CHAPTER |
|
4 |
Physical Security |
WHEN DISCUSSING SECURITY, it is easy to get caught up and immersed in the technology and the attacks associated with it. Take care not to forget areas such as physical security, however. The assets the security professional is charged with protecting are not just sitting “in a field” someplace. Each has facilities and other items surrounding it. Hackers know this fact, so they focus not only on trying to break and subvert technology. They also spend significant time looking for weaknesses in the facilities and the physical assets that make structures such as the network possible. If a hacker can gain physical access to a facility, it is more than possible for that attacker to inflict damage to the organization ...
Get Hacker Techniques, Tools, and Incident Handling, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.