A countermeasure is a strp planned and taken in opposition to another act or potential act. Physical Security Countermeasures The following countermeasures address physical security concerns that could affect your site(s) and equipment. These strategies are recommended when risk assessment identifies or confirms the need to counter potential breaches in the physical security of your system. Create a Secure Environment: Building and Room Construction:17
Select only those countermeasures that meet percuived needs as indentified during risk assessment (Chapter 2) and support security policy (Chapter 3).
Recognize that some countermeasures are ideals and may not be feasible if, for example, your organization is housed in an old building.
Rebuff Theft:18
While the X-ray conveyor belt is the preferred way of transporting a laptop through airport security (compared to subjecting the computer to the magnetic fields of walk-through or wand scanners), it is also a prime place for theft. Thieves love to "inadvertently" pick up the wrong bag and disappear while passengers are fumbling through their pockets to find the loose coins that keep setting off the metal detectors. Use the X-ray conveyor belt, but never take your eyes off your laptop! Require laptop users to read the recommended travel guidelines that should come with the equipments's documentation.
It Really Happens! Jack's briefcase was his life. Well, maybe it wasn't his whole life, but it definitely contained the better part of his professional life. It held his grade book, his lesson plans, his master's thesis--all very important things in the world of a middle school teacher. And it wouldn't be an exaggeration to say that Jack sure was surprised when his life (the briefcase) went up in flames one afternoon in the school cafeteria. He couldn't explain it, but nonetheless he found himself sitting in front of the district technologist trying to do exactly that--explain why his briefcase caught on fire and ruined, among more important things to him, the spare battery he was carrying for the school's laptop computer. "So," the technologist asked, "you're saying that you're surprised that your briefcase caught on fire? Well, let me tell you, I'm glad that it was only your bag that was damaged. Didn't you know that the exposed terminals of a battery can cause a spark? Didn't you know that any piece of metal, even a paper clip, can serve as the conduit? That's all it takes: an improperly stored battery, a paper clip and anything combustible--and wham, you've got yourself a fire. Your home could have gone up in flames last night because of it. Or your school could have this afternoon. Didn't you know that?" Jack almost replied that, of course, he hadn't known about all of those dangers, and that the technologist should have warned him about them before he had borrowed the laptop and extra battery. But instead he just shook his head sheepishly. After all, along with his grade book, lesson plans, and master's thesis, he had just burned a $200 dollar laptop battery that didn't belong to him. Regulate Power Supplies:
Pay attention to the manufacturer's recommendations for storing portable computer batteries--they carry live charges and are capable of igniting fires if not handled properly.
Protect Output:
It Really Happens! Dr. Hamilton was everything that a school district could ask for. She was a great visionary, a trusted leader, and an excellent superintendent... but she was terrible with the piles of paper she kept on her desk. Luckily for her and the district, she had an equally competent secretary. Lucy was always one step ahead of Dr. Hamilton with the paperwork. She knew where to find the latest draft of the letter to the Board. She knew which form needed to be completed by when. She knew how many copies of the monthly report needed to be run off. One afternoon, Dr. Hamilton came running out of her office to Lucy's desk, "You haven't shredded those papers I gave you this morning yet, have you?" As was always the case, Lucy had, of course, completed the task shortly after it had been handed to her. She told Dr. Hamilton so, and asked what was the matter. "I think that I accidentally gave you my only copy of the speech I'm giving to the Chamber of Commerce tonight," the distraught woman replied, knowing that she'd never be able to reproduce the outline in time for the meeting. "Don't worry," Lucy said, beaming with pride that her forethought was about to again pay off, "I make backup copies of every sheet of paper you give me before I turn on that paper shredder. Let's look in my filing cabinet." Dr. Hamilton let out a deep sigh of relief--Lucy had again saved the day. Suddenly, however, the astute superintendent paused, "What do you mean you make copies of everything I give you before you turn on the paper shredder?"
Physical Security Checklist While it may be tempting to simply refer to the following checklist as your security plan, to do so would limit the effectiveness of the recom-mendations. They are most useful when initiated as part of a larger plan to develop and implement security policy throughout an organization. Other chapters in this document also address ways to customize policy to your organization's specific needs--a concept that should not be ignored if you want to maximize the effectiveness of any given guideline. Security Checklist for Chapter 5The brevity of a checklist can be helpful, but it in no way makes up for the detail of the text.
Do this to your computer if you are just stepping away from the PC for a short time but you still want to prevent unauthorized use of the computer?Lock Your Desktop With a Password-protected Screensaver. Right-click on your desktop.. Select Personalize.. At the bottom of the window that opens, click Screen Saver.. In the Wait box, set the amount of time your computer can be inactive before the screen saver turns on.. What protects devices against unauthorized access?Software firewall - A software firewall is a software program you install on your computer to helps protect it from unauthorized incoming and outgoing data. A software firewall will protect only the computer on which it has been installed. Additionally, many antivirus scanners include a software firewall.
How do I protect my Windows computer?Tips to protect your computer. Use a firewall. ... . Keep all software up to date. ... . Use antivirus software and keep it current. ... . Make sure your passwords are well-chosen and protected. ... . Don't open suspicious attachments or click unusual links in messages. ... . Browse the web safely. ... . Stay away from pirated material.. What can TODD do to change this view so that he can find the Power Options icon in the Control Panel?What can Todd do to change this view so that he can find the Power Options icon in the Control Panel? b. Change to Classic view. Where can Regina find information about the system crash in Windows?
|