130 likes | 316 Views
Protecting IT systems. Level 2 Diploma Unit 11 IT Security. Physical security. Options What physical security exists ? What access control exists ? How is visibility of data minimised?. Physical security. In teams: Conduct a security audit of the college
E N D
Protecting IT systems Level 2 Diploma Unit 11 IT Security
Physical security Options • What physical security exists? • What access control exists? • How is visibility of data minimised?
Physical security • In teams: • Conduct a security audit of the college • What physical security exists? • Locks • Biometric controls • CCTV • What access control exists? • Passwords • How is visibility of data minimised? • Positioning of monitors, locking of screens • Passwords on data • DO NOT ATTEMPT TO OVERCOME ANY SECURITY MEASURES.
Audit results (29/3/2011) • Buildings • CCTV • Key card readers • Staff rooms • Computer rooms • Sensitive areas • Workshops • Motion sensors • Window locks • Detectors on LRC exits • IT equipment not visible • Data • Passwords on photocopiers • Passwords on user IDs • Issue • Can read screens in reception by standing behind them • No ID required for students
Physical security • Hardware and peripheral security • Kensington locks • Biometric controls • CCTV • Wireless interception • Faraday cage • Screened cable • IT • Firewalls • Secure mail and web servers • Media-less workstations
Kensington lock • Loop the cable through a hole in a piece of furniture, or around a table leg support, a pipe, etc. • Lock the other end into the Kensington Lock slot on the laptop • Deters theft
Biometric controls • Fingerprint scanners • Access to laptops • Access to memory sticks • Iris recognition • Access to secure areas
CCTV • CCTV helps deter thieves and documents suspicious activities • Can automatically trigger alerts based on motion detection by programmable cameras
Faraday cage and screening • It is a metal enclosure • The shield of a cable protects the internal conductors from electrical noise and prevents signals being intercepted • High security meetings are conducted in Faraday cages to prevent any wireless interference
Firewalls • permits or denies network transmissions based upon a set of rules • protects networks from unauthorized access
Secure servers/DMZ • Dual firewalls give additional protection to the internet facing servers • These servers are in the “demilitarised zone” • The internal network is protected from the untrusted internet
Media less workstations • No USB ports • No hard disk • No optical disk • Boots from the network • All data and applications stored on the network • Cannot be used to copy and remove data