The CISSP exam covers 10 domains, one of which is physical security. Physical security covers facility management, risk identification and perimeter security, among other topics. You'll need to know about several types of physical security measures, including proper door locks, the quality of construction materials, power supply concepts and even environmental controls like water drains and pressure control.
In this domain section of our CISSP Study Guide, you will learn how to make sure physical security is intact by referring to our resources and testing your knowledge with our CISSP practice exam, written by CISSP All-in-one Exam Guide author Shon Harris.
Security convergence is changing the sales channel
In today's environment, several technology areas are promoting major changes that affect the future of security convergence. In this tip, you will learn how the convergence of physical and IT security is changing the sales channel in the information security market.
Improving network security: How to avoid physical security threats
In this part of our Hacker Tactics and Techniques Tutorial, learn how to improve network security and prevent physical security threats as rudimentary as open network jacks.
Defenses for the real world: Physical security measures, policy
Electronic defenses, especially perimeter defenses, can be defeated if attackers gain physical access to IT assets. If you don't maintain physical security in the real world, any and all safeguards you erect in the virtual world may be meaningless.
This tip looks at how to develop a physical security policy for the real world, and examines what types of physical security controls your organization should have in place based on costs, size and several other factors.
Spotlight article: Domain 9, Physical security measures
Information security depends on the security and management of the physical space in which computer systems operate. Learn more about Domain 9 of the Common Body of Knowledge, which addresses the challenges of securing the physical space, its systems and the people who work within it by use of administrative, technical and physical controls.
About the author
Shon Harris, CISSP, MCSE, is the president of Logical Security, an IT security consulting and training company. She is a former engineer in the Air Force's Information Warfare unit, an instructor and the best-selling author of the previous three editions of this book. Shon has taught computer and information security to a wide range of clients, including RSA, the Department of Defense, the Department of Energy, the National Security Agency and many more.