Physical Security

Only available on StudyMode
  • Download(s) : 479
  • Published : October 1, 2008
Open Document
Text Preview
After reviewing several articles on the Internet, I chose the topic of physical security and an article entitled “Lock IT Down: Don't overlook physical security on your network”. This particular article peaked my interest because it addresses the various aspects of physical security that can often be overlooked in a world that is so highly focused on threats of cyberterrorism, virus attacks, hacking, application and network security. What caught my attention was the line, “If the server is sitting in the middle of your office where anyone can get to it, you might as well not have any security at all.” (Bogue, 2003)

The article discusses the fact that because computers of all types are susceptible to a physical attack, there should always be some measure of security in place that physically restricts access to the computers. When there is physical access to the computer, there is no limit to the damage that can be done, either intentionally or unintentionally. Lack of physical security can allow top secret information to be downloaded, access to the computers hard drives, allows someone to set up a way for an unauthorized person to enter the system, in addition to allowing “passwords to be reset, server software-based security can be easily bypassed, and user passwords can be cracked and stolen.” (Bogue, 2003) I was amazed at all the problems that can occur when there is a lack of physical security within an organization.

I was not aware that locks can play such an important role when it comes to physical security. This particular article brought to light for me the need to use a security system that can provide an audit trail that allows a recordation of all authorized persons who enter the secure area. Within my own organization, we use the secure card access system. I never realized exactly how much my card was doing until I read this article. With my secure access card, I am allowed to enter the building, the server room, and the computer...
tracking img