Please enable JavaScript.
Coggle requires JavaScript to display documents.
5.1 Understand hardening physical security (Implement Workplace Security,…
5.1 Understand hardening physical security
Identity the need for physical security
Protecting important data,confidential information,network,software,equipment,facilities,company's assets,and personnel
Prevent 2 factors of attacks,nature,and malicious party
necessary if do not want anyone to snatch our information
Identity physical security threats to network
Physical
Electrical
Environmental
Maintenance
Biometrics
Devices that sample a physical or behavior trait
Able to recognize a person on the basis of the unique features of their face,fingerprint,signature,DNA and iris.
Implement Workplace Security
1st Security Agent
-An excellent password protected security utility to secure Windows-based computers
Access Lock
-Is an easy to use security utility which can help you secure your desktop when you are away from your computer
Access Denied XP
-Is a message when you opening the file or folder,eventhough you are the administrator of the Windows XP computer
Desktop Lock
-Is a computer security protection and access control software product
Lockdown Plus PC
-Is a poweful desktop security solution for personal.It prevents users from deleting critical files and application.
Implement PC Lockup
-PC lockup password protects your PC and restricts others from being able to use it while you are away
Securing Network Devices
Secure edge router
-An edge router device primarily enables a local user to connect and transfer data to a network
Assigning Administrative Roles
-A key management task in a horizon view environment is to determine who can use
Using Automated Security Features
-This operation are used in a wide range of applications like control and monitoring system
Monitoring and Managing Devices
-The device must always be monitored as often as possible to ensure network is safe and security password must be properly managed
State the challenges in ensuring pysical security
Obstacles should be placed in the way of potential attackers and physical sites
Hardened against accidents,attacks or environmental disasters.
Physical locations should be monitored using surveillance cameras and notifications systems
Disaster recovery policies and procedures should be tested on a regular basis to ensure safety and to reduce the time it takes to recover