CHAPTER 7Securing Devices
Based on the scenarios in Chapter 6, you can see that protecting standalone Information Technology (IT) assets offers many challenges. Local host (Computing and Intelligent Control Device) security is implemented on multiple levels that include physical denial of use, limited access to system resources, and active protection against individuals and software intent on corrupting or stealing data. In this chapter, you’ll learn to:
- Identify three security perimeters associated with an end point computing device
- Provide physical security for end point computing devices
- Evaluate BIOS/CMOS Security Options
The Three Layers of Security
If you think of standalone IT or ICS devices in terms of the three layers of security ...
Get Cybersecurity Essentials now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.