Download presentation
Presentation is loading. Please wait.
Published byAnnabel Harris Modified over 8 years ago
1
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to accompany the courseware may be copied, photocopied, reproduced, or re-used in any form or by any means without permission in writing from a director of gtslearning International Limited. Violation of these laws will lead to prosecution. All trademarks, service marks, products, or services are trademarks or registered trademarks of their respective holders and are acknowledged by the publisher. All gtslearning products are supplied on the basis of a single copy of a course per student. Additional resources that may be made available from gtslearning may only be used in conjunction with courses sold by gtslearning. No material changes to these resources are permitted without express written permission by a director of gtslearning. These resources may not be used in conjunction with content from any other supplier. If you suspect that this course has been copied or distributed illegally, please telephone or email gtslearning. 5.1 Site Security CompTIA Server+ Certification (Exam SK0-004)
2
Objectives Describe the use of zones, barriers, gateways, and surveillance in planning and implementing site security Use encryption and media disposal techniques to protect data Understand what to do in an emergency situation and the basics of fire prevention and suppression systems 5.1 Site Security 377
3
Authentication Technologies Factors o Something you know (such as a password) o Something you have (such as a smart card) o Something you are (such as a fingerprint) Single and multi-factor systems o Two-factor o Multifactor 5.1 Site Security 377
4
Designing a Secure Site Reasons for physical controls Defense in Depth Security zones 5.1 Site Security 380
5
Site Security Controls Door access controls ID cards and badges Turnstiles and mantraps 5.1 Site Security 382
6
Surveillance Security guards Video monitoring and CCTV Physical access logs / lists Staff 5.1 Site Security 384
7
Hardware Security (Images © 2014 HP) 5.1 Site Security 386
8
File / Folder Encryption Encrypting File System (EFS) User password generates the key Key backup / recovery 5.1 Site Security 387
9
Full Disk Encryption (BitLocker) Permissions do not protect data if disk is removed BitLocker provides volume encryption Data can only be accessed with the key o Key can be stored on Trusted Platform Module (TPM) chip or USB o Recovery key provides backup access method 5.1 Site Security 388
10
Database encryption Tape encryption Troubleshooting encryption issues o Lost key / key not present at boot Other Encryption Types 5.1 Site Security 389
11
Data Disposal Methods Fully erasing hard disks (and other media) OS deletes and formats can leave data remnants Solutions o Overwriting / wiping o Low-level format o Destruction o Encryption 5.1 Site Security 390
12
Fire prevention Building layout and emergency alert system o Prevent spread of fire o Allow easy exit o Provide warning to occupants and alert fire department Escape plans, routes, and drills Fire Prevention and Emergency Procedures 5.1 Site Security 392
13
The Fire Triangle Fire classes and extinguisher types Sprinkler systems Fire Suppression Systems 5.1 Site Security 393
14
Review Describe the use of zones, barriers, gateways, and surveillance in planning and implementing site security Use encryption and media disposal techniques to protect data Understand what to do in an emergency situation and the basics of fire prevention and suppression systems 5.1 Site Security 395
15
Labs Lab 15 / Disk Encryption 5.1 Site Security
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.