computersecurityhandbook.com
Home  >  Fourth Edition  >  Chapter 15
Chapter 15 –  Protecting the Information Infrastructure
     Franklin N. Platt

Chapter Contents:

   15.1    Introduction
   15.2    A Strategic Planning Process
   15.2.1    Attractive Targets
   15.2.2    Defensive Strategies
   15.2.3    Who Is Responsible?
   15.2.4    One Process, One Language
   15.2.5    Guidelines of the Federal Emergency Management Agency
   15.2.6    Segmented Secrets
   15.2.7    Confidential Design Details
   15.2.8    Difficulties in Protecting the Infrastructure
   15.3    Elements of Good Protection
   15.3.1    Reliability and Redundancy
   15.3.2    Proper Installation and Maintenance
   15.3.3    Threats from Smoke and Fire
   15.3.4    Equipment Cabinets
   15.3.5    Good Housekeeping Practices
   15.3.6    Overt, Covert, and Deceptive Protections
   15.4    Access Control
   15.4.1    Locks and Hardware
   15.4.2    Card Entry Systems
   15.4.3    Proximity and Touch Cards
   15.4.4    Authentication
   15.4.5    Integrated Card Access Systems
   15.4.6    Bypass Key
   15.4.7    Intrusion Alarms
   15.4.8    Other Important Alarms
   15.5    Surveillance Systems
   15.5.1    Surveillance Cameras
   15.5.2    Camera Locations and Mounts
   15.5.3    Recording Systems
   15.5.4    Camera Control Systems
   15.5.5    Broadband Connections
   15.6    Other Design Considerations
   15.6.1    Choosing Safe Sites
   15.6.2    Physical Access
   15.6.3    Protective Construction
   15.6.4    Using Existing Premises Alarms
   15.6.5    Clean Electrical Power
   15.6.6    Emergency Power
   15.6.7    Climate Control
   15.6.8    Smoke and Fire Protection
   15.7    Mitigating Specific Threats
   15.7.1    Preventing Wiretaps
   15.7.2    Remote Spying Devices
   15.7.3    Bombs, Threats, Violence, and Attacks
   15.7.4    Medical Emergencies
   15.8    Information Not Publicly Available
   15.9    Completing the Security Planning Process
   15.9.1    A Cost-Value Approach
   15.9.2    Plan Ahead
   15.9.3    Keep Well Informed
   15.10    Summary
   15.11    Notes

Please report problems to the webmaster at: webmaster@removethis.rlgsc.com
copyright 2002-2006, Robert Gezelter, All Rights Reserved