Information security depends on the security and management of the physical space in which computer systems operate.
Requires Free Membership to View
In this CISSP Essentials Security School lesson, Domain 9, Physical Security, expert CISSP exam trainer Shon Harris details Domain 9 of the Common Body of Knowledge, which addresses the challenges of securing the physical space, its systems and the people who work within it by use of administrative, technical and physical controls.
Before watching the special Domain 9, Physical Security video below, it's recommended that students first read the Domain 9 spotlight article, which provides an overview of the concepts presented in the video, including facilities management, the ministrative processes that govern the maintenance and protection of the physical operations space, from site selection through emergency response; risk identification and the selection of security protection components; and perimeter security, including typical physical protection controls.
After watching the video, test your comprehension of this material with our Domain 9, Physical Security quiz. Upon completion, return to the CISSP Essentials Security School table of contents to select your next lesson.
About Shon Harris:
Shon
Harris is a CISSP, MCSE and President of Logical Security, a firm specializing in security
educational and training tools. Logical Security offers curriculum, virtual labs, instructor slides
and tools for lease by training companies, security companies, military organizations, government
sectors and corporations.
Shon is also a security consultant, an engineer in the Air Force's Information Warfare unit, an entrepreneur and an author. She has authored two best selling CISSP books, including CISSP All-in-One Exam Guide, and was a contributing author to the book Hacker's Challenge. Shon is currently finishing her newest book, Gray Hat Hacking: The Ethical Hacker's Handbook.
CISSP® is a registered certification mark of the International Information Systems Security Certification Consortium, Inc., also known as ISC(2).
This was first published in September 2008
Security Management Strategies for the CIO
Join the conversationComment
Share
Comments
Results
Contribute to the conversation