2 cissp ® Official Study Guide Eighth Edition


Understand the security concerns of a wiring closet



Download 19,3 Mb.
Pdf ko'rish
bet409/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   405   406   407   408   409   410   411   412   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Understand the security concerns of a wiring closet.
A wiring closet is where the net-
working cables for a whole building or just a floor are connected to other essential equip-
ment, such as patch panels, switches, routers, LAN extenders, and backbone channels. 


Exam Essentials 
433
Most of the security for a wiring closet focuses on preventing physical unauthorized access. 
If an unauthorized intruder gains access to the area, they may be able to steal equipment, 
pull or cut cables, or even plant a listening device.
Understand how to handle visitors in a secure facility. 
If a facility employs restricted 
areas to control physical security, then a mechanism to handle visitors is required. Often an 
escort is assigned to visitors, and their access and activities are monitored closely. Failing to 
track the actions of outsiders when they are granted access to a protected area can result in 
malicious activity against the most protected assets.
Know the three categories of security controls implemented to manage physical security 
and be able to name examples of each.
The security controls implemented to manage 
physical security can be divided into three groups: administrative, technical, and physical. 
Understand when and how to use each, and be able to list examples of each kind.
Understand security needs for media storage.
Media storage facilities should be designed 
to securely store blank media, reusable media, and installation media. The concerns include 
theft, corruption, and data remnant recovery. Media storage facility protections include 
locked cabinets or safes, using a librarian/custodian, implementing a check-in/check-out 
process, and using media sanitization.
Understand the concerns of evidence storage.
Evidence storage is used to retain logs, drive 
images, virtual machine snapshots, and other datasets for recovery, internal investigations, 
and forensic investigations. Protections include dedicated/isolated storage facilities, offline 
storage, activity tracking, hash management, access restrictions, and encryption.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   405   406   407   408   409   410   411   412   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish