Page 631 - StudyBook.pdf
P. 631

Operational and Organizational Security: Incident Response • Chapter 11  615

                    Another method of protecting a machine is by setting passwords that prevent
                 unauthorized users from starting up the machine and/or changing the settings.A
                 setup program that allows you to configure the system can be accessed on many
                 machines by pressing the F10 or DEL key when the computer is first turned on.
                 When the setup software appears, there are generally options that allow you to set
                 passwords.A Power-On Password can be set, requiring anyone who starts the com-
                 puter to enter a password before the OS loads.This prohibits hackers from using
                 password-cracking tools to gain entry through the OS.Another password may also
                 be set in the Basic Input Output System (BIOS) to prevent unauthorized persons
                 from accessing the setup software and making changes to the computer. Setting this
                 password also prevents malicious users from configuring Power-On and BIOS pass-
                 words, which would restrict valid users from starting the computer or making
                 system changes.
                    While the methods discussed here provide varying degrees of security, each pro-
                 vides an additional barrier to unauthorized access to a machine. Mixing different
                 methods of access control makes it increasingly difficult for intruders to gain access
                 to data, applications, system settings, and other important aspects of a computer.

                 Physical Barriers

                 One of the easiest methods of securing equipment is the simplest: keep it behind a
                 locked door.There are a variety of different locks that can be used. Some locks
                 require metal keys to open them, much like those used to unlock the front door of
                 a home. Other types may be programmed and have keypads requiring a PIN
                 number or card key to open them.With these more advanced locks, features may
                 be available that allow logging of anyone who enters the area, which is useful for
                 monitoring who entered a secure area at a particular time.
                    If unable to store servers or other equipment in a dedicated server room, con-
                 sider storing them in a locked closet, rack, or cabinet. By locking the equipment up,
                 employees and visitors to a site will not be able to access it without authorization.
                    Whether equipment is stored in a centralized server room or a locked closet, it
                 is important that all sides of the room or closet are secure.Windows should be
                 locked and alarmed, if possible, so that anyone climbing through will be stopped or
                 detected.Air vents can also provide a route into a room, so any large vents should
                 be bolted shut with grates. Even seemingly obscure routes should be blocked or
                 secured. Intruders may be able to crawl into a room through the area between a
                 false ceiling and the real ceiling, or the space between a raised floor and the con-
                 crete beneath.Thus, walls surrounding the room should be extended to reach the




                                                                              www.syngress.com
   626   627   628   629   630   631   632   633   634   635   636