Course Outline
Introduction
- Physical security as the cornerstone of comprehensive security measures for government
Overview of Computer Room Security and Maintenance Practices
- Data Center and Server Room Standards
- Case Study
Infrastructure Exposure Risks
- Servers
- Switches
- Routers
- Cables
- Storage Devices
- Other Network Components
How Data Gets Compromised
- Intercepting data in transit across the network
- Use of sniffer software
- Connecting to a hub
- Other Methods
Server Room Access Control
- Locks and Keys
- Key Codes
- Log Books
Authorization Protocols
- Policies and Procedures for Government
- Card Access Systems
- Request Forms
- Approval Processes
Electronic Access Systems
- Authentication Mechanisms
- Smart Card Technology
- Token-Based Authentication
- Biometric Scanning
- Password Expiration Policies for Government
Computer Room Layout and Design Standards
- Heating, Ventilation, and Air Conditioning (HVAC) Systems
- Doors, Windows, and Walls
- Electrical Infrastructure
- Raised Floor Systems
- Server Cabinet Systems
- Cable Management
- Alarm Systems
Assessing Vulnerabilities in Physical Security for Government
- Evaluating the Physical Layout
- Inventory of Devices and Equipment
- Temperature Control
- Traffic Flow Analysis
- Ensuring Computer Rooms Are Not Used as Office Space
- Prohibiting Smoking, Eating, and Drinking
Surveillance and Monitoring Systems
- Continuous Monitoring for Government
- Strategic Camera Placement
- Motion Detection Technology
- Notification Options
Hardware Management and Maintenance Practices
- Workstations
- Rack-Mounted Servers
- Case Lock-Down Procedures
- Portable Devices
Backup Systems for Government
- Disaster Recovery Plans
- Securing Storage Devices
Printers and Security
- On-Board Memory Management
- Use of Paper Shredders
Communication and Teamwork in Security for Government
- Communicating Security Policy Objectives
- Gaining Management Support
- Engaging Team Members
Follow-up and Evaluation of Security Measures for Government
- Measuring the Effectiveness of Security Implementation
- Analyzing Long-Term Effects
- Addressing Identified Vulnerabilities
Keeping Up to Date with Physical Security for Government
- Physical Security Resources and Best Practices
Summary and Conclusion
Requirements
- An understanding of general network and cyber security concepts for government operations.
- Prior experience with computer room management is beneficial.
Audience
- Security professionals
- Network and hardware engineers
- Technicians
- Facilities managers
- System administrators
Testimonials (4)
The trainer was helpful..
Attila - Lifial
Course - Compliance and the Management of Compliance Risk
learning about Basel
Daksha Vallabh - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
Speed of response and communication
Bader Bin rubayan - Lean Business Services
Course - ISO/IEC 27001 Lead Implementer
Risk optimization is more clear than the other subjects