Search for notes by fellow students, in your own course and all over the country.
Browse our notes for titles which look like what you need, you can preview any of the notes via a sample of the contents. After you're happy these are the notes you're after simply pop them into your shopping cart.
Document Preview
Extracts from the notes are below, to see the PDF you'll receive please use the links above
Delwin Thermitus
Cyber Security
Physical Security
-
Physical Security
o Security infrastructure
▪ Doors and locks
▪ Metal detectors
▪ Security personnel
▪ Policies and procedures for anyone entering/exiting
o Surveillance equipment
▪ Cameras/ Microphones
▪ Night vision/ Infrared
▪ Motion Detection
-
Asset Identification – Humans
o ID Badge
▪ Name/ Picture/ Department
o Access Key/ Device
▪ Smart card
▪ USB/ Hardware token
▪ Smart phone
o Biometric
▪ Fingerprints
▪ Eye/ Retina Scans
▪ Voice recognition
-
Asset Identification – Equipment
o Asset Tags
▪ Barcodes
▪ RFID Chips
o Asset inventory
▪ Create a database of all equipment
▪ Update when new equipment is purchased/ old equipment retired
o Tamper Deterrence
▪ Alert if anything is changed
-
Data Disposal/ Deletion
o Electronic (reuse)
▪ Quick reformat – data can still be recovered
• Set up File System
• Install the boot sector
• Clear the master file table
▪ Standards reformat – data cannot be recovered
• Overwrite every sector w/ OS
• Multiple overwrite are preferred
o Physical (Destroy)
▪ Smash, Shred, Drill
▪ Electromagnetically Degausser
▪ Burn/ Melt
-
Dumpster Diving
o Searching the trash for valuable information
▪ Trash or treasure
o Technically legal if not trespassing
o How to protect?
▪ Shred all important documents
▪ Consider burning the shreds
▪ Lock the dumpster
-
Shoulder Surfing
o Employees
▪ Have access to important data
▪ This data displays on the screen
o Snoopers
▪ Competitors
▪ Hackers
▪ Nosey people
o Easy places to shoulder surf
▪ Flights
▪ Coffee shops
▪ offices