2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet660/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   656   657   658   659   660   661   662   663   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Hardware Inventories
Many organizations use databases and inventory applications to perform inventories and 
track hardware assets through the entire equipment lifecycle. For example, bar-code sys-
tems are available that can print bar codes to place on equipment. The bar-code database 
includes relevant details on the hardware, such as the model, serial number, and location. 
When the hardware is purchased, it is bar-coded before it is deployed. On a regular basis, 
personnel scan all of the bar codes with a bar-code reader to verify that the organization 
still controls the hardware.
A similar method uses radio frequency identification (RFID) tags, which can transmit 
information to RFID readers. Personnel place the RFID tags on the equipment and use the 
RFID readers to inventory the equipment. RFID tags and readers are more expensive than 
bar codes and bar-code readers. However, RFID methods significantly reduce the time 
needed to perform an inventory.


Securely Provisioning Resources 
711
Before disposing of equipment, personnel sanitize it. Sanitizing equipment removes all 
data to ensure that unauthorized personnel do not gain access to sensitive information. When 
equipment is at the end of its lifetime, it’s easy for individuals to lose sight of the data that it 
contains, so using checklists to sanitize the system is often valuable. Checklists can include 
steps to sanitize hard drives, nonvolatile memory, and removable media such as compact discs 
(CDs), digital versatile discs (DVDs), and Universal Serial Bus (USB) fl ash drives within the sys-
tem. NIST 800-88r1 and Chapter 5 have more information on procedures to sanitize drives. 
Portable media holding sensitive data is also managed as an asset. For example, an orga-
nization can label portable media with bar codes and use a bar-code inventory system to 
complete inventories on a regular basis. This allows them to inventory the media holding 
sensitive data on a regular basis.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   656   657   658   659   660   661   662   663   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish