O'Reilly logo

Hacking For Dummies, 4th Edition by Kevin Beaver

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6

Physical Security

In This Chapter

arrow Understanding the importance of physical security

arrow Looking for physical security vulnerabilities

arrow Implementing countermeasures for physical security attacks

I strongly believe that information security is more dependent on nontechnical policies, procedures, and business processes than on the technical hardware and software solutions that many people and vendors swear by. Physical security, which is the protection of physical property, encompasses both technical and nontechnical components.

Physical security is an often-overlooked but critical aspect of an information security program. Your ability to secure your information depends on your ability to secure your site physically. In this chapter, I cover some common physical security weaknesses as they relate to computers and information security — you should look out for these weaknesses in your systems. I also outline free and low-cost countermeasures you can implement to minimize your business’s physical vulnerabilities.

warning_bomb.eps I don’t recommend breaking and entering, which would be necessary ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required