Skip to main content

CS406: Information Security

Page path
  • Home /
  • Courses /
  • Course Catalog /
  • Computer Science /
  • CS406: Information Security /
  • Unit 7: Physical Security
Back to course 'CS406: Information Security'
  • Unit 7: Physical Security

    Physical security is the protection of personnel, hardware, programs, networks, and data from physical circumstances and events that could cause serious losses or damage. This unit explains the importance of physical security as a significant item in providing overall security. Without physical security, all other sophisticated techniques can become useless. Specifically, we will study the NASA physical security program, which is a result of extensive research on physical security. We will also look into different types of attacks that are possible in the context of physical security.

    Completing this unit should take you approximately 7 hours.

    • Unit 7 Learning Outcomes Page
    • 7.1: Physical Security

      •  University of Cambridge: Ross Anderson's "Monitoring Systems" URL

        Read this chapter.

      •  University of Cambridge: Ross Anderson's "Physical Protection" URL

        Read this chapter. After reading these chapters, explain the relationship between threat models and attacks. Take the communication examples in the chapters and try to explain different attacks based on different assumption of threat models.

    • 7.2: NASA's Physical Security Program

      •  National Aeronautics and Space Administration: "Physical Security Program" URL

        Read this page about NASA's physical security program. Physical security in IT context requires most of the ideas discussed here, even though they were developed in the context of NASA's requirements.

    • 7.3: Types of Attacks

      •  Sarah Granger's "Social Engineering Fundamentals, Part I: Hacker Tactics" URL

        Read this page. After you read, explain how the attacker identifies the target/victim and how to carry out social engineering via various approaches (phones, online chatting, Dumpster diving, reverse engineering etc.).

Navigation

Art History
Biology
Business Administration
Chemistry
Communication
Economics
English
History
Mathematics

Creative Commons License
© Saylor Academy 2010-2018 except as otherwise noted. Excluding course final exams, content authored by Saylor Academy is available under a Creative Commons Attribution 3.0 Unported license. Third-party materials are the copyright of their respective owners and shared under various licenses. See www.saylor.org/open/licensinginformation for detailed licensing information.

Saylor Academy and Saylor.org® are trade names of the Constitution Foundation, a 501(c)(3) organization through which our educational activities are conducted.

Terms of Use | Privacy Policy