Requirements for design and size
Shields are made hinged or installed on racks.
A hinged fire shield is a plywood (wooden) or metal sheet to which hooks for equipment are attached. You can also find a more rational model, in which only a durable metal frame is made. There are fasteners attached to it. If the frame is painted red and hung on a white wall, it will satisfy all design requirements. Closed type panels are made in the form of boxes with lattice or glass doors. This makes it possible to see the contents, but protects against unwanted penetration inside. The depth of the box should be such that it does not block the passage, and at the same time accommodate all the necessary tools.
The edging of the fire shield has a width of 3...10 cm and is also painted red or in red and white stripes running at an angle of 45°...60°. The field on which the tool is attached is white. On white, red and black details are visible from afar.
According to the requirements, in addition to tools for fighting a fire, telephone numbers are placed on the shield by which you can call the Ministry of Emergency Situations or contact details of the nearest fire station. There is also an inventory of tools.
The height and width of the fire shield does not exceed 1.5 m. Each item is placed on the shield separately, so the dimensions may vary depending on the configuration.
Tools must not be screwed or nailed tightly. They are hung on hooks so that they can be easily removed. You can do this yourself by purchasing equipment and a shield separately. You can also buy all the necessary fire tools in a kit.
Description of the information system
Here general information about the information system is indicated - where it is located, what it is called, what data and what class (security level, category) are processed. Here, of course, many are interested in how much detail an information system needs to be described.
In the process of repeated coordination of threat models for government information systems, we have developed a solution regarding this - there must be a golden mean. This should not be a copy-paste from a technical passport indicating the serial numbers of technical equipment. But on the other hand, a person who is not familiar with the system, who has read its description in the threat model, should roughly understand how this very system works.
Example:
The server part of the Nipel information system is a cluster of physical servers on which the ESXi 6.x hypervisor is deployed.
The operation of the server part of the main services of the information system is provided by virtual servers (server names) running operating systems (list of OS). The main software that implements technological processing processes is (software name). The application software is a client-server application. The client part runs as a thick client on user workstations running operating systems (list of operating systems). Users gain access to the information system both from a local network and via the Internet using secure communication channels. In general, the information system functions as shown in the diagram. A functional (not topological!) diagram of the information system is attached.
This is roughly what it usually looks like. Style and other details, of course, can vary greatly, the main thing is the information that can be gleaned from the description.
There is also a section “Premises Security”. Here we describe how the premises are protected during working hours and during non-working hours - video surveillance, access control system, security guard, watchman, alarm system and that's all.
The purely FSB sections “Determining the relevance of using CIPF to ensure the security of personal data” and “Additional protection objects” are also included here in the threat model template. If cryptography is not used, then we simply remove these sections; if it is used, then, in general, there is no need to change anything special there, except to enter the name of the information system.
The “Threat Model Principles” section also does not need to be changed. Just note that there is an option for when the system uses crypto and when it doesn't. We select the one we need and move on.
Fire shield, fire safety layouts - Layout “Fire shield”
Publication “Layout “Firefighter...” If you don’t know what craft to make for school on the theme of fire safety, then read the article and look at the photo. It is very useful for a child to know that fire is not a toy. Thanks to classes in kindergarten or school, children clearly learn how to behave in the event of an emergency...
Image library "MAAM-pictures"
Educational "Fire shield" in the senior group
Educational “Fire Shield” in the senior group Teaching children fire safety rules is one of the most important and primary tasks of parents, educators and teachers. This board will help you visually study the rules for handling equipment (shovel, hook, axe, bucket, sand box,...
Layout “Fire Shield” Fire safety for children is one of the important issues that not only parents, but also teachers should pay special attention to! The issue of security is very important and relevant at all times. Children from a young age get acquainted with the basic rules, professions, tools! What..
Didactic game “Fire Shield” Purpose: To give children an idea of a fire shield; about the profession of firefighter. To develop the ability to realistically assess possible danger and help remember fire safety rules. Development of visual attention, memory, logical thinking. Equipment: panel - shield, cards with...
Private security threat model
And only here we begin to directly identify current threats. The 2008 FSTEC methodology for identifying current threats is a bit reeking, and we have already written about it here. But nothing can be done here, as noted in the same article - we work with what we have. Let's see what exactly we need to do to get a list of current threats.
Recent documents from FSTEC prescribe the use of BDU as source data for threats to information security. There are currently 213 threats and the list may grow.
Here I would immediately like to talk about the pros and cons of BDU. An undoubted advantage is that now there is no need to invent and formulate threats yourself, although nothing prohibits adding your own threats to the threat model. Another plus is the prescribed potential of the intruder and certain violated information security characteristics for each threat - there is no need to invent anything.
Minuses. The first disadvantage is the terribly poor capabilities for sorting threats. When you first start making a threat model based on BDU, the natural desire is to weed out threats that cannot be relevant in your system due to its structural and functional characteristics. For example, you need to remove threats for virtual containers and hypervisors because the system does not use virtualization, or you need to select threats for BIOS/UEFI for some reason, but this is not possible. Not to mention the fact that the BDU contains a number of rather exotic threats associated, for example, with supercomputers or grid systems.
Since we, as a licensee organization, develop many threat models for different systems, we had to manually categorize the 213 threats into groups, otherwise the work would be very difficult, especially since the threats are not even grouped in any order.
The second disadvantage is the description of the threats themselves. No, somewhere everything is clear and understandable. But sometimes the threat is formulated in such a way that you have to rack your brains to figure out what it’s all about.
Let's return to defining the list of current threats.
