Join Lisa Bock for an in-depth discussion in this video Understanding the importance of physical computer security, part of IT Security Foundations: Network Security.
- Physical Computer Security involves preventing theft, destruction, or tampering of computers, network hardware, or devices, such as an overhead projector. Examples include cutting a fiber optic backbone, theft of a computer or handheld device, or removing RAM or components from a desktop or laptop. There are several Best Practices for physical computer security, but they all involve physical security.
For example, secure access to buildings and rooms, such as server rooms, by using locks, or access cards, and use surveillance, and monitor who enters and exits those rooms. Audit services, users, and administrators to verify compliance with security policies. Secure any backup media, even though this is your backup and not live data, many times sensitive information is held on that backup media. Disable any external drives to that isn't a conduit to extract data.
And protect your printers, many times printers have large hard drives that contain a lot of sensitive information. Some Recommendations, don't leave laptops or handheld devices unattended, ever. Many times thefts occur in an office while away on a perceived short break. Stow any devices left in the car in your trunk and don't forget to lock your car. Purchase and use a laptop cable lock, they're inexpensive, and easy to use.
For air travel, do not check portable IT equipment, bring it with you on the airplane as a carry-on, and protect it. And set computers to require a user password for login, they might obtain your handheld device or laptop but they might not be able to get to the data if a password is required. And when purchasing a laptop bag or a backpack when traveling, select a low-key laptop bag so as if to not scream, there's an expensive IT device in this.
And protect your storage devices such as flash drives or removable hard drives by using encryption, and you might even select one that will activate a self wipe if ten unsuccessful login attempts occur.
Note: This training maps to a number of the exam topics on the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). See https://www.microsoft.com/learning/en-us/exam-98-367.aspx for more information.
- Implementing secure content management (SCM)
- Implementing unified threat management (UTM)
- Introducing VLANs
- NAT addressing
- Network sniffing
- Understanding common attack methods, such as password attacks
- Protecting clients with antivirus software
- Implementing physical security