Professional Documents
Culture Documents
Week - 10 - Physical Security - A
Week - 10 - Physical Security - A
Different types of fires and the various fire suppression systems designed to limit
1
Key Terms
BIOS
Access control Access tokens Autorun Biometrics
passwords
Closed circuit
Contactless
Bootdisk television Drive imaging False negative
access cards
(CCTV)
Multiple-
False positive Layered access LiveCD Mantrap factor
authentication
Policies and
Smart cards USB devices
procedures
Seven Major Sources of Physical Loss
• Temperature extremes
• Gases
• Liquids
• Living organisms
• Projectiles
• Movement
• Energy anomalies
Controls for Protecting the Secure Facility
A bootable media is used to start the computer and load the drive
This process is often used by people who perform imaging software.
forensic investigations of computers. It makes a bit-by-bit copy of the hard drive or other attached media.
There will be no record of the copy being made.
The information obtained from drive imaging contains every bit of data that is on the computer: any locally
stored documents, locally stored e-mails, and every other piece of information that the hard drive contains.
This data could be very valuable if the machine holds sensitive information about the company.
Remove/disable the Remove/disable the Disallow USB drive Lock up equipment Train all employees:
floppy disk system. optical drive system. keys, either with that contains • To challenge strangers
• If that is not possible, active directory or sensitive data. • To follow procedures
remove the device from registry settings. • To lock workstations before
the boot menu and set a leaving them
BIOS password. • If that is not possible,
implement aggressive anti-
malware scanning.
Access Controls and Monitoring
Mobile computing devices are Physical security becomes How do you protect laptop or
becoming ubiquitous. responsibility of user. mobile device when you are
separated?
Failure of Supporting Utilities and
Structural Collapse