Analyzing Your Physical Server Security

In today's world of interconnected computers, it almost seems that physical security would be the least of your worries, but consider what can happen if someone has physical access to your server; they can do the following:

  • Boot from a removable disk and bypass Windows security.
  • Install a key-logging device to capture keystrokes from administrators.
  • Remove your physical hard drives or even the entire computer.

Any of these represent the opportunity for someone to copy all of your data, easily breaching any of the computer security that you might have implemented in your environment.

Your physical security involves more than just preventing the loss of your data or equipment through theft; it also is important ...

Get MCITP Administrator: Microsoft® SQL Server™ 2005 Optimization and Maintenance (70-444): Study Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.