Page 631 - StudyBook.pdf
P. 631
Operational and Organizational Security: Incident Response • Chapter 11 615
Another method of protecting a machine is by setting passwords that prevent
unauthorized users from starting up the machine and/or changing the settings.A
setup program that allows you to configure the system can be accessed on many
machines by pressing the F10 or DEL key when the computer is first turned on.
When the setup software appears, there are generally options that allow you to set
passwords.A Power-On Password can be set, requiring anyone who starts the com-
puter to enter a password before the OS loads.This prohibits hackers from using
password-cracking tools to gain entry through the OS.Another password may also
be set in the Basic Input Output System (BIOS) to prevent unauthorized persons
from accessing the setup software and making changes to the computer. Setting this
password also prevents malicious users from configuring Power-On and BIOS pass-
words, which would restrict valid users from starting the computer or making
system changes.
While the methods discussed here provide varying degrees of security, each pro-
vides an additional barrier to unauthorized access to a machine. Mixing different
methods of access control makes it increasingly difficult for intruders to gain access
to data, applications, system settings, and other important aspects of a computer.
Physical Barriers
One of the easiest methods of securing equipment is the simplest: keep it behind a
locked door.There are a variety of different locks that can be used. Some locks
require metal keys to open them, much like those used to unlock the front door of
a home. Other types may be programmed and have keypads requiring a PIN
number or card key to open them.With these more advanced locks, features may
be available that allow logging of anyone who enters the area, which is useful for
monitoring who entered a secure area at a particular time.
If unable to store servers or other equipment in a dedicated server room, con-
sider storing them in a locked closet, rack, or cabinet. By locking the equipment up,
employees and visitors to a site will not be able to access it without authorization.
Whether equipment is stored in a centralized server room or a locked closet, it
is important that all sides of the room or closet are secure.Windows should be
locked and alarmed, if possible, so that anyone climbing through will be stopped or
detected.Air vents can also provide a route into a room, so any large vents should
be bolted shut with grates. Even seemingly obscure routes should be blocked or
secured. Intruders may be able to crawl into a room through the area between a
false ceiling and the real ceiling, or the space between a raised floor and the con-
crete beneath.Thus, walls surrounding the room should be extended to reach the
www.syngress.com