| 
                           
                              | 
                                       Franklin N. Platt
                                          | Chapter 15 – | Protecting the Information Infrastructure |  
 Chapter Contents:
 
 
 
                                       
                                          |  | 15.1 |  | Introduction |  
                                          |  | 15.2 |  | A Strategic Planning Process |  
                                          |  | 15.2.1 |  | Attractive Targets |  
                                          |  | 15.2.2 |  | Defensive Strategies |  
                                          |  | 15.2.3 |  | Who Is Responsible? |  
                                          |  | 15.2.4 |  | One Process, One Language |  
                                          |  | 15.2.5 |  | Guidelines of the Federal Emergency Management Agency |  
                                          |  | 15.2.6 |  | Segmented Secrets |  
                                          |  | 15.2.7 |  | Confidential Design Details |  
                                          |  | 15.2.8 |  | Difficulties in Protecting the Infrastructure |  
                                          |  | 15.3 |  | Elements of Good Protection |  
                                          |  | 15.3.1 |  | Reliability and Redundancy |  
                                          |  | 15.3.2 |  | Proper Installation and Maintenance |  
                                          |  | 15.3.3 |  | Threats from Smoke and Fire |  
                                          |  | 15.3.4 |  | Equipment Cabinets |  
                                          |  | 15.3.5 |  | Good Housekeeping Practices |  
                                          |  | 15.3.6 |  | Overt, Covert, and Deceptive Protections |  
                                          |  | 15.4 |  | Access Control |  
                                          |  | 15.4.1 |  | Locks and Hardware |  
                                          |  | 15.4.2 |  | Card Entry Systems |  
                                          |  | 15.4.3 |  | Proximity and Touch Cards |  
                                          |  | 15.4.4 |  | Authentication |  
                                          |  | 15.4.5 |  | Integrated Card Access Systems |  
                                          |  | 15.4.6 |  | Bypass Key |  
                                          |  | 15.4.7 |  | Intrusion Alarms |  
                                          |  | 15.4.8 |  | Other Important Alarms |  
                                          |  | 15.5 |  | Surveillance Systems |  
                                          |  | 15.5.1 |  | Surveillance Cameras |  
                                          |  | 15.5.2 |  | Camera Locations and Mounts |  
                                          |  | 15.5.3 |  | Recording Systems |  
                                          |  | 15.5.4 |  | Camera Control Systems |  
                                          |  | 15.5.5 |  | Broadband Connections |  
                                          |  | 15.6 |  | Other Design Considerations |  
                                          |  | 15.6.1 |  | Choosing Safe Sites |  
                                          |  | 15.6.2 |  | Physical Access |  
                                          |  | 15.6.3 |  | Protective Construction |  
                                          |  | 15.6.4 |  | Using Existing Premises Alarms |  
                                          |  | 15.6.5 |  | Clean Electrical Power |  
                                          |  | 15.6.6 |  | Emergency Power |  
                                          |  | 15.6.7 |  | Climate Control |  
                                          |  | 15.6.8 |  | Smoke and Fire Protection |  
                                          |  | 15.7 |  | Mitigating Specific Threats |  
                                          |  | 15.7.1 |  | Preventing Wiretaps |  
                                          |  | 15.7.2 |  | Remote Spying Devices |  
                                          |  | 15.7.3 |  | Bombs, Threats, Violence, and Attacks |  
                                          |  | 15.7.4 |  | Medical Emergencies |  
                                          |  | 15.8 |  | Information Not Publicly Available |  
                                          |  | 15.9 |  | Completing the Security Planning Process |  
                                          |  | 15.9.1 |  | A Cost-Value Approach |  
                                          |  | 15.9.2 |  | Plan Ahead |  
                                          |  | 15.9.3 |  | Keep Well Informed |  
                                          |  | 15.10 |  | Summary |  
                                          |  | 15.11 |  | Notes |  
 |  | 
                  
                     |  |