SBN

Physical Access Control

How many managers think that it makes no sense to spend money protecting information that can be reconstructed? What can really happen?

Theoretically, anything and everything from the abuse of workers (through natural disasters and industrial espionage) to terrorist attacks. Is our company is prepared for this? Imagine the scenario, 2am, nobody is around to hear the sound of breaking glass and quick steps. The next day, the first employee appears at work and calls the police after spotting the mess. According to police, it was a random act of vandalism.Two weeks later the president convenes a meeting; it turns out that the local newspaper is running a story about your product, and has just revealed that the project has gone millions of dollars over budget. It turned out that a random act of vandalism was really an act of industrial espionage. The intruder had attacked a bootable distribution of Linux operating system and copied the files that belong to the victim company.

Of course, this situation could have been prevented if there were appropriate procedures in place. In practice, anyone who has physical access to a computer can take over your system in seconds. Therefore we will discuss some physical security procedures to try and minimize the risk of attack by introducing appropriate access controls. Each access control has three aspects: physical, administrative, and technological development.

Physical Security Schema

Work on physical security mainly focuses on the physical protection of information, buildings, personnel, installations, and other material resources. Additionally, physical security covers issues related to processes prior criminal activities, espionage, and terrorism. What factors can develop into the biggest direct threats?

  • Staff – dismissal, strikes, illness.
  • Sabotage and vandalism.
  • Hardware failures.
  • Natural disasters – tornadoes, earthquakes, floods, and tsunamis.
  • Man-made disaster – terrorism, (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Adrian Stolarski. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/BIJyKf-_OAM/