Initial security level
The first thing that needs to be determined is a global parameter - the level of initial security. It is global because it is determined once and does not change from threat to threat.
To determine the level of initial security (also known as the initial security coefficient Y1), you need to select for seven indicators one of the values that is most suitable for your system.
List of characteristics under the spoiler.
List of characteristics and their meanings
technical and operational characteristics of ispdn | security level | ||
high | average | short | |
1. by territorial location: | |||
distributed information system, which covers several regions, territories, districts or the state as a whole | — | — | + |
urban ispdn, covering no more than one settlement (city, village) | — | — | + |
corporate distributed information system covering many divisions of one organization | — | + | — |
local (campus) ispdn, deployed within one building | — | + | — |
local ispdn deployed within one building | + | — | — |
2. by connection to public communication networks: | |||
ispdn, which has multipoint access to the public communications network | — | — | + |
ispdn having single-point access to the public communications network | — | + | — |
ispdn, physically separated from the public network | + | — | — |
3. for built-in (legal) operations with records of personal databases: | |||
reading, searching | + | — | — |
record, delete, sort | — | + | — |
modification, transfer | — | — | + |
4. on restricting access to personal data: | |||
personal data, to which employees of the organization that owns the personal data or the subject of personal data have access, specified in the list | — | + | — |
ispdn, to which all employees of the organization that owns the ispdn have access | — | — | + |
open access ispdn | — | — | + |
5. based on the presence of connections with other data bases of other data sources: | |||
an integrated data base (organization) uses several data bases, while the organization is not the owner of all used data bases) | — | — | + |
ispdn, which uses one data base, owned by the organization that owns this data source | + | — | — |
6. according to the level of generalization (depersonalization) of personal data: | |||
ispdn, in which the data provided to the user is anonymized (at the level of organization, industry, region, region, etc.) | + | — | — |
ispdn, in which data is anonymized only when transferred to other organizations and is not anonymized when provided to a user in the organization | — | + | — |
ispdn, in which the data provided to the user is not anonymized (i.e., there is information that allows you to identify the subject of the personal data) | — | — | + |
7. in terms of the volume of personal data that are provided to third-party users without pre-processing | |||
ispdn, providing the entire database with pdn | — | — | + |
ispdn providing part of the pdn | — | + | — |
ispdn, which does not provide any information | + | — | — |
Each value corresponds to a high, medium or low level of security. We calculate what percentage we got for indicators with different values. Forget about a high level of initial security, it doesn’t exist. If “high” and “medium” scored 70% or higher, then we determine the average level of initial security (Y1 = 5), if not, then low (Y1 = 10).
Danger of threats
This section in the template is called “Determining the consequences of violating information security properties (threat risk).” They called it that way because, in essence, by defining the danger of threats, this is a definition of consequences, but when agreeing on a threat model, inspectors may not draw this parallel, and since the “definition of consequences” should be in the threat model, they write a comment.
So, the danger of threats can be low, medium or high, depending on whether minor negative, simply negative or significant negative consequences occur when the threat is realized, respectively.
Experts here often argue whether the severity of threats should be determined once and be a constant for all threats or not. This is not specified in the methodology, so it can be done either way. Our approach is intermediate - we determine the severity of threats depending on the violation of confidentiality, integrity or availability when a specific threat is implemented.
According to our logic, the negative consequences do not depend on the method of violating confidentiality, integrity and availability. For example, if your personal data is leaked in some database, then most likely it will not matter to you how this happened - through an SQL injection or through the intruder’s physical access to the server (the professional interest of the information security specialist does not count!). Therefore, we define, so to speak, three “threat risks” for violating confidentiality, integrity and availability. Often they can coincide, but it is still better to analyze them separately in the threat model. Fortunately, the BDU also specifies the characteristics to be violated for each threat.
Eliminating “unnecessary” threats
Next, in order to immediately cut off unnecessary threats, we make a sign with a list of excluded threats and a justification for why we are throwing them out.
The template contains the following as an example:
- eliminating threats associated with grid systems, supercomputers and big data;
- eliminating threats associated with virtualization;
- eliminating threats associated with the use of wireless communication networks;
- eliminating threats associated with the use of cloud services;
- eliminating threats to automated process control systems;
- eliminating threats associated with the use of mobile devices;
- eliminating threats that can only be implemented by an attacker with high potential.
Regarding the last point, a couple of points need to be clarified:
- if you have identified an intruder with low potential, then threats that could be carried out by intruders with medium and high potential are excluded;
- only the remaining threats that were not excluded in the previous paragraphs are excluded;
- Please note that the BDS may define different potentials for some threats for internal and external attackers.
Description of threats
The following is a table describing the threats that were not excluded. Yes, here you need to copy and paste the text from the BDU, because the threat model must contain a “description of threats”; you won’t be able to get away with identifiers. Let's see what we have in this table.
The sequential number and threat identifier from the BDU - everything is clear here. The columns “description of the threat” and “method of implementation of the threat” are a text block from the BDU. In the first column we insert the text up to the words “The threat can be realized...”. The second contains everything else. The division is again related to the requirement of regulatory documents that the threat model must describe “Methods of implementing a threat.” When agreeing, this will help avoid unnecessary questions.
The following columns of the tables are the potentials of internal and external violators. In order to make the table more compact and give more space to text blocks, we have previously assigned the numbers 1, 2 and 3 to the high, medium and low potentials, respectively. If the potential is not indicated in the BDU, we put a dash.
Column “Objects of influence” - we also take data from the BDU.
