Security: Physical Security & Awareness - Paiet/Tech-Journal-for-Everything GitHub Wiki
Security policy training and procedures
Role-based training
Training based on job roles and organizational responsibilities.
Usually in addition to general training for basic security principles and policies.
Personally identifiable information
Information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context.
Information classification
High
Medium
Low
Confidential
Private
Public
Data labeling, handling and disposal
Compliance with laws, best practices and standards
User habits
Security is most commonly breached at the end-user level.
Users need to be made aware of their specific security responsibilities and habits.
Employees must be made aware of the potential threats and attacks that target social networking and P2P applications and websites.
Security policies should include guidelines and restrictions for users of any social networking application or website.
Follow up and gather training metrics to validate compliance and security posture
Organizations need to validate the effectiveness of their security awareness and training programs, and identify which components of those programs that will have the most impact on overall security.
http://www.securingthehuman.org/resources/metrics
http://www.nist.gov/ Compare and contrast physical security and environmental controls
Environmental controls
HVAC
Fire suppression
EMI shielding
Hot and cold aisles
Environmental monitoring
Temperature and humidity controls
Physical security
Hardware locks
Mantraps
Video surveillance
Fencing
Proximity readers
Access list
Proper lighting
Signs
Guards
Barricades
Biometrics
Protected distribution (cabling)
Alarms
Motion detection
Control types
Deterrent
Discourage attackers from attacking in the first place
Preventive
stop an attack before it can cause damage
Detective
Identify attacks in progress
Compensation
suport other physical controls
Technical
Hardware or software that aid in protecting physical assets
Administrative
Leverage security policies and are used to train personnel