9.3 |
|
Keep Well Informed
|
|
15.10 |
|
Summary
|
|
15.11 |
|
Notes
|
|
|
|