- 68
- 61 277
Worklifecyber
เข้าร่วมเมื่อ 6 ส.ค. 2022
This channel was created to help people navigate through the IT world focusing on cyber security, third party risk management, job entry, interview preparation and more. Switching careers can be daunting regardless of age or qualification. It is a goal of mine to help as much as I can simply because I received so much help from those who have gone before me. I recognize the importance of mentorship and even though I can not mentor everyone privately, my videos over the year will provide massive support and guidance to all my subscribers. I aim to build a community of HELPERS!
Comptia Security+ SYO 701 Free Training | Physical Control | Domain 1 E10
Physical security controls are measures designed to protect the physical assets and infrastructure of an organization. These controls are essential to prevent unauthorized access, damage, or interference with these assets. Here are some common types of physical security controls:
Access Control Systems:
Card Readers and Keypads: Systems that require a card swipe or a code entry to grant access.
Biometric Scanners: Devices that use fingerprint, retina, facial recognition, or other biometric data for authentication.
Mantraps: Double-door systems that prevent tailgating and ensure only authorized individuals gain access.
Surveillance Systems:
CCTV Cameras: Closed-circuit television cameras for monitoring and recording activities in and around the premises.
Motion Detectors: Sensors that detect movement and trigger alarms or cameras.
Security Guards: Personnel who monitor surveillance feeds and patrol the premises.
Perimeter Security:
Fencing: Physical barriers that prevent unauthorized entry to the property.
Security Gates and Bollards: Controlled entry and exit points that restrict vehicle access.
Lighting: Adequate lighting to deter intruders and improve visibility for surveillance systems.
Environmental Controls:
Fire Suppression Systems: Systems designed to detect and suppress fires, such as sprinklers and gas-based suppression systems.
Temperature and Humidity Controls: HVAC systems to maintain optimal conditions for sensitive equipment.
Uninterruptible Power Supplies (UPS): Backup power sources to ensure continuous operation of critical systems during power outages.
Building Controls:
Locks and Deadbolts: Mechanical or electronic locks on doors, windows, and other entry points.
Security Alarms: Systems that detect unauthorized entry or breaches and alert security personnel.
Safe Rooms and Vaults: Secure areas for protecting valuable assets and sensitive information.
Visitor Management:
Sign-in/Sign-out Procedures: Logs to track who enters and leaves the premises.
Visitor Badges: Temporary identification for visitors to ensure they are easily recognizable and tracked.
Escort Policies: Procedures requiring visitors to be accompanied by authorized personnel.
Employee Awareness and Training:
Security Training Programs: Educating employees about physical security policies and procedures.
Emergency Response Drills: Regular drills to prepare staff for potential security incidents, such as fires or intrusions.
Implementing and maintaining effective physical security controls is crucial for protecting an organization's assets, ensuring the safety of personnel, and maintaining the integrity of information and systems. These controls should be part of a broader security strategy that includes administrative and technical measures to create a comprehensive security posture.
Access Control Systems:
Card Readers and Keypads: Systems that require a card swipe or a code entry to grant access.
Biometric Scanners: Devices that use fingerprint, retina, facial recognition, or other biometric data for authentication.
Mantraps: Double-door systems that prevent tailgating and ensure only authorized individuals gain access.
Surveillance Systems:
CCTV Cameras: Closed-circuit television cameras for monitoring and recording activities in and around the premises.
Motion Detectors: Sensors that detect movement and trigger alarms or cameras.
Security Guards: Personnel who monitor surveillance feeds and patrol the premises.
Perimeter Security:
Fencing: Physical barriers that prevent unauthorized entry to the property.
Security Gates and Bollards: Controlled entry and exit points that restrict vehicle access.
Lighting: Adequate lighting to deter intruders and improve visibility for surveillance systems.
Environmental Controls:
Fire Suppression Systems: Systems designed to detect and suppress fires, such as sprinklers and gas-based suppression systems.
Temperature and Humidity Controls: HVAC systems to maintain optimal conditions for sensitive equipment.
Uninterruptible Power Supplies (UPS): Backup power sources to ensure continuous operation of critical systems during power outages.
Building Controls:
Locks and Deadbolts: Mechanical or electronic locks on doors, windows, and other entry points.
Security Alarms: Systems that detect unauthorized entry or breaches and alert security personnel.
Safe Rooms and Vaults: Secure areas for protecting valuable assets and sensitive information.
Visitor Management:
Sign-in/Sign-out Procedures: Logs to track who enters and leaves the premises.
Visitor Badges: Temporary identification for visitors to ensure they are easily recognizable and tracked.
Escort Policies: Procedures requiring visitors to be accompanied by authorized personnel.
Employee Awareness and Training:
Security Training Programs: Educating employees about physical security policies and procedures.
Emergency Response Drills: Regular drills to prepare staff for potential security incidents, such as fires or intrusions.
