Circle The Wagons

Perimeter security in the physical world and cyber realm, from 500 miles away

Remember the classic line, “Just because I’m paranoid doesn’t mean they’re not out to get me”? If you feel your assets are in danger of compromise, you’re not alone and your concern isn’t irrational. Whether it’s a stock portfolio, brick and mortar property, friends and family, business interests, campuses, public areas or government bases, it seems just about everyone’s assets are under potential threat of attack. If those attacks aren’t occurring at this very moment, someone could be scoping out your perimeter and thinking of ways to breach it.

As the first line of defense, perimeter security is often the initial focus: physical barriers, deterrent strategies, access control and intrusion detection systems, ground sensors and street patrols. Their effectiveness can then be verified with video surveillance technology.

If a company’s business extends to remote satellite offices, global business partners and supply chains, the concept of “perimeter” suddenly becomes a gray area. And, given today’s digital world in which our greatest assets are now electronic data, the definition of perimeter extends far beyond a mere physical boundary. Protecting those assets—which could reside in a server, an offsite data center, on someone’s laptop or smartphone or even in the cloud—requires a strategic combination of physical and IT security prowess.

Pushing the Technological Frontier

Improvements in physical perimeter protection have long been driven by advancements in technology, specifically in increasing processing power. On the heels of greater processing power came advancements in wireless mesh, satellite and 4G LTE communications, which allow end users to extend their perimeters beyond those once limited by conventional cabling and power supplies.

As the processing power and communication infrastructures improved, we not only pushed the boundaries of our perimeters further and further, but we also began doing more with our perimeter protection systems. We started to integrate multiple devices and use advanced analytics to share intelligence and improve the effectiveness and efficiency of our response to perimeter breaches.

While the private sector was deploying new security technology that fostered coordinated responses, the government was pursuing a parallel effort. Various departments began looking at initiatives such as Federal Identity, Credential and Access Management (FICAM) to promote and facilitate interoperability across agencies and jurisdictions to ensure a rapid response to heightened threats to homeland security. A prime example of this interoperable initiative in action is in the city of Chicago where Operation Virtual Shield has demonstrated how a federation of multiple agencies can extend the city’s perimeter protection through the use of PODS (Police Observation Devices). The success of the program is in the statistics: since January 2011, the city of Chicago has credited the federation with 1,446 POD-related arrests.

This success is being driven by three main advances in IP video:

Image quality. Security professionals now use HDTV-quality and multi-megapixel video cameras (780p and 1080p) coupled with advanced H.264 compression for superior clarity and full-color fidelity at up to 60 frames per second.

The advanced compression minimizes bandwidth consumption and storage without degrading image quality. This means a user captures greater detail and more fluid motion and can view the perimeter at further distances than ever before. This achievement is in sharp contrast to the choppy, fuzzy quality of video we had to settle for in the past when processing and storage limitations forced us to compromise surveillance frame rates and resolution.

Light sensitivity. Nonexistent or weak lighting surrounding perimeter areas has always presented a challenge to security professionals. But today, companies can deploy digital video cameras that deliver full-color images at night using only the ambient lighting available, including starlight and moonlight. More sensitive light sensors not only provide better detection in less-thanoptimal lighting conditions, they also eliminate the cost of installing additional artificial lighting to illuminate the field of view.

Processing at the edge. With computer chips becoming smaller yet more powerful combined with thumbnailsize SD cards storing 32 GB and higher, we have the technology to push processing power and storage to the edge of our security solutions. Distributing power across edge devices gives companies a wealth of advantages, such as the ability to analyze raw footage in-camera at the point of capture to improve surveillance intelligence and the ability to mitigate the risks associated with centralized server failures.

Pushing Perimeter Security into the Digital and Cyber Realm

As we look beyond the physical perimeter to the digital and cyber realm, we start to discover problems and risks that require a completely different response to attack.

Technology solutions and policies in the digital sphere are often playing catch-up against malicious yet brilliant minds in a frontier many people can’t even begin to fathom. For instance, the FBI readily acknowledges that cyberterrorists operating in the digital realm routinely steal and launder money in an effort to finance their operations. In fact, FBI Director Robert Mueller recently told the House Appropriations Committee he was concerned about the possibility of a “cyber one-two punch,” in which intellectual property is stolen and used to interfere, jam or disrupt operations on the battlefield.

It’s these kinds of attacks that have prompted us to rethink what we consider the perimeter and how we combat and prevent incursions.

