What physical security measures can be implemented to safeguard equipment?
What will be an ideal response?
Physical Security also was included in Task 1, as follows:
• Survey the security of the computer room at various times and days of the week, and attempt to enter the computer room security perimeter.
• Assure that each entrance is equipped with a suitable security device.
• Determine whether all access doors have internal hinges and electromagnetic locks equipped with a battery backup system.
• Test biometric security devices, if any.
• Test video cameras and motion sensors, if any.
• Check each server and desktop computer case to determine whether it has a locking device.
• Try to identify any server or computer case that would permit the installation of a keystroke logging device.
• Determine whether tamper-evident cases are, or could be, used.
• Find out whether monitor screensavers are being used on any server or workstation that is left unattended. See if BIOS-level passwords, boot-level passwords, or power-on passwords are in use.
• Examine notebook computers to assure that each has been marked or engraved with the company name and address, or a tamper-proof asset ID tag.
• Determine whether notebook computers have a Universal Security Slot (USS) that can be fastened to a cable lock or laptop alarm.
You might also like to view...
The main difference between structures and classes is:
a. Whether they default to public or private access. b. How they access member variables. c. That classes always require new be used with them while structures do not. d. There is no difference between structures and classes.
Add accessor and mutator methods to the Book class created in question #13.
What will be an ideal response?
A common exception that occurs when using linked lists is the:
(a) NodeOutOfBoundsException (b) NodeEmptyException (c) NullPointerException (d) NullNodeOccurredException
How does NetBIOS identify a computer system on the network? Select all that apply.
A. By using the MAC address B. By using the IP address C. By using a computer name D. By using a port number