Implementing and maintaining effective physical security controls is crucial for protecting an organization's assets, ensuring the safety of personnel, and maintaining the integrity of information and systems. These controls should be part of a broader security strategy that includes administrative and technical measures to create a comprehensive security posture.
มุมมอง: 75
วีดีโอ
Comptia Security+ SYO 701 Free Training | Zero Trust | Domain 1 E9
มุมมอง 67หลายเดือนก่อน
Zero Trust is a security model that operates on the principle that no entity, whether inside or outside the network, should be automatically trusted. Instead, every access request must be verified before granting permission. The core tenets of Zero Trust include: Verify Explicitly: Always authenticate and authorize based on all available data points, including user identity, location, device he...
Comptia Security+ SYO 701 Free Training | Gap Analysis | Domain 1 E8
มุมมอง 259หลายเดือนก่อน
Comptia Security SYO 701 Free Training | Gap Analysis | Domain 1 E8
Authentication Authorization Authentication | Comptia Security+ SYO 701 Certification | Domain 1 E7
มุมมอง 733 หลายเดือนก่อน
#comptia #securityplus #cybersecurity
Non - Repudiation | Information Security | Comptia Security+ SYO 701 Training | Domain 1 E6
มุมมอง 783 หลายเดือนก่อน
#securityplus #comptia #cybersecurity #workingmom
CIA TRIAD | Information Security | Comptia Security+ SYO 701 Training | Domain 1 E5
มุมมอง 1364 หลายเดือนก่อน
#cybersecurity #securityplus #workingmom #comptia
Types of Security Controls | Comptia Security+ SYO 701 Training | Domain 1 E4
มุมมอง 1654 หลายเดือนก่อน
@worklifecyber #cybersecurity #securityplus #comptia #workingmom Types of Security Controls
Security Control Categories | Comptia Security+ SYO 701 Training | Domain 1 E3
มุมมอง 1314 หลายเดือนก่อน
#cybersecurity #securityplus #comptia #cybertraining this is a certification prep-course designed to help you further understand Comptia's official study material for the Security certification.
Security Control | Comptia Security+ SYO 701 Training | Domain 1 E2
มุมมอง 1014 หลายเดือนก่อน
#cybersecurity #securityplus #comptia
Overview | Comptia Security+ SYO 701 Training | Domain 1 E1
มุมมอง 2014 หลายเดือนก่อน
#securityplus #studyguide #cybersecurity #workingmom #thirdparty Comptia Security Plus (Security ) Video1 Overview Let’s explore CompTIA Security SY0-701 certification - the gateway to a thriving cybersecurity career! I decided to create a study material for Comptia’s Security Plus certificate because I receive so many requests to do so and I believe most of the question I get on a daily can be...
Virtual Private Network | VPN | worklifecyber
มุมมอง 1726 หลายเดือนก่อน
Virtual Private Network | VPN | worklifecyber
How To Secure Your Home Network | Protect Your Personal Information | worklifecyber
มุมมอง 2046 หลายเดือนก่อน
How To Secure Your Home Network | Protect Your Personal Information | worklifecyber
A Few Areas in Tech Worth Considering | Fields in Tech | Worklifecyber
มุมมอง 1106 หลายเดือนก่อน
A Few Areas in Tech Worth Considering | Fields in Tech | Worklifecyber
How to Avoid First Day At Work Awkwardness | Your First Day at Work Talking Points | WorkLifeCyber
มุมมอง 2696 หลายเดือนก่อน
How to Avoid First Day At Work Awkwardness | Your First Day at Work Talking Points | WorkLifeCyber
How I Pass ISC2 Certified in Cybersecurity Exam | FREE Cybersecurity Certificate | Work Life Cyber
มุมมอง 6227 หลายเดือนก่อน
How I Pass ISC2 Certified in Cybersecurity Exam | FREE Cybersecurity Certificate | Work Life Cyber
A Few Helpful Software For Remote Workers. WorkLifeCyber
มุมมอง 1638 หลายเดือนก่อน
A Few Helpful Software For Remote Workers. WorkLifeCyber
Free Certification in Cybersecurity. An ISC2 Certificate. WorkLifeCyber
มุมมอง 9998 หลายเดือนก่อน
Free Certification in Cybersecurity. An ISC2 Certificate. WorkLifeCyber
Risk Acceptance vs Risk Tolerance. WorkLifeCyber
มุมมอง 4519 หลายเดือนก่อน
Risk Acceptance vs Risk Tolerance. WorkLifeCyber
What is HITRUST? Difference between HITRUST and HIPAA. WorkLifeCyber
มุมมอง 1.6Kปีที่แล้ว
What is HITRUST? Difference between HITRUST and HIPAA. WorkLifeCyber
What to Expect on Your First Day at Work. First Week at Work. First 90 Days at Work.
มุมมอง 1.2Kปีที่แล้ว
What to Expect on Your First Day at Work. First Week at Work. First 90 Days at Work.
