Please enable JavaScript.
Coggle requires JavaScript to display documents.
CHAPTER 3 3.3 PROTECTION PHYSICAL EQUIPMENT - Coggle Diagram
CHAPTER 3
3.3 PROTECTION PHYSICAL EQUIPMENT
`
`
3.3.1 Physical Computer & Network
Equipment Protection Methods
Network infrastructure can be protected by:
• Secured telecommunications rooms, equipment cabinets, and cages
• Cable locks and security screws for hardware devices
• Wireless detection for unauthorized access points
• Hardware firewalls
• Network management system that detects changes in wiring and patch panels
Another method of hardware security is to disable the AutoRun feature of the operating system.
On Windows, AutoRun is executed first, unless it
is disabled.
On Windows Vista and Windows 7, AutoRun is
not allowed to bypass AutoPlay.
Windows XP, AutoRun bypass AutoPlay and might launch an application without prompting the user.
This is a security risk because it can automatically run a malicious program and compromise the system, so it is recommended to disable AutoRun.
To disable AutoRun in Windows XP, follow these steps
Step 1 • Select Start > Run.
Step 2
• Type regedit and click OK.
Step 3 • Navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Cdrom.
1 more item...
• Two- factor Authentication - secured using overlapping protection techniques to prevent unauthorized access to sensitive data.
`
Equipment Protection Methods
• Use cable locks with equipment.
• Keep telecommunication rooms locked.
• Fit equipment with security screws.
• Use security cages around equipment.
• Label and install sensors, such as Radio
Frequency Identification (RFID) tags, one equipment.
• Install physical alarms triggered by motion detection sensors.
• Use webcams with motion-detection and surveillance software.
For access to facilities, there are several
means of protection:
• Card keys that store user data, including level of access
• Biometric sensors that identify physical characteristics of the user, such as fingerprints or retinas
• Posted security guard
• Sensors, such as RFID tags, to monitor equipment
• The number displayed by the token is created from a calculation made with its internal clock and a random number encoded on the token at the factory.
Factors that determine the most effective security equipment to use to secure equipment and data include :
• What type of user access to data is required
• How the equipment is used
• Where the computer equipment is located
• Where it is necessary to use a laptop computer in a public place, a security dongle, ensures that the system locks if the user and laptop are separated.