tailieunhanh - Physical Network Security: Network security from the bottom up
Yet, we have been told that the free market alone may not be able to improve security sufficiently. The return on investment may be hard to prove, and businesses will only do what makes sense for the bottom line. We are generally skeptical of direct regulation and of government agencies grading the security of a private company, which is another form of regulation. Threats and practices change so quickly that government-imposed standards cannot keep up. Regulations can add to costs that ultimately come out of consumers’ pockets. . | 724-746-5500 Physical Network Security Table of Contents The goal of network Layered security using the OSI model as a security Why physical access to computers is a Lock it up .5 Security Secure your in out Use fiber optic Protect Protect equipment from accidental Treat wireless with Don t forget the paper The most vulnerable security gap In About Black We re here to help If you have any questions about your application our products or this white paper contact Black Box Tech Support at 724-746-5500 or go to and click on Talk to Black Box. You ll be live with one of our technical experts in less than 20 seconds. BLACKBOX 724-746-5500 Page 2 Physical Network Security Introduction Law 3 If a bad guy has unrestricted physical access to your computer it s not your computer anymore. From 10 Immutable Laws of Security Microsoft Security Response Center It has been said that the most secure computer is one that s by itself in a locked room. It should be turned off. Obviously this is not a computing situation that s going to work for most organizations but the general idea that isolating computers increases security holds true. The most basic step you can take towards network security is to secure your hardware so unauthorized people can t get at it. Securing hardware is important because if a person has physical access to a device there is almost always a way to take control of it or to get data out of it. It s at the hardware level the very bottom of the networking hierarchy that your network is most vulnerable. A lost laptop an open USB port a simple network tap all these can be a conduit for quick and devastating data loss that no firewall can prevent. But the hardware arena is also where you can set up the most effective network security by denying physical access to networking devices. There
đang nạp các trang xem trước