Page 626 - StudyBook.pdf
P. 626

610    Chapter 11 • Operational and Organizational Security: Incident Response

                 Access logs require anyone entering a secure area to sign in before entering.
             When visitors require entry, such as when consultants or vendor support staff need
             to perform work in a secure room, an employee of the firm must sign the person
             in. In doing so, the employee vouches for the credibility of the visitor, and takes
             responsibility for this person’s actions.The access log also serves as a record of who
             entered certain areas of a building. Entries in the log can show the name of a vis-
             itor, the time this person entered and left a location, who signed them in, and the
             stated purpose of the visit.
                 Even after a visitor has been given access to an area, a member of the organiza-
             tion should accompany them whenever possible. Doing so ensures that the visitor
             stays in the areas where they are permitted. It also provides a measure of control to
             ensure that the visitor does not tamper with systems or data while they are there.
                 Chaperoning someone who has been given clearance to an area is not always
             possible or desirable. For example, if you have hired an outside party to install
             equipment that is needed for Internet access, you may not want to stand beside the
             installer for an extended period of time. However, workers can be monitored in
             high security locations using video cameras to provide electronic surveillance.This
             provides a constant eye, and allows for review of their actions if an incident occurs.
                 Alarms are another method of notifying people of unauthorized access.Alarms
             can be put on doorways, windows, and other entrances, and set to go off if
             someone enters an area and fails to follow proper procedures. If someone enters an
             incorrect PIN number to unlock a door, or opens a door without deactivating the
             alarm properly, a noise will sound or a signal will be sent to a person or company
             that monitors alarms.Additionally, any number of added defenses can be used to
             sense entry into a secured location. Motion detectors can be used to sense any
             movement in a room, heat sensors can be used to detect body heat, and weight
             sensors can be used to detect the added weight of a person on the floor.While
             such elaborate methods may not be needed everywhere within a building, they are
             viable solutions to detecting unauthorized entries.
                 Computers can also be configured to prevent unauthorized access by locking
             them with passwords. Computers can provide screensavers with password protec-
             tion, so that anyone without the password is unable to access the system. For
             example, Novell NetWare servers provide a password-protected screensaver that can
             be activated by entering the command SCRSAVER ACTIVATE from the server
             prompt.
                 To deactivate the password, the user needs to enter a username and password
             with sufficient privileges.Windows computers also provide password protection on
             screensavers, which prevents access to the machines while the owner or designated



          www.syngress.com
   621   622   623   624   625   626   627   628   629   630   631