O'Reilly logo

Low Tech Hacking by Sean Lowther, Russ Rogers, Jennifer Jabbusch, Terry Gudaitis, Jack Wiles

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2. Low tech vulnerabilities
Physical security
Information in this chapter
• A Mini Risk Assessment
• Outsider–Insider Threats
• Some Things to Consider for the Security of Your Buildings
• Bomb Threats in Chicago
• Check Those Phone Closets
• Remove a Few Door Signs
• Review Video Security Logs
• Consider Adding Motion-Sensing Lights
• Subterranean Vulnerabilities
• Clean out Your Elephant Burial Ground
• Spot Check Those Drop Ceilings
• Internal Auditors Are Your Friends
• BONUS: Home Security Tips
When it comes to security—whether pertaining to a large corporation or a small home network—physical security can be just as important as technical security. And similar to technical security, with physical security a short-term solution simply will not ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required