Download presentation
Presentation is loading. Please wait.
Published byDerek Baldwin Modified over 9 years ago
1
Physical Site Security
2
Personnel Hardware Programs Networks Data Protection from: Fire Natural disasters Burglary / Theft Vandalism Terrorism
3
Install malware, keyloggers, viruses, etc. Identify / capture credentials Physical network connections Data collection systems access Plant rogue Aps Theft / Dumpster diving
4
Categories Physical: Security guards, lighting, fences, locks, alarms, closed-circuit televisions, man-trap Technical: Firewalls, IDS, filtering and scanning Operational: Policies
5
Lock the server room Establish video surveillance Secure workstations and components Secure portable devices Secure backups Disable removable media devices Secure printers and output Lock picking: http://www.youtube.com/watch?v=WpH_t0u5Ybg http://www.youtube.com/watch?v=WpH_t0u5Ybg http://www.youtube.com/watch?v=d2DxheDJSNQ&feature=related http://www.youtube.com/watch?v=d2DxheDJSNQ&feature=related http://www.youtube.com/watch?v=EmQMO8U_0G0&feature=related http://www.youtube.com/watch?v=EmQMO8U_0G0&feature=related http://www.youtube.com/watch?v=HhbCxaJBI_g&feature=related http://www.youtube.com/watch?v=HhbCxaJBI_g&feature=related
6
Establish a response policy Refine policies Identify (notify?) stakeholders
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.