Certified Cybersecurity Technician Network Security Controls — Physical Controls PDF

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Summary

This document, from a training module, outlines physical security controls for network devices, including workplace security, reception area management, visitor logs, and server/backup device security within an office environment.

Full Transcript

Certified Cybersecurity Technician Network Security Controls — Physical Controls Exam 212-82 Module 1 Understand the Importance of Physical Security 2 Discuss Various Physical Flow Security Controls 3 Describe Workplace Security 4 Describe Various Environmental Controls Describe Workplace Security T...

Certified Cybersecurity Technician Network Security Controls — Physical Controls Exam 212-82 Module 1 Understand the Importance of Physical Security 2 Discuss Various Physical Flow Security Controls 3 Describe Workplace Security 4 Describe Various Environmental Controls Describe Workplace Security This section explains workplace security in an office environment. Module 06 Page 657 Certified Cybersecurity Technician Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Network Security Controls — Physical Controls Exam 212-82 Reception Area Q00O O The reception area should be spacious and offer a proper scope to control building access, visitor traffic and assess visitor’s behavior Important files and documents or devices should not be kept on the reception desk The design and placement of reception desks should help in discouraging inappropriate access to the administrative area Computers at a reception desk should be positioned so the screens are not visible to visitors Computers at the reception desk must always be locked when the receptionist personnel is away from the desk Reception Area The reception area is the initial point of contact for an individual approaching the organization. The reception area can be vulnerable to physical security breaches as it provides easy access to strangers. Organizations often have regular visits from clients, the general public, invitees, etc. and require staff to greet, assist, and direct them. Receptionists should be able to recognize or identify any unusual behavior from people such as solicitors and peddlers, charity organizations, and ex-employees. The reception personnel should maintain eye contact and non-confrontational facial expressions or posture while meeting people. They should be proficient enough to handle emergency situations and follow procedures to call immediate attention, issue alarms, call for radio, administer first aid, etc. The reception area should be spacious and should offer the scope to control building access and visitor traffic as well as assess visitor behaviors. Reception personnel should observe people entering the building. They should notice and record odd behavior from strangers. Benchmarks should be implemented to judge people arriving at the organization. Their intentions must be noted, and the personnel should identify whether a person is searching for someone or something. Important files and documents or devices should not be kept on the reception desk. The design and placement of reception desks should help in discouraging inappropriate access to the administrative area. Computers at a reception desk should be positioned so that the screens are not visible to visitors and must always be locked when the reception personnel is away from the desk. Module 06 Page 658 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Network Security Controls - Physical Controls Exam 212-82 Visitor Logs 1. A visitor logbook is used to capture and maintain a record of visitors” data whenever they access vigilant zones in the premises. A paper-based logbook records details such as visitor's name, contact details, log-in and logout time, and purpose of access 3. A digital logbook. Digital logbooks also generate emergency notifications to on-site personnel in case of hazardous conditions automatically detects and verifies visitor’'s QR code, static pictures, fingerprints, or ID card swipe via the Internet Copyright © by EC cil All Rights Reserved. Reproduction is Strictly Prohibited. Visitor Logs A visitor logbook is used to capture and maintain a record of visitors’ data whenever they access vigilant zones in the premises. The logbook can either be digitally recorded online using automated software or maintained as a traditional paper-based visitor logbook at the entrance gate. A paper-based loghook records details such as the visitor’s name, contact details, log-in and logout times, and purpose of visit. Alternatively, a digital logbook automatically detects and verifies the visitor’s QR code, static pictures, fingerprints, or ID card swipe via the Internet. Both types of log records provide information about an individual visitor that includes details about the equipment, logbook resources, or premises that they accessed or controlled. Additionally, a digital generates emergency notifications for on-site personnel in case of hazardous conditions. Module 06 Page 659 Certified Cybersecurity Technician Copyright © by EC-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited. 0 TrMEDRLULILY 1ecnnician Network Security Controls - Physical Controls Exam 212-82 Server/Backup Device Security @ Keep critical network asse ts, such as servers and backup devices, in a sep arate room @ Protect the server room and backup devices wit h an appropriate access control @ Keep the server room and backup devices und er video surveillance Server/Backup Device Security " * * " * * * Copyright © by EC-{ L Al Rights Reserved. Reproduction s Strictly Prohibited, Mount CCTV, smart car d, and biometric aut hentication to track unauthorized physical acc and monitor ess to the server and ba ckup devices. Use rack mount servers, This prevents attackers from stealing or damaging the servers, The server should be att ached to a UPS that protec ts it from file damage or due to temporary power corruption loss, Keep the devices in locked drawers, cabinets, or roo ms. Backup devices should be stored at off-site locations and secured. Do not allow employees to leave an area while carrying a backup device sensing alarms to detect. Use motion the movement of any ba ckup device. Implement full disk éncryp tion on backup devices, Module 06 Page 660 Certified Cybersecurity Tech nician Copyright © by EC-C ouncil All Rights Reserved Repr. odii | Certified Cybersecurity Technician Network Security Controls - Physical Controls Exam 212-82 O Keep your network devices and computer equipment in locked cabinets 0O Some cabinets comes with biometric locks and climate control features Q “ | Restrict the use of removable devices such as DVDs, USB pen drives, SD cards, mobile phones, cameras, etc. Q Design and implement acceptable-use policies to manage the use of removable device Q Implement a regular inventory review of removable devices Q Consider using corporate-controlled locked-down devices instead of implementing a bring-your-own-device (BYOD) policy Copyright Reserved. Reproduction is Strictlyly Prohibited pyrig! © by y EC-Council All Rights | Critical Assets and Removable Devices An organization should always pay attention to the security of its server and backup storage devices. At the same time, the organization should not ignore the security of other critical assets such removable as workstations, devices. The server/backup routers organization and switches, should devices for critical assets and employ printers, all the removable other network physical devices. equipment, security Furthermore, measures and of organizations must keep their network devices and computer equipment in locked cabinets. Some cabinets come with biometric locks and climate control features. Restrict the use of removable devices such as DVDs, USB pen drives, SD cards, mobile phones, and cameras. Design and implement acceptable-use policies to manage the use of removable devices. Implement a regular inventory review of removable devices. Consider using corporate-controlled locked-down devices instead of implementing a bring-your-own-device (BYOD) policy. » Workstations: Workstations at unoccupied desks, empty offices, reception desk, etc. are relatively more vulnerable to physical security breaches. Disconnect or remove such unoccupied workstations or otherwise lock the doors to the room where the workstation is located. = Routers and switches: Keep these critical network devices in locked rooms. * Printers: Like servers and workstations, printers can store should be bolted down, and installed at separate locations. = Removable devices: Portable removable devices such as laptops, handheld computers, important information, mobile devices, SD cards, USB, and Bluetooth devices can pose physical security risks. Keep these devices in a drawer or safe, or permanently attach a cable lock. Module 06 Page 661 Certified Cybersecurity Technician Copyright © by EG-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited.

Use Quizgecko on...
Browser
Browser