4 Network Secure solutions
4.3 Physical Security

Ensuring a physically secure network environment is the first step in controlling access to the sensitive data and system files, but it is only part of a good security plan. This is truer today than in the past, because networks have more “ways in” than they once did. A medium or large network may have several access points, VPN servers, and a dedicated full-time Internet connection. Even a small network is likely to be connected to the Internet part of the time.

Virtual intruders never touch the computers or the target network. They can access the network from across the street or from halfway across the world. But they can do as much damage as the thief who breaks into the company headquarters to steal or destroy the data – and they are much harder to catch. To make a physical access control the “outer perimeter” means:

  1. Controlling physical access to the servers
  2. Controlling physical access to networked workstations
  3. Controlling physical access to network devices
  4. Controlling physical access to the cable
  5. Being aware of security considerations with wireless media
  6. Being aware of security considerations related to portable computers
  7. Recognizing the security risk of allowing data to be printed out
  8. Recognizing the security risks involving pen drives, external disks, CDs and other removable media