TAILIEUCHUNG - Course 2830: Designing security for Microsoft networks - Module 5

Module 5 - Creating a security design for physical resources. In this module, you will determine threats and analyze physical risks to resources in an organization. You will then learn how to design security for facilities, computers, mobile devices, and hardware. You will also learn about implementing disaster recovery as a way to protect physical resources. | Module 5: Creating a Security Design for Physical Resources Overview Determining Threats and Analyzing Risks to Physical Resources Designing Security for Physical Resources Lesson: Determining Threats and Analyzing Risks to Physical Resources Physical Resources to Protect Why Physical Security Is Important Common Threats to Physical Security Practice: Analyzing Risks to Physical Security Physical Resources to Protect Buildings Secure areas in buildings Physical data links Hardware Branch Office Corporate Headquarters Web Server Internet Server LAN LAN Remote User VPN Wireless User Why Physical Security Is Important Attacker Threat Example External Trojan attack on an unsecured workstation An attacker enters the facility unnoticed and loads a Trojan horse that sends all passwords to an FTP site Internal Theft of a password from a server An attacker enters an unlocked server room, exports the passwords from a domain controller, and accesses confidential data External Attacker Corporate Headquarters Internal Attacker Domain Controller Common Threats to Physical Security Resource Threat Buildings Unauthorized entry or exit Remote surveillance Secure areas in buildings Unauthorized access to sensitive computers Theft of disposed data and equipment Physical data links Installation of eavesdropping hardware or software Sabotage of infrastructure Hardware Theft of computers Installation of Trojan horses or viruses Practice: Analyzing Risks to Physical Security Read the scenario Answer the questions Discuss answers as a class 1 2 3 Analysis Lesson: Designing Security for Physical Resources Methods for Securing Facilities Methods for Securing Access to Computers Methods for Securing Portable Computers and Mobile Devices Considerations for Disaster Recovery Planning Practice: Risk and Response Security Policy Checklist Methods for Securing Facilities To secure Consider Entrances to and exits from facilities Hiring security guards Requiring identification badges .

TÀI LIỆU MỚI ĐĂNG
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.