Page 675 - StudyBook.pdf
P. 675
Operational and Organizational Security: Incident Response • Chapter 11 659
Summary of Exam Objectives
Physical security is the process of safeguarding facilities, data, and equipment from
bodily contact and environmental conditions.This security is provided through
access control methods such as physical barriers that restrict access through locks,
guards, and other methods. Biometric authentication is also used to prevent access
by using measurements of physical characteristics to determine whether access will
be granted. Unfortunately, even with these methods, nothing can prevent security
from being breached through social engineering, in which the user is tricked into
revealing passwords and other information.
Forensics combines investigative techniques and computer skills for the collec-
tion, examination, preservation, and presentation of evidence. Information acquired
through forensic procedures can be used in the investigation of internal problems
or for criminal or civil cases.Awareness should be promoted so that the users in an
organization know to contact the Incident Response Team when incidents such as
hacking occur, and management supports any investigations conducted by the
team. Because any evidence acquired in an investigation may be used in court pro-
ceedings, it is vital that strict procedures be followed in a forensic investigation.
Risk is the possibility of loss, and may come in the form of natural disasters,
internal theft, viruses, or any number of other potential threats.To address this pos-
sibility, risk management is used to identify potential threats and develop methods
of dealing with them before they occur. Risk management requires a company to
identify what risks may affect them, the assets that are related to certain risks, the
likelihood and impact of each risk occurring, and methods to reduce the damage
that may be caused if they do occur.
Exam Objectives Fast Track
Physical Security
Physical security protects systems from physical threats, such as those
resulting from bodily contact and environment conditions.
Restricted areas like server rooms require all areas to be secure.This
includes false ceilings and floors, walls, doors and other areas that could be
used as points of access.This may involve installing barriers, alarms,
scanners, locks or other security mechanisms.
www.syngress.com