Join Lisa Bock for an in-depth discussion in this video Understanding the importance of physical computer security, part of IT Security Foundations: Network Security.
- Physical Computer Security involves preventing theft,…destruction, or tampering of computers, network hardware,…or devices, such as an overhead projector.…Examples include cutting a fiber optic backbone,…theft of a computer or handheld device,…or removing RAM or components from a desktop or laptop.…There are several Best Practices…for physical computer security,…but they all involve physical security.…
For example, secure access to buildings and rooms,…such as server rooms, by using locks, or access cards,…and use surveillance, and monitor who enters and exits…those rooms.…Audit services, users, and administrators…to verify compliance with security policies.…Secure any backup media, even though this is your backup…and not live data, many times sensitive information is held…on that backup media.…Disable any external drives to that isn't a conduit…to extract data.…
And protect your printers, many times printers…have large hard drives that contain…a lot of sensitive information.…Some Recommendations,…don't leave laptops or handheld devices unattended, ever.…
Note: This training maps to a number of the exam topics on the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). See https://www.microsoft.com/learning/en-us/exam-98-367.aspx for more information.
- Explain how Network Access Protection (NAP) works.
- Recall how server and domain isolation provides extra protection.
- Describe how Network Address Translation (NAT) works.
- Differentiate between DNSSec and DNS.
- Recognize the threat of password attacks.
- Summarize how antivirus software protects your system against malware.
- Cite the three levels for software-restriction policies.