Ch10 - Operational Security - Operational Security...

Info iconThis preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon
Operational Security Operational Security Security+ Guide to Network Security Fundamentals Second Edition Chapter 10
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 Objectives Harden physical security with access controls Minimize social engineering Secure the physical environment Define business continuity Plan for disaster recovery
Background image of page 2
3 Hardening Physical Security with Access Controls Adequate physical security is one of the first lines of defense against attacks Protects equipment and the infrastructure itself Has one primary goal: to prevent unauthorized users from reaching equipment to use, steal, or vandalize Configure an operating system to enforce access controls through an access control list (ACL), a table that defines the access rights each subject has to a folder or file Access control also refers to restricting physical access to computers or network devices
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4 Controlling Access with Physical Barriers Most servers are rack-mounted servers A rack-mounted server is 175 inches (445 cm) tall and can be stacked with up to 50 other servers in a closely confined area Rack-mounted units are typically connected to a KVM (keyboard, video, mouse) switch, which in turn is connected to a single monitor, mouse, and keyboard In addition to securing a device itself, you should also secure the room containing the device Two basic types of door locks require a key: A preset lock (key-in-knob lock) requires only a key for unlocking the door from the outside A deadbolt lock extends a solid metal bar into the door frame for extra security
Background image of page 4
5 Controlling Access with Physical Barriers (continued)
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
6 Controlling Access with Physical Barriers (continued)
Background image of page 6
7 Controlling Access with Physical Barriers (continued) To achieve the most security when using door locks, observe the good practices listed on pages 345 and 346 of the text Cipher locks are combination locks that use buttons you push in the proper sequence to open the door Can be programmed to allow only the code of certain people to be valid on specific dates and times Basic models can cost several hundred dollars each while advanced models can run much higher Users must be careful to conceal which buttons they push to avoid someone seeing the combination (shoulder surfing)
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
8 Controlling Access with Physical Barriers (continued) Other physical vulnerabilities should be addressed, including: Suspended ceilings HVAC ducts Exposed door hinges Insufficient lighting Dead-end corridors
Background image of page 8
9 Controlling Access with Biometrics Biometrics uses a person’s unique characteristics to authenticate that person Some human characteristics used for identification include fingerprint, face, hand, iris, retina, and voice
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 10
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/28/2010 for the course NETWORK SE Security + taught by Professor None during the Three '10 term at University of Sydney.

Page1 / 32

Ch10 - Operational Security - Operational Security...

This preview shows document pages 1 - 10. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online