Ensuring a physically secure network environment is the first step in controlling access to the sensitive data and system files, but it is only part of a good security plan. This is truer today than in the past, because networks have more “ways in” than they once did. A medium or large network may have several access points, VPN servers, and a dedicated full-time Internet connection. Even a small network is likely to be connected to the Internet part of the time.
Virtual intruders never touch the computers or the target network. They can access the network from across the street or from halfway across the world. But they can do as much damage as the thief who breaks into the company headquarters to steal or destroy the data – and they are much harder to catch. To make a physical access control the “outer perimeter” means: