* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download cisco.camre.ac.uk
Survey
Document related concepts
Cyberwarfare wikipedia , lookup
Next-Generation Secure Computing Base wikipedia , lookup
Multilevel security wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Information security wikipedia , lookup
Post-quantum cryptography wikipedia , lookup
Distributed firewall wikipedia , lookup
Unix security wikipedia , lookup
Airport security wikipedia , lookup
Wireless security wikipedia , lookup
Security printing wikipedia , lookup
Mobile security wikipedia , lookup
Cyber-security regulation wikipedia , lookup
Cybercrime countermeasures wikipedia , lookup
Transcript
UNIT 15 WEEK 3 CLASS 1 LESSON OVERVIEW Pete Lawrence BTEC National Diploma Organisational System Security Overview Recap Keeping systems and data secure Physical Security Biometrics Software and network security Recap The topics covered to date focused on many of the attacks, scams and issues which impact on the system security of an organisation or individual Keeping systems and data secure Preventing a security incursion, like the attacks themselves, is a constantly evolving process. The security measures described in the next series of lesson are a sample of those in use and are an introduction to what you may be expected to use in the ICT industry. Physical security While no one would wish to live in a society with a ‘Big Brother ‘figure watching every move, it is natural for people to desire the assurance that the working environment and all systems are safe. Physical security System maybe secured with the latest anti-virus system and firewall technology but this will be useless if anyone can pop into the server room and copy all the critical data to a USB memory stick. Physical Security In the management of a security system, these features should be present: CCTV, intrusion detection systems, staff and visitor identification, access control (sign in /out) system security personnel, cable and communication shielding and port lockdown. Physical Security Lock and Key security Equipment Identification CCTV (Closed Circuit Television) Intruder detection systems Staff and visitor identification Access control (sign in/out system) Security personnel Shielding network cables wireless communication systems Port lockdown