facilities;
thus, device locks are necessary to thwart these attempts. Cable locks consist of a
vinyl-coated steel cable that can secure a computer or peripheral to a desk or
other
stationary components, as shown in Figure 5-19.
The following are some of the device locks available and their capabilities:
Switch controls Cover on/off power switches
Slot locks Secure the system to a stationary component by the use of steel
cable that is connected to a bracket mounted in a spare expansion slot
Port controls Block access to disk drives or unused serial or parallel ports
Peripheral switch controls Secure a keyboard by inserting an on/off switch
between the system unit and the keyboard input slot
Cable traps Prevent the removal of input/output devices by passing their
Power excess
Spike Momentary high voltage
Surge Prolonged high voltage
Power loss
Fault Momentary power outage
Blackout Prolonged, complete loss of electric power
Power degradation
Sag/dip Momentary low-voltage condition, from one cycle to a few seconds
Brownout Prolonged power supply that is below normal voltage
In-rush current Initial surge of current required to start a load
When selecting a location for a facility, some of the following items are critical to
the decision-making process:
Visibility
Surrounding terrain
Building markings and signs
Types of neighbors
Population of the area
Surrounding area and external entities
Crime rate, riots, terrorism attacks
Proximity to police, medical, and fire stations
Possible hazards from surrounding area
Accessibility
Road access
Traffic
Proximity to airports, train stations, and highways
Crime and disruption prevention through deterrence Fences, security
guards, warning signs, and so forth
Reduction of damage through the use of delaying mechanisms Layers of
defenses that slow down the adversary, such as locks, security personnel, and
barriers
Crime or disruption detection Smoke detectors, motion detectors, CCTV, and
so forth
Continuity policy
BIA
Reliability
Connection
Identify preventive
controls
Implement controls
Migrate risk
I
Packet sequencing
Congestion controls
Usage