The "Properties Violated" column - K, C and D, Confidentiality, Integrity and Availability - was replaced with letters for the same purpose as in the case of violators.
And the last columns are “Prerequisites” and “Rationale for the absence of prerequisites.” The first is the beginning of determining the Y2 coefficient, which is also the probability of the threat being realized, which in turn is determined from the presence of prerequisites for the threat to be realized and the adoption of measures to neutralize the threat.
Determining the likelihood of a threat
The frequency (probability) of a threat being realized is understood as an expertly determined indicator that characterizes how likely it is that a specific threat to PD security will be realized for a given PDIS in the current situation. Four verbal gradations of this indicator are introduced: unlikely - there are no objective prerequisites for the threat to occur (for example, the threat of theft of information carriers by persons who do not have legal access to the premises where they are stored);
low probability – objective prerequisites for the threat to materialize exist, but the measures taken significantly complicate its implementation (for example, appropriate information security measures have been used);
medium probability - objective prerequisites for the threat to materialize exist, but the measures taken to ensure the security of personal data are insufficient;
high probability - objective prerequisites for the threat to materialize exist and measures to ensure the security of personal data have not been taken.
When compiling a list of current threats to personal data security, each gradation of the probability of a threat occurring is assigned a numerical coefficient, namely:
0 – for unlikely threat; 2 – for low probability of threat; 5 – for average probability of threat; 10 – for a high probability of threat.
It is important to say here that the last column is purely our initiative and is not provided for by law. Therefore, you can safely remove it. But we believe it is important that if a specialist additionally excludes threats because there are no prerequisites for their implementation, it is important that he describes why he decided so.
This point is also related to the fact that we are in some sense moving away from the threat modeling methodology. According to the methodology, for threats that do not have prerequisites, it is necessary to further calculate their relevance. And in some cases, threats that have no prerequisites may become relevant. We consider this a flaw in the legislation and from the final table we still exclude threats that do not have prerequisites.
Drawings on the topic of fire safety.
Pencil drawing “A fireman extinguishes a fire in a house”
Drawing a fireman is quite a challenging task for preschoolers of any age. But if you do this step by step, the child will easily cope with the task. Where to start and how to draw the details can be seen in the drawings, but an adult will explain much better with his own example. All that remains is to finish drawing the fire in the house and color the drawing.
Everything that the child was told in kindergarten about fire safety, he will remember if these lessons were reinforced with creativity. DIY crafts will help your child learn information. This knowledge will be strengthened and expanded at school. In the meantime, the kindergartener can draw, sculpt and glue, learning the basics of his safety.
Be careful, fire!
Making a fire truck
Fire smoke detector: models, characteristics, principle of operation
Sometimes kids in kindergarten get scared when they see a fire truck. And they may even start crying. They can be understood. A huge car, buzzing with a beacon, rushes through the city at great speed.
To instill in children a friendly attitude towards the fire truck and their owners, it is made with them using various techniques.
Crafts from semolina
This technique is useful for developing fine motor skills. You will need gouache, semolina, glue, colored paper or pencil.
- First we color the semolina. In an art bowl, we color the semolina. Mix it evenly with gouache. Then we lay it out on old paper (you can use old wallpaper) to dry.
- After complete drying, draw (or stencil) a fire truck on colored paper.
- Apply glue to the drawing.
- Semolina is taken and poured in this way, first along the contours of the pattern, and then from the edges to its middle. Waiting for it to dry completely. The excess semolina is removed and the fire truck is ready!
Craft applique
The application method is very simple. But it is suitable for both babies and older children.
- Find a drawing of a fire truck
- Transfer to cardboard.
- Cut out all the parts.
- We outline the blanks on colored paper (We will need black, white and red paper).
- Cut out colored blanks.
- On blue cardboard we outline the outlines of the drawing. We glue the parts of the fire truck one by one in accordance with the diagram.
- When the car is ready, you can outline it with a black or red marker for clarity. Clouds can be glued to the top of the work using cotton pads or cotton wool. If the fire truck does not occupy the entire sheet, then you can create a tree nearby. Also by application method. You'll get a whole landscape.
Fire shield, fire safety layouts - Fire shield layout
Publication “Firefighter Layout...”
Teaching children fire safety rules is one of the most important and primary tasks of parents and educators. This board will help you visually study the rules for handling equipment: hook, axe, shovel, bucket, sand box, fire extinguisher. The fire shield is equipped with a standard set…
Image library "MAAM-pictures"
Do-it-yourself fire shield model for kindergarten
DESCRIPTION OF THE MATERIAL: the material will be useful in the work of teachers when studying the topic of fire safety with preschool children. OBJECTIVES: to introduce children to the profession of firefighter. Talk about fire safety rules, give an idea of primary means...
Craft “Fire Shield” for kindergarten You never know when the need to make a fire shield quickly and easily with your own hands may strike. And it’s good if it’s a craft for kindergarten, and not something larger. In fact, these shields, which according to fire safety rules must be...
Layout for the fire safety corner “Fire Shield” The problem of forming the foundations of fire safety is becoming increasingly relevant
It receives the closest attention in educational institutions of all types and levels. The most vulnerable category exposed to various types of danger are preschool children..
Fire shield, fire safety layouts - Layout “Fire shield”
Article “Layout “Firefighter...”
. I would like to present to you the design of the SECURITY CORNER in the middle group. Together with the children, we created a model of a “fire shield”, thanks to which it is much easier to get acquainted with the profession of a firefighter. Fire shields are considered the primary fire extinguishing means. The main purpose of creating...
