CHAPTER 7
Securing Devices
Based on the scenarios in Chapter 6, you can see that protecting standalone Information Technology (IT) assets offers many challenges. Local host (Computing and Intelligent Control Device) security is implemented on multiple levels that include physical denial of use, limited access to system resources, and active protection against individuals and software intent on corrupting or stealing data. In this chapter, you’ll learn to:
- Identify three security perimeters associated with an end point computing device
- Provide physical security for end point computing devices
- Evaluate BIOS/CMOS Security Options
The Three Layers of Security
If you think of standalone IT or ICS devices in terms of the three layers of security described in Chapter 2, you can think of the outer perimeter as the space around the outside of the physical device and its housing. The inner perimeter should be viewed as the device’s operating system and application programs...