tailieunhanh - Course 2830: Designing security for Microsoft networks - Module 5

Module 5 - Creating a security design for physical resources. In this module, you will determine threats and analyze physical risks to resources in an organization. You will then learn how to design security for facilities, computers, mobile devices, and hardware. You will also learn about implementing disaster recovery as a way to protect physical resources. | Module 5: Creating a Security Design for Physical Resources Overview Determining Threats and Analyzing Risks to Physical Resources Designing Security for Physical Resources Lesson: Determining Threats and Analyzing Risks to Physical Resources Physical Resources to Protect Why Physical Security Is Important Common Threats to Physical Security Practice: Analyzing Risks to Physical Security Physical Resources to Protect Buildings Secure areas in buildings Physical data links Hardware Branch Office Corporate Headquarters Web Server Internet Server LAN LAN Remote User VPN Wireless User Why Physical Security Is Important Attacker Threat Example External Trojan attack on an unsecured workstation An attacker enters the facility unnoticed and loads a Trojan horse that sends all passwords to an FTP site Internal Theft of a password from a server An attacker enters an unlocked server room, exports the passwords from a domain controller, and accesses confidential data External Attacker Corporate Headquarters Internal Attacker Domain Controller Common Threats to Physical Security Resource Threat Buildings Unauthorized entry or exit Remote surveillance Secure areas in buildings Unauthorized access to sensitive computers Theft of disposed data and equipment Physical data links Installation of eavesdropping hardware or software Sabotage of infrastructure Hardware Theft of computers Installation of Trojan horses or viruses Practice: Analyzing Risks to Physical Security Read the scenario Answer the questions Discuss answers as a class 1 2 3 Analysis Lesson: Designing Security for Physical Resources Methods for Securing Facilities Methods for Securing Access to Computers Methods for Securing Portable Computers and Mobile Devices Considerations for Disaster Recovery Planning Practice: Risk and Response Security Policy Checklist Methods for Securing Facilities To secure Consider Entrances to and exits from facilities Hiring security guards Requiring identification badges . | Module 5: Creating a Security Design for Physical Resources Overview Determining Threats and Analyzing Risks to Physical Resources Designing Security for Physical Resources Lesson: Determining Threats and Analyzing Risks to Physical Resources Physical Resources to Protect Why Physical Security Is Important Common Threats to Physical Security Practice: Analyzing Risks to Physical Security Physical Resources to Protect Buildings Secure areas in buildings Physical data links Hardware Branch Office Corporate Headquarters Web Server Internet Server LAN LAN Remote User VPN Wireless User Why Physical Security Is Important Attacker Threat Example External Trojan attack on an unsecured workstation An attacker enters the facility unnoticed and loads a Trojan horse that sends all passwords to an FTP site Internal Theft of a password from a server An attacker enters an unlocked server room, exports the passwords from a domain controller, and accesses confidential data External Attacker .