Donald Hester 661899: For Audio Call Toll Free and Use PIN/code
Donald Hester 661899: For Audio Call Toll Free and Use PIN/code
Housekeeping
Maximize your CCC Confer window.
Phone audio will be in presenter-only mode.
Ask questions and make comments using the chat window.
Adjusting Audio
Donald Hester
Introduction
Topics Covered
Policy should:
10
Selecting Internal
areas that need more
control
Determine what
assets require extra
security
Control access of
customers (students)
Restrict computer
access or LAN
access from lobbies
Doors
15
16
Ethernet
Telecom
Wiring closets
Spare jacks
Conduit or cable trays
Printers
Monitors
Audio devices
18
Closed-circuit TV
Wired or wireless
Simplest camera connected to TV
monitor
More complex can detect, recognize, or
identify
Smart CCTV facial recognition technology
Purpose to detect & deter also used in
investigations
Security Applications
Safety Applications
Management Tool
Investigation Tool
Appointment only
21
Keep records
Review records
Records should include:
Name/organization of the person visiting
Signature of the visitor
Form(s) of identification
Date of access, time of entry and departure
Purpose of visit
name/organization of person visited
22
23
24
25
Power generator
How important is uptime?
How reliable is the power grid?
26
27
28
Fire Prevention
Fire Detection
Fire Alarm
Fire Suppression
Fire Drills
29
30
31
34
35
36
37
Plenum space
Requires plenum cabling
Raised false floors
Access to & protect cabling
Drop ceilings can give access to
server rooms
Walls should extend beyond any
false or drop ceilings
42
Tempest
Protect the information
system from information
leakage due to
electromagnetic signals
emanations
43
Shielding from:
44
45
A Communication systems
design to alert, warn or notify a
receiver of an event or danger.
Made up of 3 parts, sensor
(detector) that detects the
condition, and alarm system
circuit to transmit the information
to an annunciator (signal, alarm)
Standards UL, ISO and IEEE
Consider security
before returning a
failed hard drive
Data remanence
Software Data
removers
Degauss
Shredding
Incinerators
Not illegal
Industrial espionage
Some consider it a
hobby
Can find private,
confidential
information on paper
or media or
computers
49
http://www.youtube.com/watch?v=iC38D5am7go
Netbotz
Q&A
Donald E. Hester
CISSP, CISA, CAP, MCT, MCITP, MCTS, MCSE Security, Security+, CTT+
Director, Maze & Associates
University of San Francisco / San Diego City College / Los Positas College
www.LearnSecurity.org | www.linkedin.com/in/donaldehester | www.facebook.com/LearnSec | www.twitter.com/sobca
[email protected]
http://onefortraining.org/