ISC2 - Study Notes 18 Flashcards
Perimeter barriers such as fences and bollards outside the building and locked doors inside the building
Mantraps that control how many people can enter the restricted area at a time and help prevent tailgating
Cameras that can record all activity for any area of interest
Lighting to illuminate potential areas where intruders may try to break into a building
Access badges that personnel wear while inside secure areas
Primary and backup power sources, such as generators and uninterruptible power systems
Heating, ventilation, and air conditioning systems that control temperature and humidity
Physical Controls
Policies are authoritative in nature and provide overall direction. Standards are established norms, which can influence policies. Guidelines and procedures are derived from policies. Guidelines provide recommendations but are not authoritative. Procedures provide individuals with specific action steps to accomplish tasks.
Info
??? helps an organization prepare for emergencies that can interrupt the mission of the business. The ??? uses a ??? to identify critical functions for an organization and then includes plans to keep these critical functions operating. A ??? identifies steps to recover critical systems after a disaster.
Change control helps prevent unintended outages from occurring as a result of changes.
BCP / BCP / BIA / DRP
ensures that information about a system’s configuration is available and helps ensure that similar systems are configured similarly. ??? also ensures the system can later be checked and compared to the baseline to ensure that it hasn’t been reconfigured.
Configuration management
Choose your own device (CYOD) is similar to BYOD, but employees can only connect devices on a preapproved list. Organizations purchase the devices and issue them to employees when using a corporate-owned, personally enabled (COPE) policy.
Info
Two significant risks related to USB devices are data leakage and infection with malware. Losses due to data leakage can be mitigated by encrypting data at rest. Malware infections can be mitigated with antivirus software.
USB Info
A thin client has very little hardware and only minimal software installed on it. It connects over a network to a server for all its data and applications. If the thin client is stolen, no data is lost. ex : VDI is a thin client. In contrast, a computer with an operating system and applications is a thick client.
full device encryption, this helps prevent attackers from accessing data on stolen or lost devices.
Info
includes a unique RSA asymmetric key (called an endorsement key), which the manufacturer embeds into the ??? before shipping it. When users enable the ???, it creates a storage root key, which encrypts application keys. Applications (such as Microsoft BitLocker) create application keys to encrypt an entire disk. Note that it doesn’t encrypt the entire disk drive. Instead, it partitions the disk drive into separate disks. The BitLocker partition remains unencrypted, but BitLocker encrypts the other partition where the data resides.
TPM
uses two or more disks in an array to improve the performance of both read and write operations. However, ??? does not provide any fault tolerance. If one drive in a ??? disk subsystem fails, the entire array fails.
RAID-0
uses two disks in a mirror configuration. Each file is written completely to each drive in the array. If one of the drives ever fails, the other drive still includes complete copies of all of the files.
RAID-1