Security managers must have a good appreciation of physical security issues to ensure the organisation has the right mechanisms in place to professionally develop and test systems before they’re deployed. This Course looks at the key areas of physical security, including physical, technical and procedural controls, clear screen and clear desk policies, reducing risks when moving property, securely disposing of property and maintaining security in delivery areas.
The objectives of this Course are to provide you with and understanding of:
- Physical, technical and procedural controls, including good environment design and premises security
- Clear screen and clear desk policies
- Reducing risks when moving property
- Securely disposing of property
- Maintaining security in delivery areas
This Course is ideal for members of information security management teams, IT managers, security and systems managers, information asset owners and employees with legal compliance responsibilities. It acts as a foundation for more advanced managerial or technical qualifications.
There are no specific pre-requisites to study this Course, however a basic knowledge of IT, an understanding of the general principles of information technology security, and awareness of the issues involved with security control activity would be advantageous.
We welcome all feedback and suggestions - please contact us at firstname.lastname@example.org if you are unsure about where to start or if would like help getting started.
Welcome to the Physical and Environmental Controls Learning Path.
It’s easy to think that information security is just about protecting systems from attack, keeping sensitive data secure and ensuring the organization has the right mechanisms in place to professionally develop and test systems before they’re deployed. However, there are also environmental risks to information, like power supply problems, natural hazards and the everyday operations of an organization.
Security managers must have a good appreciation of associated physical security issues to ensure there’s a seamless information security management system across the entire organization.
This learning path provides you with the information you need through five pdf resources, covering:
· Physical, technical and procedural controls, like good environment design and premises security;
· Clear screen and clear desk policies;
· Reducing risks when moving property;
· Securely disposing of property; and
· Maintaining security in delivery areas.
These resources can be read through the portal or printed and viewed offline.
Fred is a trainer and consultant specializing in cyber security. His educational background is in physics, having a BSc and a couple of master’s degrees, one in astrophysics and the other in nuclear and particle physics. However, most of his professional life has been spent in IT, covering a broad range of activities including system management, programming (originally in C but more recently Python, Ruby et al), database design and management as well as networking. From networking it was a natural progression to IT security and cyber security more generally. As well as having many professional credentials reflecting the breadth of his experience (including CASP, CISM and CCISO), he is a Certified Ethical Hacker and a GCHQ Certified Trainer for a number of cybersecurity courses, including CISMP, CISSP and GDPR Practitioner.