CompTIA Security+ Study Guide (SY0-501)

Slides:



Advertisements
Similar presentations
1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA.
Advertisements

A guide to Real Power Protection
Chapter 7: Physical & Environmental Security
Ethics, Privacy and Information Security
Computer Security Computer Security is defined as:
Social Engineering J Nivethan. Social Engineering The process of deceiving people into giving away access or confidential information Onlinne Phone Offline.
Security: Playing in Safe By: Matt Hill Identification and Access Identification and Access | When Disaster Strikes | Disaster Recovery Plan | Software.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Physical (Environmental) Security.
General Security Principles and Practices Chapter 3.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Information Security Principles and Practices
Lecture 11 Reliability and Security in IT infrastructure.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 16: Physical and Infrastructure Security.
Physical Security Chapter 9.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Chapter 3.  Security Framework  Operational Security Lifecycle  Security Perimeter  Access Control  Social Engineering  Environmental Issues.
CIST 1601 Information Security Fundamentals Chapter 10 Physical and Hardware-Based Security Collected and Compiled By JD Willard MCSE, MCSA, Network+,
1 12. Physical Security ISA 562 Internet Security Theory & Practice.
Technology and Hotel Security Hotel Mgmt. Hospitality Services R. McCann.
每时每刻 可信安全 1 What category of water sprinkler system is currently the most recommended water system for a computer room? A Dry Pipe sprinkler system B Wet.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Module 02: 1 Introduction to Computer Security and Information Assurance Objectives Recognize that physical security and cyber security are related Recognize.
A Secure Frontline September 25, 2003
Physical Security By: Christian Hudson. Overview Definition and importance Components Layers Physical Security Briefs Zones Implementation.
Confidentiality Integrity Accountability Communications Data Hardware Software Next.
BUSINESS B1 Information Security.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
© 2001 POWERVAR, Inc. Your Logo. © 2001 POWERVAR, Inc. Your Logo POWER VIRUSES Preventing Electronic Influenza.
Information Systems Security Operations Security Domain #9.
Physical Site Security.  Personnel  Hardware  Programs  Networks  Data  Protection from:  Fire  Natural disasters  Burglary / Theft  Vandalism.
1 Hardware Security AbdelRahman abu_absah Teacher: Dr. Sanaa al_sayegh.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 16 “Physical and Infrastructure.
Physical (Environmental) Security
P RINCIPLES OF N ETWORKING S ECURITY C HAPTERS 3 & 4 Matt Lavoie NST
Chapter 10: Operational Security Security+ Guide to Network Security Fundamentals Second Edition.
Physical and Environmental Security Chapter 5 Part 2 Pages 457 to 499.
Physical Security Katie Parker and Robert Tribbia Katie Parker and Robert Tribbia Computer Security Computer Security Fall 2008 Fall 2008.
PHYSICAL SECURITY DOMAIN
Copyright ExplorNet™ Operational Procedures Safety and Environmental Computer Engineering Level 1 Objective
POWER FLUCTUATIONS Computer Systems. Power Fluctuations Voltage is the force that moves electrons through a circuit Unsteady voltages are called power.
Physical security By Ola Abd el-latif Abbass Hassan.
High Availability Environments cs5493/7493. High Availability Requirements Achieving high availability Redundancy of systems Maintenance Backup & Restore.
Physical Security Ch9 Part I Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 13 – Physical and.
A+ Computer Repair Lesson 9 Problems Causing Power Events.
The Physical Security in UTM NAWAF OMAR MAN Prof Hafiza Abas.
Residential Security, Access Control, and Surveillance Copyright © 2005 Heathkit Company, Inc. All Rights Reserved Presentation 4 – Secure Installation.
Criminal Justice Intro to Security, Instructor Name Date, Semester Chapter 4: PHYSICAL SECURITY: STRUCTURAL, ELECTRONIC, AND HUMAN PROTECTION SYSTEMS.
Unit 1: Protecting the Facility (Virtual Machines)
Module 5: Designing Physical Security for Network Resources
Onsite CRM Security
Information Systems Security
CS457 Introduction to Information Security Systems
Chapter 2: Introduction to Lab Procedures and Tool Use
Chapter 7 Connecting Computers to a Network
CompTIA Security+ Study Guide (SY0-401)
Risk management.
Information System and Network Security
NETW4005 COMPUTER SECURITY A
Biometrics.
CompTIA Security+ Study Guide (SY0-401)
Biometrics.
Understand mechanisms to control organisational IT security
Chapter 10 Physical Security
Data integrity and security
Objectives Telecommunications and Network Physical and Personnel
Physical Security.
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Presentation transcript:

CompTIA Security+ Study Guide (SY0-501) Chapter 10: Social Engineering and Other Foes

Chapter 10: Social Engineering and Other Foes Compare and contrast types of attacks Explain the importance of physical security controls Compare and contrast various types of controls Given a scenario, carry out data security and privacy practices

Social Engineering Social engineering The process by which intruders gain access to your facilities, your network, and even to your employees by exploiting the generally trusting nature of people. Social engineering attacks (types of) Shoulder surfing Dumpster diving Tailgating Impersonation Hoaxes Whaling Vishing

Principles Behind Social Engineering Authority Intimidation Consensus/social proof Scarcity Urgency Familiarity/liking Trust

Physical Security Access controls Physical barriers A critical part of physical security Physical barriers Objective: to prevent access to computers and network systems Multiple barrier system Having more than one physical barrier to cross Systems should have a minimum of three physical barriers

Chapter 10: Social Engineering and Other Foes Hardware locks and security Involves applying physical security modifications to secure the system(s)and prevent them from leaving the facility Mantraps Require visual identification, as well as authentication, to gain access

Hardware Locks

Chapter 10: Social Engineering and Other Foes Video surveillance Camera vs. guard Fencing/perimeter security Access list Proper lighting Signs Guards Barricades

Chapter 10: Social Engineering and Other Foes Biometrics Use some kind of unique biological trait to identify a person, such as fingerprints, patterns on the retina, and handprints Protected distribution Alarms Motion detection

Chapter 10: Social Engineering and Other Foes Environmental controls HVAC Fire suppression EMI shielding

EMI Interference

Products that Solve Most Electrical Line Problems: Surge protectors Protect electrical components from momentary or instantaneous increases (called spikes) in a power line Power conditioners Active devices that effectively isolate and regulate voltage in a building Backup power Generally used in situations where continuous power is needed in the event of a power loss

Chapter 10: Physical and Hardware-Based Security EMI shielding Electromagnetic interference (EMI) frequency interference (RFI) The process of preventing electronic emissions from your computer systems from being used to gather intelligence and preventing outside electronic emissions from disrupting your information-processing abilities Hot and cold aisles

Hot and Cold Aisles