CHAPTER 23

PROTECTING THE INFORMATION INFRASTRUCTURE

Franklin Platt

23.1 INTRODUCTION

23.2 SECURITY PLANNING AND MANAGEMENT

23.2.1 National Incident Management System Compliance

23.2.2 National Response Plan

23.2.3 National Infrastructure Protection Plan

23.2.4 Other Presidential Directives

23.2.5 Security-Related Laws and Regulations

23.2.6 Some Other Regulatory Requirements

23.2.7 Security Auditing Standards

23.3 STRATEGIC PLANNING PROCESS

23.3.1 Attractive Targets

23.3.2 Defensive Strategies

23.3.3 Who Is Responsible?

23.3.4 One Process, One Language

23.3.5 Federal Guidelines

23.4 ELEMENTS OF GOOD PROTECTION

23.4.1 Segmented Secrets

23.4.2 Confidential Design Details

23.4.3 Difficulties in Protecting the Infrastructure

23.4.4 Appearance of Good Security

23.4.5 Proper Labeling

23.4.6 Reliability and Redundancy

23.4.7 Proper Installation and Maintenance

23.5 OTHER CONSIDERATIONS

23.5.1 Threats from Smoke and Fire

23.5.2 Equipment Cabinets

23.5.3 Good Housekeeping Practices

23.5.4 Overt, Covert, and Deceptive Protections

23.6 ACCESS CONTROL

23.6.1 Locks and Hardware

23.6.2 Card Entry Systems

23.6.3 Proximity and Touch Cards

23.6.4 Authentication

23.6.5 Integrated Card Access Systems

23.6.6 Portal Machines

23.6.7 Bypass Key

23.6.8 Intrusion Alarms

23.6.9 Other Important Alarms

23.7 SURVEILLANCE SYSTEMS

23.7.1 Surveillance Cameras

23.7.2 Camera Locations and Mounts

23.7.3 Recording Systems

23.7.4 Camera Control Systems

23.7.5 Broadband Connections

23.8 OTHER DESIGN CONSIDERATIONS ...

Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.