Download cisco.camre.ac.uk

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Cyberwarfare wikipedia , lookup

Next-Generation Secure Computing Base wikipedia , lookup

Multilevel security wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Information security wikipedia , lookup

Post-quantum cryptography wikipedia , lookup

Distributed firewall wikipedia , lookup

Unix security wikipedia , lookup

Airport security wikipedia , lookup

Wireless security wikipedia , lookup

Security printing wikipedia , lookup

Mobile security wikipedia , lookup

Cyber-security regulation wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Computer security wikipedia , lookup

Security-focused operating system wikipedia , lookup

Transcript
UNIT 15 WEEK 3 CLASS 1
LESSON OVERVIEW
Pete Lawrence
BTEC National Diploma Organisational System Security
Overview


Recap
Keeping systems and data secure
 Physical
Security
 Biometrics
 Software and network security
Recap
 The
topics covered to date focused on many of the
attacks, scams and issues which impact on the system
security of an organisation or individual
Keeping systems and data secure

Preventing a security incursion, like the attacks
themselves, is a constantly evolving process. The
security measures described in the next series of
lesson are a sample of those in use and are an
introduction to what you may be expected to use in
the ICT industry.
Physical security
While no one would wish to live in a society with a
‘Big Brother ‘figure watching every move, it is
natural for people to desire the assurance that the
working environment and all systems are safe.
Physical security
System maybe secured with the latest anti-virus
system and firewall technology but this will be
useless if anyone can pop into the server room and
copy all the critical data to a USB memory stick.
Physical Security
In the management of a security system, these
features should be present: CCTV, intrusion
detection systems, staff and visitor identification,
access control (sign in /out) system security
personnel, cable and communication shielding and
port lockdown.
Physical Security
Lock and Key security
Equipment Identification
CCTV (Closed Circuit Television)
Intruder detection systems
Staff and visitor identification
Access control (sign in/out system)
Security personnel
Shielding network cables wireless communication systems
Port lockdown