Upload
amir-a-kolahzadeh
View
16
Download
0
Embed Size (px)
Citation preview
3Physical VS Cyber Security
SECURING NETWORKS | PROTECTING DATA
PhysicalSecurity
CyberSecurity
IP CCTV | Access Control
Proactive Barriers & IR
BMS Fire Alarms, Elevators
Network Security | Data Protection
SCADA Security
Social Engineering
SECURING NETWORKS | PROTECTING DATA
4Physical or Logical Link
Isolated Networks
Segregated Networks
Logical Networks
Virtual Networks
SECURING NETWORKS | PROTECTING DATA
5Doomsday Scenario
SECURING NETWORKS | PROTECTING DATASECURING NETWORKS | PROTECTING DATA
Fire Alarms Hacked
Elevator Hacked
Electricity, Water & Internet Hacked
A Hacker Asks for Ransom $$$$
7
SECURING NETWORKS | PROTECTING DATA
Crown JewelsProtecting the Infrastructure
Protecting CCTV Networks
Protecting BMS
Protecting Fire Alarms
Protecting Access Controls
8Physical Security Challenges | CyberSecurity Solutions
Securing the CCTV
Securing BMS
Securing Fire Alarms / Suppressions Systems
Protect & Certify Physical Security
SECURING NETWORKS | PROTECTING DATA
Securing Access Controls
9Threats
SECURING NETWORKS | PROTECTING DATA
Metal theft (copper, aluminum)
Sabotage or the destruction of critical equipment
Insider theft of assets, information, or availability
Theft of power
Geomagnetic Disturbances
Pandemic
Natural Disasters
Aging Assets
Workplace violence and hostile intruder
Insider threat
Physical
Information theft (proprietary and customer data)
Cyber-attack as a prelude to war (conventional and asymmetrical)
Hackers & Hacktivists
Intrusion opportunities created by advent of Smart Grid & Smart Meter Technology
Phishing on the corporate side to gain access to SCADA systems
Ransomware
BYOD to work
Use of USB drives
Cyber
SECURING NETWORKS | PROTECTING DATAIT SEC IT SEC GULF FZCO
Techno Hub, Dubai Silicon Oasis, Dubai, UAE +971.55.293.7377 | [email protected] | www.itsec.ae