Chapter13 - Security+ Guide to Network Security...

Info iconThis preview shows pages 1–13. Sign up to view the full content.

View Full Document Right Arrow Icon
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 13 Business Continuity
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security+ Guide to Network Security Fundamentals, Third Edition Objectives Define environmental controls Describe the components of redundancy planning List disaster recovery procedures Describe incident response procedures 2
Background image of page 2
Security+ Guide to Network Security Fundamentals, Third Edition Environmental Controls Preventing disruptions or even attacks through environmental controls involves using fire suppression, proper shielding, and configuring HVAC systems 3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security+ Guide to Network Security Fundamentals, Third Edition Fire Suppression Damage inflicted as a result of a fire continues to remain high Fire suppression is an important concern for the safety of employees and business continuity In order for a fire to occur, four entities must be present at the same time: A type of fuel or combustible material Sufficient oxygen to sustain the combustion Enough heat to raise the material to its ignition temperature A chemical reaction that is the fire itself 4
Background image of page 4
Security+ Guide to Network Security Fundamentals, Third Edition 5 Fire Suppression (continued)
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security+ Guide to Network Security Fundamentals, Third Edition Fire Suppression (continued) It is important to use the correct fire suppression system Not only to extinguish the fire but also minimize any residual damage Fires are divided into five categories See Table 13-2 6
Background image of page 6
Security+ Guide to Network Security Fundamentals, Third Edition 7 Fire Suppression (continued)
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security+ Guide to Network Security Fundamentals, Third Edition 8
Background image of page 8
Security+ Guide to Network Security Fundamentals, Third Edition Fire Suppression (continued) In a server closet or room that contains computer equipment Using a handheld fire extinguisher is not recommended because the chemical contents can contaminate electrical equipment Instead, stationary fire suppression systems should be: Integrated into the building’s infrastructure Release the suppressant in the room 9
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security+ Guide to Network Security Fundamentals, Third Edition 10
Background image of page 10
Security+ Guide to Network Security Fundamentals, Third Edition Electromagnetic Shielding Computer systems, cathode ray tube monitors, printers, and similar devices all emit electromagnetic fields That are produced by signals or the movement of data Van Eck phreaking A form of eavesdropping in which special equipment is used to pick up telecommunication signals or data within a computer device By monitoring the electromagnetic fields 11
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security+ Guide to Network Security Fundamentals, Third Edition Electromagnetic Shielding (continued) Faraday cage A metallic enclosure that prevents the entry or escape of an electromagnetic field Consists of a grounded fine-mesh copper screening Telecommunications Electronics Material Protected from Emanating Spurious Transmissions ( TEMPEST ) A secret US government standard
Background image of page 12
Image of page 13
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 53

Chapter13 - Security+ Guide to Network Security...

This preview shows document pages 1 - 13. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online