2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet390/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   386   387   388   389   390   391   392   393   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

White Noise White noise
simply means broadcasting false traffic at all times to mask and 
hide the presence of real emanations. White noise can consist of a real signal from another 
source that is not confidential, a constant signal at a specific frequency, a randomly variable 
signal (such as the white noise heard between radio stations or television stations), or even 
a jam signal that causes interception equipment to fail. White noise is most effective when 
created around the perimeter of an area so that it is broadcast outward to protect the inter-
nal area where emanations may be needed for normal operations.


412
Chapter 10 

Physical Security Requirements
White noise
describes any random sound, signal, or process that can 
drown out meaningful information. This can vary from audible frequencies 
to inaudible electronic transmissions, and it may even involve the deliber-
ate act of creating line or traffic noise to disguise origins or disrupt listen-
ing devices.
Control Zone
A third type of TEMPEST countermeasure, a
control zone
, is simply the 
implementation of either a Faraday cage or white noise generation or both to protect a 
specifi c area in an environment; the rest of the environment is not affected. A control zone 
can be a room, a fl oor, or an entire building. Control zones are those areas where emana-
tion signals are supported and used by necessary equipment, such as wireless networking, 
mobile phones, radios, and televisions. Outside the control zones, emanation interception is 
blocked or prevented through the use of various TEMPEST countermeasures.
 Media Storage Facilities 
Media storage facilities should be designed to securely store blank media, reusable media, 
and installation media. Whether hard drives, fl ash memory devices, optical disks, or tapes, 
media should be controlled against theft and corruption. New blank media should be 
secured to prevent someone from stealing it or planting malware on it. 
Media that is reused, such as thumb drives, fl ash memory cards, or portable hard 
drives, should be protected against theft and data remnant recovery.
Data remnants
are 
the remaining data elements left on a storage device after a standard deletion or formatting 
process. Such a process clears out the directory structure and marks clusters as available for 
use but leaves the original data in the clusters. A simple un-deletion utility or data recovery 
scanner can often recover access to these fi les. Restricting access to media and using secure 
wiping solutions can reduce this risk. 
Installation media needs to be protected against theft and malware planting. This will 
ensure that when a new installation needs to be performed, the media is available and safe 
for use. 
Here are some means of implementing secure media storage facilities: 

Store media in a locked cabinet or safe. 

Have a librarian or custodian who manages access to the locked media cabinet. 

Use a check-in/check-out process to track who retrieves, uses, and returns media from 
storage. 

For reusable media, when the device is returned, run a secure drive sanitization or 
zeroization
(a procedure that erases data by replacing it with meaningless data such as 
zeroes) process to remove all data remnants. 

Media can also be verified using a hash-based integrity check mechanism to ensure 
either that valid files remain valid or that a media has been properly and fully sanitized 
to retain no remnants of previous use.


Implement Site and Facility Security Controls 
413
For more security-intensive organizations, it may be necessary to place a security notifi-
cation label on media to indicate its use classification or employ RFID/NFC asset tracking 
tags on media. It also might be important to use a storage cabinet that is more like a safe 
than an office supply shelf. Higher levels of protection could also include fire, flood, electro-
magnetic field, and temperature monitoring and protection.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   386   387   388   389   390   391   392   393   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish