19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

In This Chapter<br />

Chapter 6<br />

Physical Security<br />

▶ Understanding the importance of physical security<br />

▶ Looking for physical security vulnerabilities<br />

▶ Implementing countermeasures for physical security attacks<br />

I strongly believe that information security is more dependent on nontechnical<br />

policies, procedures, and business processes than on the technical<br />

hardware and software solutions that many people and vendors swear by.<br />

Physical security, which is the protection of physical property, encompasses<br />

both technical and nontechnical components.<br />

Physical security is an often-overlooked but critical aspect of an information<br />

security program. Your ability to secure your information depends on your<br />

ability to secure your site physically. In this chapter, I cover some common<br />

physical security weaknesses as they relate to computers and information<br />

security — you should look out for these weaknesses in your systems. I also<br />

outline free and low-cost countermeasures you can implement to minimize<br />

your business’s physical vulnerabilities.<br />

I don’t recommend breaking and entering, which would be necessary to test certain<br />

physical security vulnerabilities fully. Instead, approach those areas to see<br />

how far you can get. Take a fresh look — from an outsider’s perspective — at<br />

the physical vulnerabilities covered in this chapter. You might discover holes in<br />

your physical security infrastructure that you had previously overlooked.<br />

Identifying Basic Physical<br />

Security Vulnerabilities<br />

Whatever your computer- and network-security technology, practically any<br />

hack is possible if an attacker is in your building or data center. That’s why<br />

looking for physical security vulnerabilities and fixing them before they’re<br />

exploited is important.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!