Preview

CISSP Exam Notes - Physical Security

Powerful Essays
Open Document
Open Document
4755 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
CISSP Exam Notes - Physical Security
CISSP Exam Notes - Physical Security

1

CISSP Exam Notes - Physical Security

1. Introduction
1.1 Physical security addresses the physical protection of the resources of an organization, which include people, data, facilities, equipment, systems, etc. It concerns with people safety, how people can physically enter an environment and how the environmental issues affect equipment and systems. People safety always takes precedence over the other security factors.
1.2 Physical security is the first line of defense.
1.3 Major sources of physical security threats are:
Ÿ Weather, e.g. temperature, humidity, water, flood, wind, snow, lightening, etc.
Ÿ Fire and Chemical, e.g. explosion, smoke, toxic material, industrial pollution, etc.
Ÿ Earth movement, e.g. earthquake, volcano, slide, etc.
Ÿ Object movement, e.g. building collapse, falling object, car, truck, plane, etc.
Ÿ Energy, e.g. electricity, magnetism, radio wave anomalies, etc.
Ÿ Equipment , e.g. mechanical or electronic component failure, etc.
Ÿ Organism, e.g. virus, bacteria, animal, insect, etc.
Ÿ Human, e.g. strike, war, sabotage, etc.
1.4 There are three major types of control mechanisms for physical security:
Ÿ Administrative controls, e.g. facility selection, facility construction and management, personnel control, evacuation procedure, system shutdown procedure, fire suppression procedure, handling procedures for other exceptions such as hardware failure, bomb threats, etc.
Ÿ Physical controls, e.g. facility construction material, key and lock, access card and reader, fence, lighting, etc.
Ÿ Technical controls, e.g. physical access control and monitoring system, intrusion detection and alarm system, fire detection and suppression system, uninterrupted power supply, heating / ventilation / air conditioning system (HVAC), disk mirroring, data backup, etc.
1.5 Some physical security controls are required by laws, e.g. fire exit door, fire alarm, etc.

CISSP Exam Notes -

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 5

    • 800 Words
    • 4 Pages

    28. In a class 1b building a lighting system must be installed to assist evacuation of occupants in the event of a fire.…

    • 800 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    a) Physical Security - Is intended to detect and deter unauthorized personnel from gaining access.…

    • 1152 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Psy/250 Appendix G

    • 398 Words
    • 2 Pages

    Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT 2580 Introduction To Information Security Teacher : Mr. Timothy Tacker Unit 10 Assignment 1 Examine Real-World Applications of Security Standards ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++…

    • 493 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Use the Web to research and evaluate security products from two competing vendors, such a...…

    • 428 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Security Assessment

    • 824 Words
    • 4 Pages

    Choose one of the Facts for Consideration sections from Ch. 3 of the text and list the page number for the section you chose. Then, complete the following table. List five threats appropriate to the environment from the section you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures. Once you complete the table, write a brief explanation of the countermeasures for the two threats with the highest risk total, stating how the countermeasure reduces the risk associated with that threat.…

    • 824 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Many high occupancy buildings are now constructed with panic hardware. Panic hardware is used to keep a door locked from the outside, but unlocks when someone pushes on it from the inside. Building code also requires to have signs posted to notify occupants of where the exits are in the building. Doors must now swing outwards to aid in proper escape as doors that swing inward will cause obstruction and reduce total escape time. It is now against the law to have any obstructions in the way of a fire escape route.…

    • 987 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Est1 Task 1

    • 623 Words
    • 3 Pages

    The security rule has meaningful standards that are grouped into five categories; administrative safeguard, physical safeguard, technical standards, organizational standards, and policies, procedures, and documentation requirements. Administrative safeguards have several standards that help implement the security rule. The security operation purpose require organizations to evaluate their risks to security and implement policies and procedures that prohibit, detect, and acceptable security violations and to define appropriate approval for security violations. Another, workforce security has three implementation qualifications that are mandatory by the organizations. The organization has to contain policies and procedures to ensure that each members of the particular…

    • 623 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    2.2 Password protection could be used to ensure security when storing and/or accessing information. Also ensuring that no-one who is…

    • 244 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Why: Physical security must be maintained, because no matter what logical measures are taken, if an unauthorized person is able to gain hands-on access directly to a workstation, they can wreak havoc on the organization’s systems. Since we never know who may be around, it is equally as important to lock or logout of a workstation when leaving the desk, and never leave passwords near it. IT Staff needs to ensure all systems have the appropriate software for both day-to-day operations, as well as workstation security are installed to prevent the need to download more additional software, and prevent malware from being loaded into the system.…

    • 545 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Assignment 26 Safeguarding

    • 4735 Words
    • 19 Pages

    Civil Law is in 2 areas Public Law which puts systems and processes to reduce the risk of children coming to harm and says what action should happen if they are at risk. Private Law sorts out family contact and divorce.…

    • 4735 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Security Interview

    • 1458 Words
    • 5 Pages

    Contact a security manager and conduct the interview listed in Part I (space has been provided for extra questions, should you ask any). Once the interview has been completed, answer the questions in Part II.…

    • 1458 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Principles of safeguarding

    • 1405 Words
    • 6 Pages

    b. Sexual abuse: is the forcing of undesired sexual behaviour by one person upon another…

    • 1405 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Aspects Of Safeguarding

    • 110 Words
    • 1 Page

    “The main aspects of safeguarding are; minimizing the risk of harm to children's welfare and working in full partnership with other agencies to agreed local policies (Department for Education, 2004). The college has a safeguarding procedure in place, any concern about learners and/or colleagues should be documented and passed to senior leader and/or safeguarding officer. All the data documented follows Data Protection Act (1998) “Teacher must keep all records within confidentiality agreements.” There is online form to document concerns and safeguarding officers available on site or via telephone. Attended safeguarding officer’s presentation were I was made aware of how to prevent extremism and radicalization of any vulnerable adults &…

    • 110 Words
    • 1 Page
    Good Essays
  • Good Essays

    CompTIA Security+ (Exam SY0-301) quick reference sheet Table of Contents .............................................................................. Fundamentals............................................................................. Page 1 Threats and Vulnerabilities.....................................................…

    • 5718 Words
    • 23 Pages
    Good Essays