11.07.2015 Views

Summary

Summary

Summary

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 16: Advanced Security 11Describe and Compare Access Control DevicesComputer equipment and data can be secured using overlapping protection techniques toprevent unauthorized access to sensitive data. An example of overlapping protection is usingtwo different techniques to protect an asset. This is known as two-factor security. Whenconsidering a security program, the cost of the implementation has to be balanced againstthe value of the data or equipment to be protected.One example of a two-factor security technique is as follows:Password (good protection) + Biometrics or Smart Card (good protection) = Two-Factor Security (much better protection)Physical SecurityUse security hardware to help prevent security breaches and loss of data or equipment.Physical security access control measures include the following:■■■■■Lock: The most common device for securing physical areas. If a key is lost, all identicallykeyed locks must be changed.Conduit: A casing that protects the infrastructure media from damage and unauthorizedaccess.Card key: A tool used to secure physical areas. If a card key is lost or stolen, only themissing card must be deactivated. The card key system is more expensive than securitylocks.Video equipment: Records images and sound for monitoring activity. The recordeddata must be monitored for problems.Security guard: Controls access to the entrance of a facility and monitors the activityinside the facility.Network equipment should be mounted in secured areas. All cabling should be enclosed inconduits or routed inside walls to prevent unauthorized access or tampering. Network outletsthat are not in use should be disabled. If network equipment is damaged or stolen, somenetwork users can be denied service.The security policy should specify the level of security required for the organization.Biometric devices, which measure physical information about a user, are ideal for use inhighly secure areas. However, for most small organizations, this type of solution would betoo expensive.Data SecurityYou can protect data by using data security devices to authenticate employee access. Twofactoridentification is a method to increase security. Employees must use both a passwordand a data security device similar to those listed here to access data:

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!