O'Reilly logo

Writing Information Security Policies by Scott Barman

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Computer Location and Facility Construction

Twenty years ago, preparing a location for computers meant finding a corner of the basement, installing raised floors panels, enhanced power, an air conditioner, and running cables through the walls and ceilings. It was very common to see wires piled up in offices. Converted janitor closets were used to house communication connectors. Computer rooms were cramped, out of the way, and poorly designed. A lock was put on the door so that only authorized personnel could enter. In essence, the computer systems were treated like idols where the worshipers of information came to pay homage.

During the editing of this chapter, I was reminded also of the environmental dangers caused by poor choices in placement ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required