1 00:00:00,034 --> 00:00:01,800 Physical security. 2 00:00:01,800 --> 00:00:04,030 Physical security is really important 3 00:00:04,030 --> 00:00:05,872 to your organization's network security. 4 00:00:05,872 --> 00:00:08,640 After all, if an attacker is able to touch your network, 5 00:00:08,640 --> 00:00:10,392 your server, or your work stations, 6 00:00:10,392 --> 00:00:12,392 they can take control over those devices 7 00:00:12,392 --> 00:00:13,971 and do whatever they want with them. 8 00:00:13,971 --> 00:00:16,110 While we've been talking a lot in this course 9 00:00:16,110 --> 00:00:18,104 about all of the logical protections you can put in place, 10 00:00:18,104 --> 00:00:20,960 things like firewalls and intrusion detection systems, 11 00:00:20,960 --> 00:00:23,770 router ACLs, passwords, encryption, 12 00:00:23,770 --> 00:00:24,952 and all sorts of things like that, 13 00:00:24,952 --> 00:00:27,939 our physical security is just as important. 14 00:00:27,939 --> 00:00:29,870 Now, physical security is usually 15 00:00:29,870 --> 00:00:31,592 broken down into three main areas. 16 00:00:31,592 --> 00:00:33,640 We have the perimeter, we have the building, 17 00:00:33,640 --> 00:00:36,060 and then we have the room itself. 18 00:00:36,060 --> 00:00:37,120 So, when I start talking about the perimeter, 19 00:00:37,120 --> 00:00:38,970 I'm talking about, as I approach 20 00:00:38,970 --> 00:00:40,832 your building, what is in my way? 21 00:00:40,832 --> 00:00:42,039 Are there fences? 22 00:00:42,039 --> 00:00:43,232 Are there guards? 23 00:00:43,232 --> 00:00:45,490 Is there some sort of vehicle access point? 24 00:00:45,490 --> 00:00:47,552 All of those type of things, that's our perimeter. 25 00:00:47,552 --> 00:00:50,151 What keeps us at bay and away from the building? 26 00:00:50,151 --> 00:00:52,011 Next, we get to the building security. 27 00:00:52,011 --> 00:00:53,651 Is the front door unlocked? 28 00:00:53,651 --> 00:00:55,060 Can I walk right in? 29 00:00:55,060 --> 00:00:56,021 Do I have to show my ID? 30 00:00:56,021 --> 00:00:57,456 Do I have to check in with somebody? 31 00:00:57,456 --> 00:00:58,592 What are the different controls 32 00:00:58,592 --> 00:01:00,757 you're putting in place to secure that building? 33 00:01:00,757 --> 00:01:03,180 And then, finally, we have the security of the room 34 00:01:03,180 --> 00:01:04,610 where your equipment is located. 35 00:01:04,610 --> 00:01:06,728 Now, if this is an office, this is going to be someplace 36 00:01:06,728 --> 00:01:08,560 that people actually work, and so people 37 00:01:08,560 --> 00:01:10,920 have to be able to get in there to access those terminals. 38 00:01:10,920 --> 00:01:12,691 How are you keeping unauthorized people 39 00:01:12,691 --> 00:01:14,119 out of those offices? 40 00:01:14,119 --> 00:01:15,404 And if you're dealing with a server room 41 00:01:15,404 --> 00:01:17,181 or a networking closet, those are places 42 00:01:17,181 --> 00:01:19,360 that people don't normally work inside of. 43 00:01:19,360 --> 00:01:21,409 And so, when nobody's in there, we should be locking those 44 00:01:21,409 --> 00:01:23,910 using some sort of locking mechanism, 45 00:01:23,910 --> 00:01:25,900 whether that's a door lock, an electronic lock, 46 00:01:25,900 --> 00:01:26,981 or some other mechanism. 47 00:01:26,981 --> 00:01:28,368 Now, we'll talk about that all 48 00:01:28,368 --> 00:01:30,283 inside this section of the course.