Design of a safety corner. Layout “Fire Shield” Good afternoon, dear colleagues. I would like to present to you the design of the SECURITY CORNER in the middle group. Together with the children, we created a model of a “fire shield”, thanks to which it is much easier to get acquainted with the profession of “Firefighter”. The main purpose of creating a mockup is to teach...
DIY fire shield model for kindergarten
My daughter and I created this layout to decorate a fire safety corner in our favorite kindergarten. I think the material will be useful for teachers when studying topics on fire safety with preschool children. Objectives: introduce children to fire safety rules...
Photo report on the competition "Fire Shield"
Regulations on the review-competition “Fire Shield” 1. General provisions. 1.1 These Regulations regulate the procedure for holding a review competition in the middle group among the families of pupils. 2. Goals and objectives of the competition 2.1 The competition is held with the aim of creating conditions for organizing…
Fire shield, fire safety layouts - go to the main page of the section.
Pages: 4 ...
Craft for school
The school is also an institution that is responsible for the safety of the children there.
And the main task of teachers is precisely to teach useful lessons to students and protect them from various disasters and regularly occurring crimes. Therefore, they also hold competitions and exhibitions of similar children's products. And they also encourage talented students for their efforts and diligence when working on such a significant project.
How to make a fire shield with your own hands in a master class: equipment
The list of equipment on the fire panel is strictly regulated, as are the sizes and number of items. According to the official document, one fire shield, if used correctly and competently, can save an area of 200 square meters from fire. Fire shields come in two types - open and closed, but the equipment for all of them is almost the same. It must include:
- Two fire extinguishers (foam or powder)
- A bayonet shovel that can be used to fill flammable and burning materials
- Hook - used to open windows and doors that are jammed or closed. Long handle minimizes fire injuries
- Crowbar - for breaking and pulling away burning structures
- Cone-shaped bucket - for sand or water
- A cloth is a thick and dense material that can, if necessary, be used to extinguish the clothes of victims or cover flammable materials or equipment.
- Box of sand or container of water
Sometimes the fire shield also includes a shovel and an ax. All items are securely fastened to the shield, but can be easily removed and used for their intended purpose.
Actually, this information is repeated from an early age. And to reinforce it, they play various games with the kids and offer to make a mock-up of a fire shield on their own or with the help of their parents.
The most rewarding material for children's crafts is paper. Almost anything can be made from paper of different densities and textures.
A small master class on making such a model.
To work you will need:
- A large candy box, or any suitable sized box (approximately 40 by 40 cm)
- Gouache in red, black and brown colors
- Juice box 0.3 ml
- Unnecessary spray bottle, small
- Pencil, scissors, ruler, glue, and other office supplies
- Red cardboard and colored paper
- A can of red paint - preferably
- Alcohol and cotton wool
First stage. Preparing the base - the shield itself, on which all the equipment will hang. Its background is usually light, so that red objects stand out as brightly as possible. If you have a candy box, the color of the inside does not need to be changed. Only the top cover needs to be cut off from the box itself if it is hinged. If it is removable, then simply choose the part that is lighter and stronger. The outer sides of the box can be covered with red paper.
Second phase. Inventory. We need: a crowbar, a hook, a shovel, an axe, a bucket, a fire extinguisher, a box of sand. Draw a crowbar, a shovel, a hook and an ax on cardboard, cut them out and color them. Another option is to take a picture, print it, stick it on cardboard and cut it out. The bucket is made of cardboard, rolled into a cone. The handle is made from a strip of cardboard painted black.
A box of sand is made from a juice box cut in half. Accordingly, it needs to be covered with red paper or painted with red paint, and “sand” signed on the side.
The most difficult element is the fire extinguisher. If you have a small, simple-shaped spray bottle, then everything is very simple - you need to paint it red with gouache or spray paint. The future fire extinguisher must first be degreased - wiped with a cotton swab with alcohol or nail polish remover, then the paint will lie smoothly. If the shape or size is not suitable, then you can screw the spray bottle itself onto a half-liter bottle and paint it too
All equipment is ready, it can be fixed in place according to the diagram in the photo.
If desired, the shield can be equipped with another fire extinguisher, or a hose, the role of which can be performed by any piece of cord rolled into a circle.
If you don’t have spray bottles at your disposal, and you really need a fire extinguisher for the shield, you can also print them out and stick them on cardboard. And glue them to the shield with a piece of voluminous (“car”) tape, then they will look more voluminous.
"FSB" sections
Next are the sections “Generalized capabilities of attack sources” and “Implementation of threats to information security, determined by the capabilities of attack sources.” These sections are not needed if crypto funds are not used. If they are still used, then the initial data, and in general tables for these sections, do not need to be invented; they are taken from the FSB regulatory document “Methodological recommendations for the development of regulatory legal acts that define threats to the security of personal data that are relevant when processing personal data in information personal data systems operated in the implementation of relevant types of activities" (approved by the management of the 8th Center of the FSB of Russia on March 31, 2015, No. 149/7/2/6-432).
It’s true that the result in our template is somewhat different from the default one given in the FSB document mentioned above.
The ultimate goal of these sections is to establish a class of cryptographic information protection tools (CIPF) that can be used in the system under consideration. This class directly depends on the capabilities of the offender and is established in accordance with FSB Order 378 (for personal data, but for other types of information there are simply no such requirements).
The most commonly used class of crypto funds is KS3. Now we'll tell you why.
