Lecture 2: September 12, 1995: 6.915 Computer and Network Security Fall Term, 1995
Lecture 2: September 12, 1995: 6.915 Computer and Network Security Fall Term, 1995
Lecture 2: September 12, 1995: 6.915 Computer and Network Security Fall Term, 1995
1 Physical Security
Physical security is the basis of computer security. We are going to discuss the two
main uses of physical security: protection against natural risks and malicious attacks.
1
2 1 PHYSICAL SECURITY
Earthquake, Meteor, War: These risks may destroy a whole building. In
order to quickly restart the computer system rst of all we need up to date
backups (see section on backups below). Of course the backups should be kept
in a separate place possibly miles away. In some cases a cold site may be needed,
i.e. a facility with power, cooling and network connections (i.e., at least phone
lines), available to install a computer system. For more critical task hot sites
may be required. A hot site is a facility with a computer system ready to run
and be used. The cost of maintaining a hot site is high but companies usually
share the services of a single hot site provider (given the very rarity of use)
making the cost fairly aordable.
Communications interruption: To protect against accidental severance of
communication lines, duplicate lines at dierent sites are needed.
example: Neumann p. 17. Beaver chews on cables.
Operator error: Errors such as coee spills and accidental le deletion are
very common.
example: Chernobyl accident, 1986.
Software/hardware error
example: Neumann p. 68. Therac-25 chemotherapy machine fried several pa-
tients due to software bugs.
Backups: The most eective solution to many of these natural risks is to create
backups. Many types of backups are possible{ daily, weekly, and monthly, as well
as full, incremental, and dierential. Backups can be used either for quick restart or
restoration of damaged systems, as well as for record keeping and tracking purposes.
Backups should be separately stored in a secure place away from the system. Backups
should be regularly tested to make sure that the data on the backups are intact.
Also backups may contain sensitive information so they should be protected since
they provide an attacker with a potential entry point to private data other than the
computer system itself.
Often the most eective copy protection is no protection at all. By lowering the price
of the software or by providing excellent support services, many users are willing to
buy their own copy of the software.
2 Principles
The following principles can be gathered from what we learned about physical secu-
rity:
If information is in physical form, it can be accessed by the enemy.
Physical protection is at the foundation of computer and network security.
3 Readings
Chapter 12 of the textbook deals with physical security. Also Peter Neumann's
book Computer Related Risks (which is quoted in these notes) is a good collection of
computer risks due to lack of adequate physical protection.