11.07.2015 Views

Summary

Summary

Summary

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 16: Advanced Security 5Worksheet 16.1.1: Answer Security Policy QuestionsIn this worksheet, you will answer security questions regarding the IT Essentials classroom.Refer to the worksheet in IT Essentials: PC Hardware and Software Labs and Study Guide,Third Edition (ISBN 1-58713-198-6). You can complete this worksheet now or wait to doso until the end of the chapter.Explain When and How to Use Security HardwareThe security policy should identify hardware and equipment that can be used to preventtheft, vandalism, and data loss. There are four interrelated aspects to physical security,which are access, data, infrastructure, and the computer, as illustrated in Figure 16-2.Figure 16-2Physical SecurityRestrict access to premises with the following:■■FencesSecurity hardwareProtect the network infrastructure, such as cabling, telecommunication equipment, and networkdevices by implementing the following measures:■■■■Secured telecommunications roomsWireless detection for unauthorized access pointsHardware firewallsNetwork management system that detects changes in wiring and patch panels

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!