O'Reilly logo

Securing Intellectual Property by Information Security

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9. Physical Security - The “Duh” Factor

Introduction

If you have ever debriefed a hacker, or an industrial spy, or even a penetration tester working for the good guys, you will know that the first attempt any of them make is to simply walk through a door, whether at the front or the back of the facility. Well, perhaps they will dumpster dive prior to the direct assault. But certainly, an attacker, whether intent on breaking into your information systems, stealing your trade secrets, or demonstrating how easy it is to do either, will always probe your physical perimeter before either going cyber (e.g., gaining unauthorized network access or planting a Trojan to collect data) or even psychological (i.e., using social engineering techniques). ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required