In general, in the document “Composition and content of organizational and technical measures to ensure the security of personal data during their processing in personal data information systems using cryptographic information protection tools necessary to fulfill the requirements established by the Government of the Russian Federation for the protection of personal data for each level of security” ( approved by Order No. 378 of the FSB of Russia dated July 10, 2014), the CIPF class for the system in question is established, firstly, based on the type of threats, and secondly, based on the capabilities of the intruder.
We won’t go into detail about the types of threats; there is a lot of information on the Internet. Let’s dwell on the fact that there are 3 types of threats and by hook or by crook, if we plan to use cryptography, we need to deal with the 3rd type of threats (irrelevant threats associated with undeclared capabilities in application and system-wide software). Why?
Because FSB order 378:
- CIPF class KA in cases where type 1 threats are relevant to the information system;
- CIPF class KV and higher in cases where type 2 threats are relevant to the information system;
- CIPF class KS1 and higher in cases where type 3 threats are relevant to the information system.
It seems clear, but what is the problem? The problem is that you cannot buy CIPF classes KA1, KV1 and KV2 just like that, even if you have a lot of money for what they cost.
Let's do a little "investigation". Download the latest CIPF register, look for CIPF class KA1. The first search that came up was “Hardware-software encoder M-543K.” We go to Google, write “Buy M-543K hardware-software encoder” - failure. We try to “buy” the next crypto-tool – again a failure. We simply type in “buy crypto-tool KA1” - failure. We only receive links to other crypto tools of classes KS1-KS3 or to forums where cryptography is discussed. But the fact is that, as has already been said, you cannot simply buy CIPF of the KA and KV classes, only through specialized military units. Why these cryptocurrencies were mentioned at all in the document on personal data is still not clear. Therefore, in a regular ISPD there is only the third type of threat.
We sorted out KA and KV, but why KS3 and not KS2 and KS1? Here the second condition is already to blame - the violator.
FSB order 378:
12. CIPF class KS3 is used to neutralize attacks, when creating methods, preparing and carrying out which, the capabilities listed in paragraphs 10 and 11 of this document and at least one of the following additional capabilities are used:
a) physical access to electronic devices on which CIPF is implemented and SF; b) the ability to have hardware components of CIPF and SF, limited by measures implemented in the information system in which CIPF is used, and aimed at preventing and suppressing unauthorized actions.
Here the logic is like this:
- such common CIPF as, for example, ViPNet Client or CryptoPRO CSP are implemented on user workstations;
- users are potential violators;
- a potential violator has physical access to the computer equipment on which their CIPF and operating environment are implemented.
Thus, we can justify a lower class of CIPF only by justifying that our users are not potential violators (difficult), or by using only crypto gateways that are located in server rooms, to which, in turn, only privileged users, whom we have excluded, have access from the list of potential violators.
Fire shield signs
The location of fire panels must be indicated on the evacuation plan. There is GOST R 12.4.026-2001, which lists the requirements for signal signs and colors. A red rectangle or square is used to indicate the location of fire-fighting tools. To indicate the location of several protective equipment, a white semicircle is depicted on a red background. This way, not only shields can be identified, but also fire hydrants and fire extinguishers installed in one place.
The inscription “fire shield” is optional. If desired, it can be placed next to or on the doors of a closed stand.
There are requirements for the design of directional signs. The directional sign, which is hung on the walls of premises to show where fire equipment is located, is a white arrow on a red background. There is also a sign with the red letters PSH and the serial number of the shield on a white background. This designation must correspond to the actual numbering of the shields.
Why do we need a threat model?
The need to develop a threat model is regulated by a number of regulatory documents. Here are some of them.
Part 2 of Article 19 of Law No. 152-FZ “On Personal Data”:
2. Ensuring the security of personal data is achieved, in particular:
1) identifying security threatspersonal data when processed in personal data information systems;
The composition and content of organizational and technical measures to ensure the security of personal data during their processing in personal data information systems (approved by order of the FSTEC of Russia dated February 18, 2013 No. 21):
4. Measures to ensure the security of personal data are implemented, including through the use of information security tools in the information system that have passed the conformity assessment procedure in accordance with the established procedure, in cases where the use of such tools is necessary to neutralize current threats to the security
of personal data.
Requirements for the protection of information that does not constitute a state secret contained in state information systems (approved by the FSTEC of Russia dated February 11, 2013 No. 17)
Formation of information security requirements... including: ... identification of information security threats
, the implementation of which may lead to a violation of information security in the information system, and the development of an information security threat model based on them; ...
Requirements for ensuring the protection of information in automated control systems for production and technological processes at critically important facilities, potentially hazardous facilities, as well as facilities that pose an increased danger to human life and health and to the environment (approved by order of the FSTEC of Russia dated March 14, 2014 No. 31):
Formation of requirements for information protection in an automated control system... including: ... identification of threats to information security, the implementation of which may lead to disruption of the normal functioning of the automated control system, and development
on their basis
of a model of threats to information security
;
Requirements for ensuring the security of significant objects of critical information infrastructure of the Russian Federation (approved by order of the FSTEC of Russia dated December 25, 2022 No. 239):
11. The development of organizational and technical measures to ensure the security of a significant object is carried out by the subject of the critical information infrastructure... and should include:
a) analysis of threats to information security and development of a model of threats to information security or its clarification (if any);
So, the conclusion from here is simple: for any information systems that are somehow subject to protection in accordance with the law, it is necessary to develop a threat model.
Inventory of PSH
The fire safety corner equipment must be described in accordance with the requirements of the PPR. The list is drawn up on paper, secured by the signature of the responsible employee and the inspector of the Ministry of Emergency Situations. The equipment must be checked regularly to ensure that all tools are present. This responsibility lies with the person in charge. The results of inspections are recorded in the logbook of primary fire safety equipment. Inspections must take place at least once a quarter. During the check, you should perform the following actions:
What is a fire shield, what does it come with, where is it installed, what types are there?
