CHAPTER 5: PHYSICAL SECURITY (5.1.4 IMPLEMENT WORKPLACE SECURITY (access…
CHAPTER 5: PHYSICAL SECURITY
5.1.1 Identify the need for physical security
Prevent two factors of attack, nature and malicious party. The example of nature attack are flood, fire, and power fluctuation. The example of malicious party attack are terrorism,vandalism, and theft.
It is necessary if you do not want anyone to snatch away your information or destroy it.
protecting important data, confidential information, networks, software, equipment, facilities, company’s assets, and personnel
5.1.2 IDENTIFY PHYSICAL SECURITY THREATS TO NETWORKS
physical - Improper installation, selecting wrong components, incomplete devices, lack of knowledge, unsecure or less secure network components
electrical - Irregular power supply (such as fluctuations, high voltage, low voltage or surge voltage) can
environmental - Extreme weather conditions (such as moisture, EMI field, very high or low temperature and humidity)
maintenance - It includes lack of spare parts, poor cabling, incorrect or no labeling on components
5.1.3 EXPLAIN BIOMETRICS IN PHYSICAL SECURITY
devices that sample a physical or behavioral trait—for example, a fingerprint—and compare it with the traits on file to determine whether you are who you claim to be
able to recognize a person on the basis of the unique features of their face, fingerprint, signature DNA or iris pattern and then impart a secure and convenient method for authentication purposes
5.1.4 IMPLEMENT WORKPLACE SECURITY
access lock - an easy to use security utility which can help you secure your desktop when you are away from your computer.
• Access Denied - a message when you opening the file or folder, even though you are the administrator of the Windows XP computer, then most likely you need to reset the file or folder permissions.
1st security agent - An excellent password-protected security utility to secure Windows-based computers
Desktop Lock - computer security protection and access control software product
• Lockdown Plus PC - powerful desktop security solution for personal
implement pc lockup - PC Lockup password-protects your PC and restricts others from being able to use it while you are away
5.1.5 identify securing network devices
ASSIGNING ADMINISTRATIVE ROLES - A key management task in a Horizon View environment is to determine who can use View Administrator and what tasks those users are authorized to perform.
Using automated security features -are used in a wide range of applications like control and monitoring systems, data security applications, factory automation systems, automated message response systems and so on
Securing The Edge Router - primarily enables a local user to connect and transfer data to a network
monitoring and managing devices - monitored as often as possible to ensure network is safe and security password must be properly managed
5.1.6 State the challenges in ensuring physical security
introduction to physical security - the protection of personnel, hardware, software, networks and data from physical actions and events that could cause serious loss or damage to an enterprise, agency or institution