Physical Security

Intruders don't always use technology to crack into a network. Sometimes they use brute-force methods. For example, if a thief steals your laptop computer, he can often use the "convenience" features of the computer's software to connect to the Internet through your network, read your email and other confidential files, and gain access to other computers connected to the same network. Other low-tech methods include shoulder surfing, where the bad guy watches your screen or your keyboard as you type a login name and password, and social engineering, in which the intruder convinces you to reveal your password or other information because she has convinced you that she has a legitimate use for it.

There are some things you can do ...

Get Network Know-How now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.