Course Outline
Introduction
- Physical security as the cornerstone of overall security.
Overview of Computer Room Security and Maintenance Best Practices
- Data Center and Server Room Standards.
- Case Study Analysis.
Infrastructure Exposure Risks
- Servers.
- Switches.
- Routers.
- Cabling.
- Storage systems.
- Other connected devices.
How Data Can Be Compromised
- Intercepting data in transit across the network.
- Sniffer software tools.
- Physical connection to network hubs.
- Other methods.
Server Room Access Control
- Mechanical locks.
- Key management.
- Key code systems.
- Log books for tracking entry.
Authorization Processes
- Policies and procedural guidelines.
- Card-based access control.
- Request forms for access.
- Approval workflows.
Electronic Access Systems
- Authentication methods.
- Smart cards.
- Token-based authentication.
- Biometric scanning.
- Password expiration policies.
Computer Room Layout and Design Considerations
- Heating, ventilation, and air conditioning (HVAC) systems.
- Doors, windows, and wall integrity.
- Electrical infrastructure.
- Raised floor systems.
- Server cabinet systems.
- Cable management.
- Alarm systems.
Assessing Vulnerabilities
- Evaluating the physical layout.
- Auditing installed devices.
- Monitoring temperature levels.
- Analyzing network traffic.
- Risks associated with using computer areas as office space.
- Prohibitions on smoking, eating, and drinking.
Surveillance Measures
- Continuous monitoring protocols.
- Strategic camera placement.
- Motion detection technology.
- Notification options for alerts.
Hardware Management and Maintenance
- Workstation security.
- Rack-mounted server management.
- Case security and locking.
- Portable device handling.
Backup Systems
- Disaster recovery planning.
- Ensuring storage devices remain inaccessible to unauthorized users.
Printers and Output Devices
- Securing onboard memory.
- Using paper shredders for sensitive documents.
Communication and Teamwork
- Communicating security policy objectives clearly.
- Gaining management support and buy-in.
- Engaging team members in security efforts.
Follow-up and Evaluation
- Measuring the effectiveness of security implementations.
- Analyzing the impact of security measures over time.
- Identifying and addressing remaining vulnerabilities.
Staying Current
- Resources for physical security updates.
Summary and Conclusion
Requirements
- A foundational understanding of general network and cybersecurity concepts.
- Previous experience with computer room management is advantageous.
Target Audience
- Security professionals.
- Network and hardware engineers.
- Technicians.
- Facilities managers.
- System administrators.
Testimonials (4)
The trainer was helpful..
Attila - Lifial
Course - Compliance and the Management of Compliance Risk
The report and rules setup.
Jack - CFNOC- DND
Course - Micro Focus ArcSight ESM Advanced
learning about Basel
Daksha Vallabh - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
Risk optimization is more clear than the other subjects