From the course: IT Security Foundations: Network Security
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Securing hardware
From the course: IT Security Foundations: Network Security
Securing hardware
- [Instructor] Physical computer security involves preventing theft, destruction, or tampering of computers, network hardware, or devices, such as an overhead projector. Some physical attacks can include cutting a fiber optic backbone, theft of a computer or handheld device, or removing RAM or components from a desktop or laptop. Now, there are several best practices for physical security. For example, secure access to buildings and rooms, such as a server room, by using locks or access cards. You might want to consider surveillance and monitor those who enter and exit the rooms. Audit or log services, users, and administrators to verify compliance with security policies. Secure any backup media. Even though this is your backup and not live data, many times sensitive information is held on that backup media. Disable any external drives so it isn't a method to gain access to your data. And protect your printers. Many times, printers have large hard drives that can contain a lot of…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
-
(Locked)
Using the principle of least privilege3m 47s
-
(Locked)
Controlling access3m 10s
-
(Locked)
Restricting network access3m 30s
-
(Locked)
Protecting buildings5m 16s
-
(Locked)
Securing hardware2m 56s
-
(Locked)
Challenge: Physical security requirements1m 39s
-
(Locked)
Solution: Physical security requirements1m 26s
-
(Locked)
-