Datasheet

Book IX
Chapter 1
Fundamentals
of Security
1049
Understanding Physical Security
Secure server placement. Lock your servers in a room for which only a
select few individuals have the key.
Lock the workstation. When you leave your system, get in the habit of
locking your workstation. A locked workstation can only be unlocked
by yourself or the network administrator. This will prevent other users
from accessing the system while you are away.
Disable boot devices. Dsable the ability to boot from a floppy disk or
CD-ROM in the CMOS setup on the systems.
Set CMOS password. Because most hackers know how to go to CMOS
and enable booting from CD-ROM, make sure that you set a password
on CMOS so that a hacker cannot modify your CMOS settings. Figure 1-4
shows a CMOS password being enabled.
Check out Book II, Chapter 4, to get the lowdown on reconfiguring your
CMOS settings.
Figure 1-4:
Enabling
the CMOS
password.
Disable network ports. To prevent a hacker from entering your office,
plugging into the network, and performing a number of network attacks,
ensure that network ports in lobbies and front entrances are disabled
unless an administrator enables them.
Use a lockdown cable. Use a lockdown cable to tether laptops, projec-
tors, and other types of office equipment to a table or desk. Figure 1-5
shows a lockdown cable being used to secure a laptop. A lockdown
cable usually connects to a special hole in the side of the computer
equipment (look for a picture of a lock next to it).
49_487389-bk09ch01.indd 104949_487389-bk09ch01.indd 1049 9/10/09 11:03 PM9/10/09 11:03 PM