Chapter 7 – Physical Security

Note: A LOT of this chapter is “missing” from the book. That is the book is only 12 pagesI have put over 70 slides in this chapter (one of the longest) These things you should expect to see on the exam. So pay extra attention to these slides! | Security+ All-In-One Edition Chapter 7 – Physical Security Brian E. Brzezicki Note Note: A LOT of this chapter is “missing” from the book. That is the book is only 12 pagesI have put over 70 slides in this chapter (one of the longest) These things you should expect to see on the exam. So pay extra attention to these slides! Physical Security There is NO security without Physical Security We spend A LOT of money on logical (technical) security. However without physical security there is NO security. Physical security is a weak link usually! Attackers can walk off with machines If I can get physical access to your machine I will be able to get whatever info I want or load “bad” software on it, or even just change the root/administrator account password! Plug into a network and attack it from within! Some physical Security Attacks (187) LiveCDs (Knoppix, BackTrack) USB/CDs and “auto play” – talk about this LATER No BIOS/Default BIOS passwords Disk Imaging (how?) Copying off sensitive . | Security+ All-In-One Edition Chapter 7 – Physical Security Brian E. Brzezicki Note Note: A LOT of this chapter is “missing” from the book. That is the book is only 12 pagesI have put over 70 slides in this chapter (one of the longest) These things you should expect to see on the exam. So pay extra attention to these slides! Physical Security There is NO security without Physical Security We spend A LOT of money on logical (technical) security. However without physical security there is NO security. Physical security is a weak link usually! Attackers can walk off with machines If I can get physical access to your machine I will be able to get whatever info I want or load “bad” software on it, or even just change the root/administrator account password! Plug into a network and attack it from within! Some physical Security Attacks (187) LiveCDs (Knoppix, BackTrack) USB/CDs and “auto play” – talk about this LATER No BIOS/Default BIOS passwords Disk Imaging (how?) Copying off sensitive data Physical Security Layers (n/b) Deterrence – fences, guards, signs Reducing/Avoiding damage by Delaying attackers – slow down the attackers (locks, guards, barriers) Detection – motion sensors, smoke detectors Incident assessment – response of guards, and determination of damage level Response procedures – fire suppression, law enforcement notification etc Physical Security Terms and Concepts Bollards Bollards (n/b) Bollards are small concrete pillars, sometimes containing lights or flowers. They are used to stop people from driving through a wall, often put between a building and parking lot. They can be arranged to form a natural path for walking. Fencing (n/b) Can deter and delay intruders, first line of defense Fences 3-4 feet high only deter casual trespassers Fences 6-7 feet high are considered too high to climb easily Fences 8 feet high should are considered serious. Use for Critical areas Walls (n/b) You know what they are Choose a wall with the strength to support the .

Không thể tạo bản xem trước, hãy bấm tải xuống
TỪ KHÓA LIÊN QUAN
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.