From the course: ISACA Certified Information Systems Auditor (CISA) Cert Prep

Unlock this course with a free trial

Join today to access over 24,900 courses taught by industry experts.

Indicators of attacks, part 2

Indicators of attacks, part 2

- [Instructor] Now an area that's often overlooked is the physical security realm, right? Like we, especially in classes like this, tend to focus technical, technical, technical. We've got to have encryption and firewalls and access control lists and all these different things, but the reality of it is if we don't protect our physical environment, most of that stuff doesn't matter. So we can never overlook the importance of, you know, protecting the ports on our systems, making sure the doors to our server room and our wiring closets are locked, right? Just those basic ideas that we require physical protection through these rooms with sensitive information as well as our sensitive networking equipment. So physical security threats. So much damage can come from just a simple USB device, and that's why a lot of organizations forbid those as far as policy goes. So these can be pathways to infect the network with worms. These can be ways to transfer malware to individual hosts. There are…

Contents