Date post: | 13-Jan-2017 |
Category: |
Career |
Upload: | manoj-kumar-sood |
View: | 8 times |
Download: | 0 times |
SECURITYSECURITY
Prepared by:Prepared by: Manoj Kumar Sood,Manoj Kumar Sood,
ITS, GhitorniITS, Ghitorni
DEFINITIONDEFINITION
“A FORM OF PROTECTION WHERE A SEPARATION IS CREATED BETWEEN THE ASSETS AND THE THREAT."
4 D’s4 D’sDETECTDETECT,,DETER ,DETER ,DEFEATDEFEATDDEESSTTRROOYY ..
NATIONAL ASSETNATIONAL ASSET
“Asset of permanent value of a sovereign state”
S. NO NATIONAL ASSET
THREAT RESPONSIBILITY
1. TERRITORY/SPACE
TRESPASS/VIOLATION
DEFENCE FORCES
2. MATERIAL PROPERTY
SABOTAGE PHYSICAL SECURITY
3. POPULATION SUBVERSION
PERSONAL SECURITY
4. INFORMATION/
DOCUMENTS
ESPIONAGE DOCUMENTAL SECURITY
CONCEPTCONCEPTASSURANCECOUNTERMEASUREDEFENSE IN DEPTHRISKTHREATVULNERABILITYEXPLOIT
TYPES OF TYPES OF SECURITYSECURITY
PREVENTIVE SECURITY
DETECTIVE SECURITY
PREVENTIVE SECURITYPREVENTIVE SECURITY
• PHYSICAL• DOCUMENT• PERSONNEL• COMMUNICATION
SEGREGATION REGULATION COLLECTION & DISPOSAL. ROOM KEYS.
PHYSICAL PHYSICAL SECURITYSECURITY
PERIMETER WALL.SECURITY EDUCATION/BRIEFING.WINDOWS/VENTILATORS.ENTRY/EXIT POINTS.FIRE FIGHTING EQUIPMENTS
DOCUMENT SECURITYDOCUMENT SECURITY
SECURITY OF INFORMATION CONTAINED IN FILES OR RECORDS OF AN ORGANISATION.
THREATSTHREATS
ESPIONAGELEAKAGENEGLIGENCE
COUNTER MEASURESCOUNTER MEASURES
NEGLIGENCE IN DISPOSAL. IMPROPER MAINTENANCE OF FILES.DUPLICATE KEYSOVER PRINTING.EXCESS CIRCULATION.
MOVEMENT OF FILES.
NOTE PAD.
INDISCREET USE OF GADGETS
INSECURE DATA IN COMPUTERS.
CLASSIFICATION
PERSONNEL SECURITYPERSONNEL SECURITY
TO PREVENT AN UNRELIABLE PERSON FROM GAINING ENTRY INTO A SENSITIVE AREA OR GOVT. SERVICE & TO REMOVE HIM IF HE IS ALREADY THERE.
METHODSMETHODS
PRE-ENROLMENT VERIFICATION.
PERIODICAL VERIFICATION.
ANTI-SECURITY TRAITS.
ANTI-SECURITY TRAITSANTI-SECURITY TRAITSOVER INQUISITIVENESS.ODD HOURSABSENTEEEXTRA COPIES.UNCONSCIOUS CARELESSNESS.
LIVING BEYOND MEANSEXCESSIVE DRINKINGPERPETUAL INDEBTEDNESSGAMBLINGUNACCOUNTED WEALTH
COMMUNICATION SECURITYCOMMUNICATION SECURITYTELEPHONEFAXWTCOMPUTERINTERNET
DETECTIVEDETECTIVE SCEURITYSCEURITY
DENIAL OF INFORMATION.
PROMPT REPORTING OF LAPSES, IF OCCURRED.
REGULAR CHECKING OF SYSTEM.