Hacking: Computer Hacking, Security Testing,Penetration Testing, and Basic Security! by Gary Hall & Erin Watson
Author:Gary Hall & Erin Watson [Hall, Gary]
Language: eng
Format: epub
Published: 2017-12-13T05:00:00+00:00
Chapter 8: Physical Security
What is the point of an organization spending millions of dollars to secure its networks with advanced data-protection software, only to forget about plugging its physical vulnerabilities? Physical security of data is often taken very lightly, with most people not even realizing that hackers find it way too easy to walk in through the front door.
A malicious hacker can penetrate any system or network if they can just gain physical access into a building or data center. For this reason, searching for any fixing any physical security loopholes before hackers exploit them is paramount.
Malicious hackers are always on the lookout for any physical security vulnerabilities. For example:
Lack of front-desk personnel to monitor entry and exit of people.
Lack of a guest sign-in book or an escort for visitors.
Failure by employees to verify the identity of uniformed vendor servicemen or repairmen who claim they have permission to work on computers or copiers.
Using conventional keys that anyone can make copies of.
Computer rooms that can be accessed by the public.
Doors that do not close properly.
Laptops, tablets, and other digital devices left lying around unattended.
Failure to shred sensitive information and throwing it in the trash instead.
These are just a few examples of some of the vulnerabilities that malicious hackers can easily exploit to gain physical access to a data center.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Deep Learning with Python by François Chollet(12571)
Hello! Python by Anthony Briggs(9916)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(9796)
The Mikado Method by Ola Ellnestam Daniel Brolund(9778)
Dependency Injection in .NET by Mark Seemann(9340)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8298)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(7763)
Grails in Action by Glen Smith Peter Ledbrook(7696)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(7557)
Becoming a Dynamics 365 Finance and Supply Chain Solution Architect by Brent Dawson(7076)
Microservices with Go by Alexander Shuiskov(6843)
Practical Design Patterns for Java Developers by Miroslav Wengner(6764)
Test Automation Engineering Handbook by Manikandan Sambamurthy(6703)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6413)
Angular Projects - Third Edition by Aristeidis Bampakos(6108)
The Art of Crafting User Stories by The Art of Crafting User Stories(5638)
NetSuite for Consultants - Second Edition by Peter Ries(5570)
Demystifying Cryptography with OpenSSL 3.0 by Alexei Khlebnikov(5375)
Kotlin in Action by Dmitry Jemerov(5063)
