Physical Security Controls

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *

Already have an account? Sign In »

2 hours 19 minutes
Video Transcription
welcome back to student data privacy fundamentals. This lesson is on physical security controls.
In today's video, you will learn best practices for maintaining physical security of data.
Network systems shall be installed in an access controlled area. The area in and around the computer facility shall afford protection against fire, water damage and other environmental hazards such as power outages and extreme temperature situations.
Monitor and maintain data centers, temperature and humidity levels. The American Society of Heating, Refrigerating and Air Conditioning Engineer ER's recommends an inlet temperature range of 68 to 77 degrees and a relative humidity off 40 to 55%
file servers and or physical storage containing P II confidential and or internal information shall be installed in a secure area to prevent theft, destruction or access by unauthorised individuals.
Quiz time was security measures measures. Are your physical data servers protected with?
Pause the video and try to list as many as you know of for your organization.
Physical security controls ensure your network systems at network equipment are properly secured to prevent unauthorized physical access, and data is properly safeguarded. To protect from Los. A record shall be maintained of all personnel who have authorized access,
monitor and control the delivery and removal of all asset tagged and or data storing technological equipment or systems. Maintain a record of all such items entering or exiting their assigned location using the district approved technology inventory program.
No technology equipment, regardless of how purchased or funded, shall be moved without the explicit approval of the technology department.
Ensure that technological equipment or systems being removed for transfer to another organization or being designated as surplus property as appropriately sanitized in accordance with applicable policies and procedures,
computers and other systems shall be secured against use by unauthorized individuals. It is the responsibility of the user to not leave these devices logged in unattended and open to unauthorized use.
Quiz time. What ways can you encourage users to secure their data?
You might pause the video and think about ways to help your users do their part with security protocols.
Monitor and maintain a list of employees with building access and routinely monitor this list to ensure that Onley current employees continue to have that access
monitor and maintain a key card check out system for contractors in order to manage recipients of all key cards distributed
in today's video. We discussed best practices for securing physical data storage, including prevention of theft, unauthorized access and even risks such as fire or other environmental hazards.
In the next lesson, we will discuss asset management. See you soon.
Up Next