Time
8 hours 33 minutes
Difficulty
Beginner
CEU/CPE
9

Video Transcription

00:05
so threats the physical security. Um, news obvious ones. Bandel is, um, theft war terrorism that you know, those cannon B B threats as well.
00:16
Um, you know, a set of of threats that are sometimes overlooked or natural disasters. So fire, flood, lightning, tornadoes. You know, these are all things that can destroy, you know, infrastructure on and, you know, disrupt operations.
00:36
Ah,
00:37
within within an organization, you think about things such as, like Hurricane Katrina, 9 11 You know, those were those were events that had a profound impact on telecommunications infrastructure. With Katrina, there's local offices that were
00:56
for the telephone, for you,
00:58
telecommunications companies that were flooded, and just not not even just telecom providers. But just regular business is a CZ Well, same thing with with 9 11 there was
01:11
there was a significant amount of damage to you, not just the area where the plane sits, but but the surrounding areas of right. One of risings offices was actually severely severely damaged. So
01:26
I mean, these are things that you need to take into account as well with physical security. So,
01:33
um,
01:36
with, you know, like a tornado or earthquake or something like that, You know, that might be an instance where you need to have more than one physical location. You might have, you know, a particular location, you know, locked down very well. But if all of your assets and all of your data and all of your information is located in one area
01:55
and you have, you know, some kind of natural disaster
01:59
that comes in and wipes out that location well, you know, that's not going to do, you know,
02:05
you're kind of in a hole. So
02:07
when when we talk about physical security, natural disasters, you know, definitely something to be considered as well.
02:15
Checklist for dressing physical security might include, like I was just talking about company location is, you know, is the office located in an area that's susceptible to a certain kind of natural disasters. Floodplain, Uh, is it near
02:35
fault line where there's lots of earthquakes,
02:38
eyes it in an area that's the Thai crime, that kind of thing. Visitor control will talk about this in a minute. But, you know, how do you control people coming into into your organization into the building? You know, how do you keep track of them? You know, What procedures do you have in place to ensure that they're not just gonna go off and kind of
02:58
do their own thing?
03:00
Uh, on their own
03:01
servers, workstations, infrastructure, locations. You know, all of those lock down our your i T assets protected to prevent someone from actually being able to just walk right up and plug right into them on then, you know, access controls. What kind of access controls her place in place? Not just for
03:22
outsiders, but, you know, an organization needs to consider also, you know, access controls for people within people who already have, you know, access to the building. Your insiders
03:36
in a lot of ways or the more dangerous threat because they already have authorized access to, at least,
03:42
you know, some areas of the building. So, you know, access controls is is important to consider not just for outsiders, but for insiders as well. Maintenance. You know how how our maintenance staff handled. So you have outsiders coming in working on the
04:01
the the building's infrastructure.
04:04
Are there controls in place to ensure that you know, they're not gonna, you know, access resource is that they shouldn't be handling on, then issues with wiretapping, remote access

Up Next