1/4
Flashcards covering key concepts related to physical security in cyber operations.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Data value
The importance of data as it holds valuable information that needs protection.
Equipment Locks
Hardware locks designed for computers and networking equipment to secure devices and prevent unauthorized access.
Kensington lock
A type of lock that attaches to laptops and computers, usually with a cable, to secure them from theft.
USB Locks
Devices that can be placed on open USB ports to prevent unauthorized data transfers and secure against booting from USB drives.
Physical Security
Measures taken to protect computers and networks from unauthorized access, theft, or damage, including locking rooms and limiting access.