O'Reilly logo

CISSP in 21 Days - Second Edition by M. L. Srinivasan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Protecting and securing equipment

Physical security also concerns with the physical protection of equipment as well addressing various security requirements pertaining to the media where the data is stored.

Theft is one of the most important threats that needs to be addressed for personal computer, laptop, and media protection.

Equipment security

Equipment security involves protection from theft and unauthorized access. Some of the controls include the following:

  • Cable locks are used to physically secure PCs and laptop computers. These locks prevent the computers or laptops from being detached and taken away.
  • Encryption is used to make folders and files secure such that unauthorized disclosure and modification is prevented.
  • Full disk encryption is used ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required