But cyberattacks aren’t exclusive to government entities, nor are they a recent phenomenon. The Hampton Roads Business Journal published a 2008 survey regarding employees who left their jobs. Conducted by Symantec Corp. and the Ponemon Institute, the study presented some sobering findings: Fifty- nine percent of ex-employees surveyed admitted to taking some of their employer’s confidential information when they left. Much of the information taken was electronic. Fifty-three percent of respondents downloaded information onto a CD or DVD, 42 percent onto a USB drive and 38 percent sent attachments to a personal email account. The overwhelming majority, 79 percent of respondents, took data without their employer’s permission.

While the frontier of cyberspace may be invisible, it is no less real than a brick and mortar boundary. But unlike a wall or a fence, cyberperimeters need to be somewhat permeable to allow us to share information with our satellite facilities, business partners, customers and supply chain if we’re to conduct business in this global economy. While conventional physical security systems can address the safety of the hardware sitting in the data center, protecting the digital content as it travels through cyberspace— beyond the traditional four walls—requires a new approach.

We live in a world where IT is king, and the backbone of everything is the transfer of data across the network, be it LAN, WAN, VPN or Internet. Devices outside the corporate offices, including laptops, video surveillance cameras, access control card readers, IP-based intrusion devices and other information technology systems, become targets for attacks because they offer intruders a portal into your facility and an accessible point to hijack or corrupt intellectual data inside your perimeter.

To address this potential breach point, the federal government enacted the Federal Information Security Management Act (FISMA). This act requires federal agencies to develop, document and implement information security programs for government information technology systems. FISMA also requires regular risk assessments: formal testing and evaluation of those devices and systems. In conjunction with FISMA, the Department of Defense (DoD) and many other high-level early adopters have established their own DoD Information Assurance Certification and Accreditation Process (DIACAP) that requires users to maintain their IT systems, devices and ability to operate while protecting data linked across these systems and devices.

The National Institute of Standards and Technology (NIST) also has statutory responsibilities under FISMA to provide those standards and best practices for federal information systems.

The regulations, standards and certification programs set forth by FISMA, DIACAP and NIST offer valuable guidelines for the private sector to build upon as it continuously redefines and redesigns its own perimeter protection— both in the brick and mortar world and in the cyber/digital realm.

Finding the Right Technological Balance

Local and national industry tradeshows and seminars offer great opportunities to get a peek at the latest technologies, but oftentimes it’s difficult to figure out which options on the market really work best for a particular security application. This is when an industry consultant can be of immense value.

A consultant has extensive knowledge about security systems and can weed out those extraneous technologies or solutions that won’t help solve the problem at hand. He or she will warn against technologies that are notoriously unreliable or that will lock you into a proprietary system, while recommending solutions to create a strong, long-term strategy to navigate this everchanging landscape.

Here are some shopping tips:

  • Go with mainstream and standardsbased technologies, solutions and services. This will ensure you have the ability to change and grow as technology improves and the definition of your perimeter changes.
  • Watch the trends and see what direction the big companies are taking. Not all good solutions are in it for the long haul. Remember the battle between Betamax and VHS? VHS became mainstream, while Betamax fell by the wayside. In the security world, it’s digital, IP-based technology that’s phasing out the analog world of old. IP video and wireless-based connectivity are replacing analog CCTV’s costly cable- anchored solutions. HDTV and megapixel network cameras support H.264 compression for better image quality and bandwidth savings. IP-based thermal imaging and lowlight/ Lightfinder imaging technologies have conquered the problem of conducting perimeter surveillance in extremely low-light conditions.
  • Choose devices that support higher encryption methodologies beyond user names and passwords. Consider solutions that employ credentialbased certificates for authentication of actual system devices. These will provide the highest level of protection against cyberthreats and ensure that only trusted users (“entities”) have access to your network devices and the data from those devices. It’s a way to foster interoperability across multiple departments, business partners, agencies and customers without compromising the security of your digital assets.

Circling your Perimeter with Smarter Wagons

The reality is that today’s perimeters extend far beyond physical boundaries. You have to understand where you’re most vulnerable to identify who is most likely to launch an attack. While investigating ways to shore up your defenses, seek advice from industry consultants and participate in industry association events and online discussions with ASIS, SIA, PSA, (ISC)2 and the entire security community to learn about current technology advancements and future trends.

Gather knowledge from multiple fronts and you’ll not only protect yourself from threats but avoid getting stuck with expensive proprietary systems or dead-end technology and solutions. It’s okay to be paranoid. It’s better to anticipate the possibility that someone might be out to get you—and your assets and your data. By circling your perimeter with smarter wagons, you’ll be able to fend off the threat.

This article originally appeared in the August 2012 issue of Security Today.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3