HOW I Switched Careers. Transition to Tech. @worklifecyber
มุมมอง 623ปีที่แล้ว
HOW I Switched Careers. Transition to Tech. @worklifecyber
Story time: Career Change: Why I Transitioned.
มุมมอง 806ปีที่แล้ว
Story time: Career Change: Why I Transitioned.
How To Read SOC 2 TYPE 2. Vendor Assessment. SOC Reports. WorkLifeCyber
มุมมอง 7Kปีที่แล้ว
How To Read SOC 2 TYPE 2. Vendor Assessment. SOC Reports. WorkLifeCyber
How to use excel Add-ins. WorkLifeCyber. Add and remove add-ins
มุมมอง 224ปีที่แล้ว
How to use excel Add-ins. WorkLifeCyber. Add and remove add-ins
Awesome ❤ Thanks a lot
Thank u ma ...am really happy for your explanation and examples 😊becaus i so stress out to understand all everything u make it very simple for me it exactly the topic my lecture gave me to do presentation up.but with your explanation i have understand now thank you ma❤
Thanks for sharing.
Thank you
Thank you for sharing your invaluable experience with us. God bless you and your household more in Jesus Mighty Name. (Amen)
Thank you so much for taking the time to do this. It’s been very helpful
My sister, off topic, but your videos has been very helpful for me in my senior role at a major hospital (HITECH vs HIPAA and Zero Trust especially). So they are not just beneficial for beginners, but even for those of us already in the field. God bless you and please never stop making these videos. You're making Ghana proud paaaa.
Thank you.
Very informative, thank you
Great explanation there! With today's Bring Your Own Device (BYOD) concept , device verification is definitely a must
Thank you. Great session and information. I will continue to view your information. Congrats on the Baby!
hello have tried to reach out to you concerning my thirdparty risk analsyt interview how do i get intouch with you
I learned a lot from this as a new person in GRC looking for job. Thank you for doing your best in the community.
I’ll go check all your syllabus if you have done video on COSO and COBIT
Thank you so much
Marvelous
Thanks for dropping the wonderful information.
I went through a similar thing with many rejections and heartbreaks, but God sent me to the right company and I am still growing and learning in the field. All things always work together for our good ankasaa
Congratulations. It was the 2nd cert I was blessed to get after the Security+.
Thank you for taking the time to explain. Please keep it coming I am learning a lot
You got it! Thank you
Please do you have a group or community we can join and ask direct questions
Great explanation there! A video on specific NIST publication in relation to a specific industry idea will be so cool. Big ups to you for all the useful information you provide.
Coming soon! Thank you
Hi, do you have any videos on risk appetite and risk tolerance
Yes I do! th-cam.com/video/aBdAMIfQD4c/w-d-xo.htmlsi=W_oDbEr6ldvnPwpZ
Amazing, thanks for sharing
You are awesome
Best Explanation!!
Great job explaining this!!!
This is really helpful. Well explained!
Thank you for the great insight
You are intelligent and hilarious!!
Thank you for doing this!!
Really benefiting and enjoying these series of lectures. Appreciate the work you have put into it and looking forward to the next instalment.
*Promosm*
Hi, i am glad i came across your channel. You have a new subscriber here! I have always struggled with summarizing a SOC 2 report, like an "overall review / comment". In your experience, how would you summarize the results of your SOC review to the business / vendor owner or stakeholders in general? Looking forward to hearing your ideas or from other commenters. Thank you
Thank you for your educational videos
Your passion for Cybersecurity/IT is infectious....
I have audit-related matters I need to consult with you on and just PMed you.
G = Governance is basically org-level policies encompassing internal and external factors that the org has to adhere to including but not limited to regulations, frameworks, laws, internal controls, etc in support of business objectives. R = Risk: Risk management practices to ensure that the org stays within governing risk appetite and manages risk tolerance or deviations within an acceptable level. C = Compliance ensures and measures adherence to governance requirements, such as regulatory compliance, security and privacy compliance, etc. Here is where tools come into play to implement and measure how compliant the org is over time as well as point-in-time snapshots.
Thanks a billion for sharing this wonderful tips. Awesome channel
Sis you really should’ve gotten into acting. Your skills are 💯💯💯
I love your videos! Straight to the point, no nonsense rambling. But you have such a great sense of humor!
Lol @ drinking plenty of coffee and walking dogs etc. That part cracked me up 😂
I like the way you said "those criminals" 😂😂😂😂
Woooow!!! Thanks for this timely information
You bet!
Thank you for the breakdown ❤
Can you please be my mentor worklifecyber ?
Extremely helpful. Thank you for taking the time 🙏🏾 I’m 7 years in managing risk, 2 years in a risk management role. I’m finishing up my CAPM certification, trying to figure out how to stand out and become an expert.
Good explanation
Hi I am from India, Thank you so much its great explanation it helped me more. could you please help me on SOC 2 control testing?
Thank you. Sure I'll put something up soon