Cyber Security Awareness: Pairing Physical and Digital Security

Defense in Depth is an easy way to discuss layers of security. The military strategy can be applied in both physical and digital realms. The integration of physical and digital security is what provides the most effective layered capabilities.
Course info
Rating
(17)
Level
Beginner
Updated
Nov 7, 2016
Duration
50m
Table of contents
Description
Course info
Rating
(17)
Level
Beginner
Updated
Nov 7, 2016
Duration
50m
Description

Do you worry about how your physical security vulnerabilities might also weaken your digital security? If so this course is for you! First you'll learn why physical and digital security are so important. Next, you'll discover how to integrate the two securities before finishing up by looking at how to avoid complacency through good policy.

About the author
About the author

Mr. Jordan "Cancer" Scott has been a warfighter or supported warfighters for over a decade.

More from the author
Cyber Security While Traveling
Beginner
54m
9 Sep 2016
Section Introduction Transcripts
Section Introduction Transcripts

Introduction
Hi, I'm Jordan Scott with Mentor Source, and this is Pairing Physical and Digital Security, part of our Cyber Security Awareness series. This course provides an overview of the integration of physical and digital security and the effects it could have. We'll begin with and introduction, and then we'll look at what physical security is, followed by digital security. After that, I'll go over some integration aspects and examples. Then we'll explore the impact that complacency and policy has. This can significantly impact physical or digital security. And then, of course, we'll end with a conclusion. Now let's get started. Welcome, I've been a war fighter or supported war fighters for over a decade. As one of the first operational Army electronic warfare officers since the Cold War, I gained some very unique experience with respect to information warfare. I'm a Master of Science in computer engineering, open source and collaboration proponent, technology integrator and proven innovator. I've worked in additional environments such as Global Positioning System, missile defense, software development, system of systems integration, and cyber security. I've earned a Security+, my CISSP, and am an active member of the Association of Old Crows and IEEE. Oh, and I brew beer in my spare time, assuming I ever have any. Ready? Here we go.

Complacency and Policy
Security really boils down to complacency and policy. Complacency and policy can really make a weak security system great or a great security system weak. I will go over definitions, what expensive security is, what complicated security is, how over-classification can impact things, and what security means with respect to open source. Complacency is feeling of contentment or self-satisfaction, especially when coupled with an unawareness of danger, trouble, or controversy. This goes in line with the phrase ignorance is bliss, but ultimately can be the worst thing for security. Security policy is a definition of what it means to be secure for a system, organization, or entity. I guess defining a word as a definition isn't as bad as defining a word with the word.

Conclusion
So with integrating physical security and digital security, removing complacency and adding a strong policy, security isn't that bad. What happens when you lose a key though, or trigger an alarm? The days of calling just a locksmith are over. If you're doing security correctly, you will probably have to call a security administrator, a network administrator, a cryptanalyst, the monitoring service, and a locksmith. Sun Tzu says if you know your enemies and know yourself, you will not be imperiled in a hundred battles. If you do not know your enemies nor yourself, you will be imperiled in every single battle. Thank you for viewing this course. For more information, please check out other titles in our Cyber Security Awareness series.