What physical security measures can be implemented to safeguard equipment?
What will be an ideal response?
Physical Security also was included in Task 1, as follows:
• Survey the security of the computer room at various times and days of the week, and attempt to enter the computer room security perimeter.
• Assure that each entrance is equipped with a suitable security device.
• Determine whether all access doors have internal hinges and electromagnetic locks equipped with a battery backup system.
• Test biometric security devices, if any.
• Test video cameras and motion sensors, if any.
• Check each server and desktop computer case to determine whether it has a locking device.
• Try to identify any server or computer case that would permit the installation of a keystroke logging device.
• Determine whether tamper-evident cases are, or could be, used.
• Find out whether monitor screensavers are being used on any server or workstation that is left unattended. See if BIOS-level passwords, boot-level passwords, or power-on passwords are in use.
• Examine notebook computers to assure that each has been marked or engraved with the company name and address, or a tamper-proof asset ID tag.
• Determine whether notebook computers have a Universal Security Slot (USS) that can be fastened to a cable lock or laptop alarm.
You might also like to view...
By using the tools provided, you can create custom colors as background wallpaper
Indicate whether the statement is true or false
The horizontal axis is also called the value axis.
Answer the following statement true (T) or false (F)