Skip to Main Content
Cybersecurity Essentials
book

Cybersecurity Essentials

by Charles J. Brooks, Christopher Grow, Philip Craig, Donald Short
October 2018
Beginner content levelBeginner
784 pages
17h 34m
English
Sybex
Content preview from Cybersecurity Essentials

CHAPTER 7Securing Devices

Based on the scenarios in Chapter 6, you can see that protecting standalone Information Technology (IT) assets offers many challenges. Local host (Computing and Intelligent Control Device) security is implemented on multiple levels that include physical denial of use, limited access to system resources, and active protection against individuals and software intent on corrupting or stealing data. In this chapter, you’ll learn to:

  • Identify three security perimeters associated with an end point computing device
  • Provide physical security for end point computing devices
  • Evaluate BIOS/CMOS Security Options

The Three Layers of Security

If you think of standalone IT or ICS devices in terms of the three layers of security ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Cybersecurity – Attack and Defense Strategies - Second Edition

Cybersecurity – Attack and Defense Strategies - Second Edition

Yuri Diogenes, Dr. Erdal Ozkaya
Security in Computing

Security in Computing

Shari Lawrence Pfleeger, Charles P. Pfleeger, Jonathan Margulies

Publisher Resources

ISBN: 9781119362395Purchase book