Physical attacks can involve breaking into a secure data center, accessing restricted areas of a building, or using termination tools that do not have corporate access to them. Attackers could steal or damage important IT assets such as servers or storage media, access key hotspots for mission-critical applications, steal information via USB, or upload malware to your systems.
Strong
controls at the opposite end should be able to keep external threats out, and
internal measures related to access should be able to reduce internal intruders
(or at least identify unusual behavior).
No comments:
Post a Comment