Physical Security
Intruders don't always use technology to crack into a network. Sometimes they use brute-force methods. For example, if a thief steals your laptop computer, he can often use the "convenience" features of the computer's software to connect to the Internet through your network, read your email and other confidential files, and gain access to other computers connected to the same network. Other low-tech methods include shoulder surfing, where the bad guy watches your screen or your keyboard as you type a login name and password, and social engineering, in which the intruder convinces you to reveal your password or other information because she has convinced you that she has a legitimate use for it.
There are some things you can do ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access