2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet398/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   394   395   396   397   398   399   400   401   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

 Damage 
Addressing fi re detection and suppression includes dealing with possible contamination and 
damage caused by a fi re. The destructive elements of a fi re include smoke and heat, but they 
also include the suppression media, such as water or soda acid. Smoke is damaging to most 
storage devices. Heat can damage any electronic or computer component. For example, 


422
Chapter 10 

Physical Security Requirements
temperatures of 100 degrees Fahrenheit can damage storage tapes, 175 degrees can damage 
computer hardware (that is, central processing unit [CPU] and random-access member 
[RAM]), and 350 degrees can damage paper products (through warping and discoloration). 
Suppression media can cause short circuits, initiate corrosion, or otherwise render equip-
ment useless. All these issues must be addressed when designing a fi re response system. 
Don’t forget that in the event of a fire, in addition to damage caused by the 
flames and your chosen suppression medium, members of the fire depart-
ment may inflict damage using their hoses to spray water and their axes 
while searching for hot spots.
Implement and Manage Physical 
Security 
Many types of physical access control mechanisms can be deployed in an environment to 
control, monitor, and manage access to a facility. These range from deterrents to detection 
mechanisms. The various sections, divisions, or areas within a site or facility should be 
clearly designated as public, private, or restricted. Each of these areas requires unique and 
focused physical access controls, monitoring, and prevention mechanisms. The following 
sections discuss many such mechanisms that may be used to separate, isolate, and control 
access to various areas of a site, including perimeter and internal security.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   394   395   396   397   398   399   400   401   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish