Page 73 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 73

Unit 5: Physical Security




          5.8 Fireproof Safes and Security through Cables and Locks                             Notes

          To maintain physical security, following points should be considered:
          1.   Structural protection should be maximized. Secured rooms should have full height walls
               and fireproof ceilings.
          2.   Secure rooms should only have one or two solid, fireproof, and lockable doors.
          Many modern PC cases comprise a “locking” trait. Generally this will be a socket on the front of
          the case that permits you to turn an incorporated key to a locked or unlocked location. Case
          locks can help avoid someone from stealing your PC,  or opening up the case and  directly
          influencing/stealing your hardware. They can also sometimes avert someone from rebooting
          your computer from their own floppy or other hardware.

          These case locks do unrelated things as per the support in the motherboard and how the case is
          constructed. On many PC’s they make it so you have to rupture the case to get the case open. On
          some others, they will not allow you plug in new keyboards or mice. Check your motherboard
          or case directions for more information. This can at times be a very useful feature, although the
          locks are regularly very low-quality and can simply be beaten by attackers with locksmithing.
          If you put a cable through the machine, attackers would have to cut the cable or smash the case
          to get  into it.  Just putting a padlock  or combo lock via these can be a  good prevention to
          someone robbing your machine.
          Cable locks deter out-in-public, broad-daylight thefts (but not in private places, like your hotel
          room; bolt cutters slice through cables like butter). Most laptops, some desktop PCs, and even
          some flat-panel monitors are designed with standard cable-lock slots.

          Self Assessment

          Fill in the blanks:
          14.  If the company consists of more quantity of people, issue .................... and encourage staff
               to challenge unaccompanied visitors.
          15.  A “.....................” trait is considered as a socket on the front of the case that permits you to
               turn an incorporated key to a locked or unlocked location.

             


             Caselet     Business Value of Security

                  ULLETPROOF your systems before you are hacked! That’s the simple message of
                  Roberta Bragg’s  Hardening Windows Systems, from Tata McGraw-Hill  Publishing
             BCo Ltd. So, “mount your hardening, securing campaign in at least two directions,”
             says chapter 1,  titled `an immediate call to action’. One, the big picture, and two, the
             intimate reality of day-to-day work.
             Hardening takes time and cultural change in organisations is slow. For this, you would
             need “evangelists and disciples, leaders and doers, talkers and strong, silent types”. You
             can effect significant changes in the security posture and actual security status of your
             networks right now by doing things that are under your control, goads Bragg.

                                                                                 Contd...




                                           LOVELY PROFESSIONAL UNIVERSITY                                   67
   68   69   70   71   72   73   74   75   76   77   78