- clean equipment from dust and dirt;
- pockets of corrosion are eliminated;
- if a layer of paint is destroyed, it must be restored;
- dull instruments must be sharpened in accordance with the standards defined by the standard;
- If the number is lost on the instrument, it must be reapplied.
Sample inventory
Crafts from cereals
Quite simple crafts can be created from semolina. To do this, colored semolina is prepared: the cereal is mixed in a container with gouache of the desired color until a rich shade is obtained and dried. For a fire truck you will need red, black and gray semolina, as well as undyed (white) semolina.
The outline of the machine is drawn on a sheet of thick paper or cardboard. Glue is applied inside the lines and red material is poured in a thin, even layer, and excess grain is shaken off. Then other colors are carefully formed into small details. When the picture is ready, glue is applied to the paper outside the outline, creating a general background of unpainted semolina.
DIY fire shield - detailed diagram with description and photo
Being prepared to fight fire is an important indicator of the safety of a home or other building. All tools and equipment for extinguishing a fire should be collected in one place, easily accessible and ready for use. This place is usually a fire shield.
Making a fire shield with your own hands is quite simple, although you can purchase a finished product. The main thing is that it fully corresponds to its purpose.
Requirements for fire shields
A fire shield is a place in which equipment intended for extinguishing a fire manually is collected. There are certain requirements for it from state standards and fire safety regulations.
The dimensions of the fire shield are not directly regulated; they must be sufficient to accommodate the equipment. The standards, in turn, determine the color of the shield. The main color is white, with a red stripe as a frame. With such ratios, the shield is clearly visible in poor lighting. It is necessary to have hooks on which tools and accessories will be placed.
Types and configurations
There are open and closed fire shields
An open shield is a rectangle made of plywood or metal sheet with a frame of beams and hooks, of a certain color and size. It can be mounted, hanging on the wall, or attached, placed on special devices.
The photo shows an open type fire shield
A closed fire shield is a metal box, the doors of which are covered with a metal mesh. It can also hang on the wall or stand next to it.
Placing such a shield is also possible inside buildings. Typically, a closed shield is sealed or locked.
The photo shows a closed type fire shield
Fire shields are also divided into categories based on fire and explosion hazards. This division determines the configuration of the fire shield and its markings.
Thus, the ShchP-A fire shield, designed to counteract the combustion of solid substances, must contain a 200-liter water barrel, two specially shaped buckets, a hook, a crowbar, two shovels and two foam fire extinguishers.
The ShchP-V shield, designed to counteract the combustion of liquid substances, among other things, contains a box with sand, a special cloth and a powder fire extinguisher. There are also special equipment for boxes of other categories.
Making a fire shield
To make a shield with your own hands, you will need material (plywood or sheet metal, hooks, bars, paints, etc.), tools (for cutting metal or wood, hammer, etc.) and appropriate equipment. The beginning of work consists of preparing a drawing, taking into account all regulatory requirements. Typically the side dimensions are 1400x1250 mm, but this is not a requirement.
If an open-type metal fire shield is being made, it is enough to cut a sheet of appropriate size, paint it and attach hooks for placing equipment. In the rear part, a frame made of beams is attached to the sheet. In addition, it is necessary to apply appropriate inscriptions and designations.
To make closed fire shields, you will have to make a drawing in three projections, as well as a drawing of the door. Attached fire shields also require a drawing of the racks.
The production of a closed shield begins by welding a tubular frame onto which a box made of a metal sheet and a corner measuring 20x20 mm is attached.
stroykadoma.org
From salt dough
Having mastered plasticine, children can make homemade products from a mixture of salt, flour and water. This is also a plastic material, but it dries quickly, and working with it requires some skills.
First you need to prepare the dough:
- In a separate bowl, mix flour and fine table salt in equal proportions (about 200 g each);
- Add 100 gr. sunflower oil, 1-2 tbsp. spoons of liquid. Divide the resulting volume into several parts, and add paint of the desired color to each (you can use vegetable juice);
- Knead the dough until the color is even.
Further, the principle of work is the same as with plasticine. Only after finishing the work should the craft be dried. You can simply leave the product in the room for several days. To speed up drying, you can use an oven, initially cold, and then turn it on at a low temperature.
Do not dry dough crafts on a hot radiator, they may crack.
Where to place the PSH
Whether you purchased a ready-made fire shield or made it yourself, it is important to choose the placement location wisely. Since safety requirements apply to all objects, such stands must be installed:
- educational institutions;
- healthcare institutions;
- children's and sports grounds;
- gas stations;
- car parking;
- vehicle parking lots and garages;
- catering establishments;
- trading enterprises;
- cultural and entertainment establishments;
- industrial enterprises and surrounding areas;
- sanatoriums, holiday homes, children's camps;
- hotels and motels;
- warehouse terminals;
- river and sea vessels;
- railway transport and so on.
Inventory standards
Crafts from napkins
Paper napkins make magnificent crafts. One popular option is to roll napkins into small balls and soak them in gouache of different colors. From such elements you can put together a three-dimensional picture. The technology is the same as when working with beads.
Even a small master can make voluminous figures from such lumps. The photo shows a small composition on a fire theme. The frame of a machine or structure is assembled from matchboxes or cardboard boxes. On top it is tightly covered with balls of napkins, painted in the desired color.
