| Chapter 15 –  | 
                                          Protecting the Information Infrastructure | 
                                        
                                     
                                        
                                    Franklin N. Platt
  Chapter Contents:
 
 
                                       
                                          |    | 
                                          15.1 | 
                                             | 
                                          Introduction
                                                 
                                           | 
                                        
                                       
                                          |    | 
                                          15.2 | 
                                             | 
                                          A Strategic Planning Process
                                                 
                                           | 
                                        
                                       
                                          |    | 
                                          15.2.1 | 
                                             | 
                                          Attractive Targets
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.2.2 | 
                                             | 
                                          Defensive Strategies
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.2.3 | 
                                             | 
                                          Who Is Responsible?
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.2.4 | 
                                             | 
                                          One Process, One Language
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.2.5 | 
                                             | 
                                          Guidelines of the Federal Emergency Management Agency
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.2.6 | 
                                             | 
                                          Segmented Secrets
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.2.7 | 
                                             | 
                                          Confidential Design Details
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.2.8 | 
                                             | 
                                          Difficulties in Protecting the Infrastructure
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.3 | 
                                             | 
                                          Elements of Good Protection
                                                 
                                           | 
                                        
                                       
                                          |    | 
                                          15.3.1 | 
                                             | 
                                          Reliability and Redundancy
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.3.2 | 
                                             | 
                                          Proper Installation and Maintenance
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.3.3 | 
                                             | 
                                          Threats from Smoke and Fire
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.3.4 | 
                                             | 
                                          Equipment Cabinets
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.3.5 | 
                                             | 
                                          Good Housekeeping Practices
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.3.6 | 
                                             | 
                                          Overt, Covert, and Deceptive Protections
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.4 | 
                                             | 
                                          Access Control
                                                 
                                           | 
                                        
                                       
                                          |    | 
                                          15.4.1 | 
                                             | 
                                          Locks and Hardware
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.4.2 | 
                                             | 
                                          Card Entry Systems
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.4.3 | 
                                             | 
                                          Proximity and Touch Cards
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.4.4 | 
                                             | 
                                          Authentication
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.4.5 | 
                                             | 
                                          Integrated Card Access Systems
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.4.6 | 
                                             | 
                                          Bypass Key
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.4.7 | 
                                             | 
                                          Intrusion Alarms
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.4.8 | 
                                             | 
                                          Other Important Alarms
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.5 | 
                                             | 
                                          Surveillance Systems
                                                 
                                           | 
                                        
                                       
                                          |    | 
                                          15.5.1 | 
                                             | 
                                          Surveillance Cameras
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.5.2 | 
                                             | 
                                          Camera Locations and Mounts
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.5.3 | 
                                             | 
                                          Recording Systems
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.5.4 | 
                                             | 
                                          Camera Control Systems
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.5.5 | 
                                             | 
                                          Broadband Connections
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.6 | 
                                             | 
                                          Other Design Considerations
                                                 
                                           | 
                                        
                                       
                                          |    | 
                                          15.6.1 | 
                                             | 
                                          Choosing Safe Sites
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.6.2 | 
                                             | 
                                          Physical Access
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.6.3 | 
                                             | 
                                          Protective Construction
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.6.4 | 
                                             | 
                                          Using Existing Premises Alarms
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.6.5 | 
                                             | 
                                          Clean Electrical Power
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.6.6 | 
                                             | 
                                          Emergency Power
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.6.7 | 
                                             | 
                                          Climate Control
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.6.8 | 
                                             | 
                                          Smoke and Fire Protection
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.7 | 
                                             | 
                                          Mitigating Specific Threats
                                                 
                                           | 
                                        
                                       
                                          |    | 
                                          15.7.1 | 
                                             | 
                                          Preventing Wiretaps
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.7.2 | 
                                             | 
                                          Remote Spying Devices
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.7.3 | 
                                             | 
                                          Bombs, Threats, Violence, and Attacks
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.7.4 | 
                                             | 
                                          Medical Emergencies
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.8 | 
                                             | 
                                          Information Not Publicly Available
                                                 
                                           | 
                                        
                                       
                                          |    | 
                                          15.9 | 
                                             | 
                                          Completing the Security Planning Process
                                                 
                                           | 
                                        
                                       
                                          |    | 
                                          15.9.1 | 
                                             | 
                                          A Cost-Value Approach
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.9.2 | 
                                             | 
                                          Plan Ahead
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.9.3 | 
                                             | 
                                          Keep Well Informed
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          15.10 | 
                                             | 
                                          Summary
                                                 
                                           | 
                                        
                                       
                                          |    | 
                                          15.11 | 
                                             | 
                                          Notes
                                                 
                                           | 
                                        
                                     
  | 
                            
                         
                      | 
                  
                  
                      |