Lab 14.1.8: Security Checklist Estimated Time: 30 minutes Objective Upon completion of this lab, the student will analyze school computer security policies and offer suggestions for imp
Trang 1Lab 14.1.8: Security Checklist
Estimated Time: 30 minutes
Objective
Upon completion of this lab, the student will analyze school computer security policies and offer suggestions for improvement
Equipment
The following item is needed to complete this exercise:
e Pencil
Scenario
The school computing environment must be reviewed with an emphasis on security The
initial procedures for the review have already been completed
Procedures
Answer the following questions to better assess the level of security at the school
Step 1
List any measures taken to protect the premises against external intruders, such as guards, cameras, fences, and secure parking areas
List any features used to secure the building, such as security doors, locked windows, and guards
List the ways in which access to sensitive areas is controlled, such as by using keys,
combination locks, and proximity readers
Trang 2
Step 2
Is there a security alarm on the building? Is there a separate alarm in the sensitive areas
within the building?
How frequently is access to sensitive areas reviewed? Is it reviewed monthly, semi- annually, annually, or never?
Are key card control measures in place for departing employees?
Are all production servers secured within a controlled access area?
Are all production servers secured within a locked rack?
Are the cases on all production servers locked? Is access to the keys controlled?
Is removable media kept secured at all times? Where is this media secured? Is it secured
in a desk, locked cabinet, next to the server, or offsite?
How recently have the physical security measures been audited? Was it an internal or
external audit? Were any deficiencies corrected?
lf a card reader system is being used, how often is usage monitored? By whom?
How easy is it to get on a computer connected to the network?
Are there any problems with the computer environment security? If so, list the problems and possible solutions
Trang 3
Troubleshooting
The IT department should be up to date on all security measures They should know which personnel can access the main office and the sensitive equipment areas
Reflection
Security is a very important part of the computing world Which companies are most likely
to have very high security measures in place?
Is the security of the school sufficient? Why or why not?