Datasheet
Book IX
Chapter 1
Fundamentals
of Security
1049
Understanding Physical Security
✦ Secure server placement. Lock your servers in a room for which only a
select few individuals have the key.
✦ Lock the workstation. When you leave your system, get in the habit of
locking your workstation. A locked workstation can only be unlocked
by yourself or the network administrator. This will prevent other users
from accessing the system while you are away.
✦ Disable boot devices. Dsable the ability to boot from a floppy disk or
CD-ROM in the CMOS setup on the systems.
✦ Set CMOS password. Because most hackers know how to go to CMOS
and enable booting from CD-ROM, make sure that you set a password
on CMOS so that a hacker cannot modify your CMOS settings. Figure 1-4
shows a CMOS password being enabled.
Check out Book II, Chapter 4, to get the lowdown on reconfiguring your
CMOS settings.
Figure 1-4:
Enabling
the CMOS
password.
✦ Disable network ports. To prevent a hacker from entering your office,
plugging into the network, and performing a number of network attacks,
ensure that network ports in lobbies and front entrances are disabled
unless an administrator enables them.
✦ Use a lockdown cable. Use a lockdown cable to tether laptops, projec-
tors, and other types of office equipment to a table or desk. Figure 1-5
shows a lockdown cable being used to secure a laptop. A lockdown
cable usually connects to a special hole in the side of the computer
equipment (look for a picture of a lock next to it).
49_487389-bk09ch01.indd 104949_487389-bk09ch01.indd 1049 9/10/09 11:03 PM9/10/09 11:03 PM