Crafts reflecting fire-fighting themes, made by a child together with an adult, help to learn the basic rules of fighting fire. They can be made from different materials and in different ways. It is important to inspire the little master to be creative, and he will receive the necessary information during the process of work.
Equipment according to GOST
From the listed types of fire shields, you can determine the basic configuration of a fire shield in accordance with GOST. This package is standard and includes the following equipment:
- shovel,
- fire protection fabric,
- axe,
- metal gaff,
- buckets,
- scrap.
Fire-resistant fabric is used to prevent fire from growing. It can also help to eliminate the source of fire if its effect is supplemented with primary fire extinguishing agents. The cloth is useful in case of ignition of clothing on a person or with equipment on fire. The panel is created from heat-insulating fabrics. Its dimensions can be 1 or 2 meters in width and length. Handles (2 or 4 pieces) are attached to the edges of the canvas for ease of use. Care should be taken to ensure that there are no stains or holes larger than 10 mm in the fabric.
Fire-resistant sheet fabric with obligatory indication of expiration date
Crowbars, shovels and hooks are used to clear debris that forms during fires.
The purpose of the scrap is to open roofs, clear ice from a well with a fire hydrant, clear fires, and open hatches.
The gaff is a solid metal rod with a hook at one end and a ring handle at the other. The length of the hook should not exceed 2 meters, its weight should start from 5 kg. The length of the crowbar is 1100 mm, the diameter of the device is 25 mm. Its weight is at least 4.5 kg. It should be checked periodically, since cracks or scale may form in it, which should not happen. If the inspection reveals the indicated defects, you should start sharpening and heat treating the tool.
Buckets from fire shields are used to deliver sand or water to the fire. These buckets are painted red and the volume of the buckets must be at least 0.008 cubic meters. m.
Axes on the shield are needed to clear debris and remove obstacles from the path, and to open various structures. The end of a fire ax is very sharp. It consists entirely of metal or is complemented by a wooden handle. If the handle is made of iron, then it should have a rubber coating. It allows you to protect yourself from possible electric shocks if you are dismantling debris from energized structures. This handle also prevents slipping. The wood must be durable. There should be no chips or cracks on it. Periodic inspection of this equipment is required for defects, which should either be promptly eliminated or the instrument replaced with another.
The fire-resistant fabric is placed in a special fabric container. Container sizes may vary. The container can also be made of polymers. The cloth should be cleaned monthly to remove accumulated dust.
The handle of the bayonet shovel should have a length of 1100 to 1300 mm. The diameter of this shovel is most often 400 mm.
Powder fire extinguishers are located on the panel. In winter, they should be removed from the panels, since they may lose their functionality due to the cold. But you can’t just take them off. It is imperative to place on the board information about where the fire extinguishers are placed.
Standard fire shield with water tanks, each holding 100 liters
Barrels for storing water intended for extinguishing fire must have a volume of at least 0.2 cubic meters. m. The barrel should be refilled once every 10 days, and the water should be completely replaced quarterly.
Sand boxes require a capacity of 0.5 to 3 cubic meters. m. Before filling the box, the sand must be sifted and dried. Once a decade you need to inspect it and dry it if there are lumps or moisture. The box should be designed in such a way as to prevent water from entering it, but to ensure convenient removal of sand when the need arises.
Fabric crafts
Applications using colored patches look very impressive. Such paintings have an important advantage: they can be made soft using thick fabric as a base. The photo shows a warning picture that will remind you of the dangers of matches. The necessary details are sewn onto the woven base. To add volume, cotton wool is placed under some flaps. Human figures or his face can be embroidered or drawn.
Another direction is voluminous woven crafts. In the photo there is a “Fun Fire Extinguisher”. You can use foam rubber or polystyrene as a base. The base is covered with red fabric. Characteristic small details are sewn on. They can be made from ribbons, braid, felt. This craft is absolutely safe for kids.
What should be in the fire safety corner in kindergarten
A model of a gaming educational environment in the second junior group, effective forms of cooperation with parents to create a home gaming environment... Older children can perform compositional appliqué. Their creations will feature a fire truck, a bonfire, a house with windows where the fire is burning and smoke is pouring out. All this can be depicted using torn appliqué: pieces of colored paper, dry autumn leaves. This can be a voluminous work, 3D application.
Fair of Masters - handmade Educational Tabletop Module “Geared Wheels” Montessori (gears.
The fire shield is equipped with many special tools. Children learn which object is used for what. All parts are removable.
Paper crafts
The simplest paper fire truck can be made using matchboxes:
- Its base is made up of 4 boxes, stacked in 2 rows in height.
- The fifth box is installed on top in the middle and imitates the cabin.
- All elements are glued together to form a rigid frame.
- Next, the workpiece is carefully covered with red paper on all sides.
- The windows are made of white paper, and yellow paper circles are glued as headlights.
- The fire escape is assembled from 2 parallel wooden branches (skewers) and transversely assembled matches. The ladder can be secured with plasticine.
- Wheels are taken from broken toy cars or cut out of cardboard.
With the help of adults, it is easy to make paper crafts using the papercraft technique. To do this you will need a thick sheet of paper. The turn of the car is drawn and painted on it. The photo shows a diagram of the headquarters fire truck. The workpiece is carefully cut out with scissors, and the parts are bent in the right places, glued together along the flaps, and the craft is ready.
You can also glue simple compositions from paper. A green background is created on a solid base (cardboard, plywood). A village house is made of paper. Windows and doors made of colored paper are drawn or glued on it, as well as flames escaping from the window. The craft is fixed to the base. A small fire truck is made in the same way.
