Đang chuẩn bị liên kết để tải về tài liệu:
Physical Network Security: Network security from the bottom up

Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ

Yet, we have been told that the free market alone may not be able to improve security sufficiently. The return on investment may be hard to prove, and businesses will only do what makes sense for the bottom line. We are generally skeptical of direct regulation and of government agencies grading the security of a private company, which is another form of regulation. Threats and practices change so quickly that government-imposed standards cannot keep up. Regulations can add to costs that ultimately come out of consumers’ pockets. . | 724-746-5500 blackbox.com Physical Network Security Table of Contents Introduction.3 The goal of network security.3 Layered security using the OSI model as a security model.4 Why physical access to computers is a problem.5 Lock it up .5 Security cameras.8 Secure your in out devices.9 Use fiber optic cable.10 Protect data.10 Protect equipment from accidental damage.11 Treat wireless with care.13 Don t forget the paper trail.13 The most vulnerable security gap humans.13 In conclusion.13 About Black Box.13 We re here to help If you have any questions about your application our products or this white paper contact Black Box Tech Support at 724-746-5500 or go to blackbox.com and click on Talk to Black Box. You ll be live with one of our technical experts in less than 20 seconds. BLACKBOX 724-746-5500 blackbox.com Page 2 Physical Network Security Introduction Law 3 If a bad guy has unrestricted physical access to your computer it s not your computer anymore. From 10 Immutable Laws of Security Microsoft Security Response Center It has been said that the most secure computer is one that s by itself in a locked room. It should be turned off. Obviously this is not a computing situation that s going to work for most organizations but the general idea that isolating computers increases security holds true. The most basic step you can take towards network security is to secure your hardware so unauthorized people can t get at it. Securing hardware is important because if a person has physical access to a device there is almost always a way to take control of it or to get data out of it. It s at the hardware level the very bottom of the networking hierarchy that your network is most vulnerable. A lost laptop an open USB port a simple network tap all these can be a conduit for quick and devastating data loss that no firewall can prevent. But the hardware arena is also where you can set up the most effective network security by denying physical access to networking devices. There

TÀI LIỆU LIÊN QUAN