DIY fire shield - detailed diagram with description and photo
Being prepared to fight fire is an important indicator of the safety of a home or other building. All tools and equipment for extinguishing a fire should be collected in one place, easily accessible and ready for use. This place is usually a fire shield.
Making a fire shield with your own hands is quite simple, although you can purchase a finished product. The main thing is that it fully corresponds to its purpose.
Requirements for fire shields
A fire shield is a place in which equipment intended for extinguishing a fire manually is collected. There are certain requirements for it from state standards and fire safety regulations.
The dimensions of the fire shield are not directly regulated; they must be sufficient to accommodate the equipment. The standards, in turn, determine the color of the shield. The main color is white, with a red stripe as a frame. With such ratios, the shield is clearly visible in poor lighting. It is necessary to have hooks on which tools and accessories will be placed.
Types and configurations
There are open and closed fire shields
An open shield is a rectangle made of plywood or metal sheet with a frame of beams and hooks, of a certain color and size. It can be mounted, hanging on the wall, or attached, placed on special devices.
The photo shows an open type fire shield
A closed fire shield is a metal box, the doors of which are covered with a metal mesh. It can also hang on the wall or stand next to it.
Placing such a shield is also possible inside buildings. Typically, a closed shield is sealed or locked.
The photo shows a closed type fire shield
Fire shields are also divided into categories based on fire and explosion hazards. This division determines the configuration of the fire shield and its markings.
Thus, the ShchP-A fire shield, designed to counteract the combustion of solid substances, must contain a 200-liter water barrel, two specially shaped buckets, a hook, a crowbar, two shovels and two foam fire extinguishers.
The ShchP-V shield, designed to counteract the combustion of liquid substances, among other things, contains a box with sand, a special cloth and a powder fire extinguisher. There are also special equipment for boxes of other categories.
Making a fire shield
To make a shield with your own hands, you will need material (plywood or sheet metal, hooks, bars, paints, etc.), tools (for cutting metal or wood, hammer, etc.) and appropriate equipment. The beginning of work consists of preparing a drawing, taking into account all regulatory requirements. Typically the side dimensions are 1400x1250 mm, but this is not a requirement.
If an open-type metal fire shield is being made, it is enough to cut a sheet of appropriate size, paint it and attach hooks for placing equipment. In the rear part, a frame made of beams is attached to the sheet. In addition, it is necessary to apply appropriate inscriptions and designations.
To make closed fire shields, you will have to make a drawing in three projections, as well as a drawing of the door. Attached fire shields also require a drawing of the racks.
The production of a closed shield begins by welding a tubular frame onto which a box made of a metal sheet and a corner measuring 20x20 mm is attached.
stroykadoma.org
Dough crafts
Salt dough successfully replaces plasticine. It is also malleable, but when hardened it becomes hard and can retain its shape for a long time. This blank can be painted and varnished. Dough recipe:
- For 200 mg of flour add 150 mg of table salt and 5 tbsp. vegetable oil.
- The components are diluted with water to the desired consistency.
From the prepared plastic mass you can easily fashion a fire truck and a helicopter, houses engulfed in flames, emergency workers, etc. The workpiece is placed in the oven and dried at a temperature of +70...+80 0C for 1 hour. Accelerated drying is provided at a temperature of +110...+120 0C for 25-30 minutes. After cooling, the hardened workpiece can be painted in any color using acrylic paints.
Where to place the PSH
Whether you purchased a ready-made fire shield or made it yourself, it is important to choose the placement location wisely. Since safety requirements apply to all objects, such stands must be installed:
- educational institutions;
- healthcare institutions;
- children's and sports grounds;
- gas stations;
- car parking;
- vehicle parking lots and garages;
- catering establishments;
- trading enterprises;
- cultural and entertainment establishments;
- industrial enterprises and surrounding areas;
- sanatoriums, holiday homes, children's camps;
- hotels and motels;
- warehouse terminals;
- river and sea vessels;
- railway transport and so on.
Inventory standards
Basic standards for fire control panels
The control panel must be located in a publicly accessible place, which is known to all employees of the enterprise or residents of the house. Access to it must not be obstructed. Primary fire fighting equipment in a certain configuration is located on the panel on convenient stands. The presence of a fire corner is mandatory, according to the PPB. The owner of the object is required to perform the following actions:
establish the fire hazard class of the object, and according to it, select a set of what should be on the fire panel; install one or more standard products, at the rate of 1 for every 200 m2 of premises; next to the stand there should be a container with either sand or water, which are also included in the primary means of extinguishing fires; the frame and equipment must be exclusively red in order to attract human attention; the central surface of the stand is painted white so that the instruments are as visible as possible; the product must be marked with its number and the telephone number of the part of the Ministry of Emergency Situations supervising the object.
Option for mobile buildings
Made from plasticine
Modeling from a soft plastic material is useful for children of primary preschool age - it develops fine motor skills, at the same time you can tell why it is dangerous to play with matches, why the profession of a firefighter is needed, how they work.
Fire engine:
- Form a base and a booth from red plasticine and connect them together.
- On the cab, attach windows made of thin white plates, yellow headlights, a small blue warning light and a black stripe in front - the bumper.
- Attach small white stripes and numbers 01 to the body, and a gray hose, rolling it into a spiral.
- Black wheels, apply stripes on them in a circle, imitating the tire pattern. Attach a white or yellow circle in the center.
- Make the stairs from gray material.
In addition to the car, to extinguish the fire from pliable plasticine, you can sculpt figures of rescuers, helicopters, airplanes, trees, forest dwellers who also suffer from fires.