Blog Posts Tagged with "Physical Security"

D03c28fd5a80c394905c980ee1ecdc88

Gaining Access to a Check Point Appliance

February 07, 2012 Added by:Bill Mathews

On any Linux-based system with an unencrypted hard drive, it is possible to completely overtake a system once you have gained physical access. Often this is easily accomplished with a live CD distribution, such as Backtrack or Ubuntu and some command line tools...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Data Loss Doesn’t Always Mean Getting Hacked

February 03, 2012 Added by:Robert Siciliano

Recently UCLA announced 16,000 patients were potential victims of identity theft because a doctor’s home office was broken into and data stolen. Data breaches cost big bucks. Encryption in this scenario failed due to a password on a sticky note near the laptop...

Comments  (0)

1a490136c27502563c62267354024cd5

From PwnPlugs to Nuclear Power Plants...

January 03, 2012 Added by:Malgorzata Skora

Physical security can’t be overstated with high value targets such as the Nuclear Power plants in Iran and the U.S. Governments Secret SIPR networks being victims to physical layer compromise. If there’s one guaranteed way to gain access to any network, it’s with a physical layer exploit...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Data Loss Prevention - Step 3: Engage Physical Security

December 20, 2011 Added by:Rafal Los

While often missed, this component of security is one of the most critical when it comes to understanding, and fighting the loss of data in your organization in a very real, tangible way. There are three types of threats you want to be aware of from the physical perspective...

Comments  (0)

5c9886924588e138cc18290742c2095e

The Case for an Open Source Physical Security Software

January 18, 2011 Added by:Guy Huntington

The open source formula usually delivers free software with a low yearly license. Use of this software should lower enterprises overall physical security budget over time as opposed to paying proprietary vendors large purchase amounts and annual license fees...

Comments  (0)

959779642e6e758563e80b5d83150a9f

The Psychology of Data Security

November 15, 2010 Added by:Danny Lieberman

The cultural phenomenon of companies getting hit by data breaches but not adopting technology countermeasures to mitigate the threat requires deeper investigation but today, I’d like to examine the psychology of data security and data loss prevention...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Google Ordered to Produce Name of Cyberstalker

November 15, 2010 Added by:Robert Siciliano

Information Week reports that a New York judge has ordered Google to reveal the identity of a cyberstalker who has anonymously posted video and messages on the Internet. The videos included sexual slurs and damaging information that could affect the woman’s reputation and career...

Comments  (0)

E376ca757c1ebdfbca96615bf71247bb

Got Go Bag? Musings on Physical Security

September 10, 2010 Added by:shawn merdinger

While we most often think about security issues from the information protection viewpoint on Infosec Island, it's useful to review physical security scenarios. If you had to get up now and leave because of an emergency, what would you bring with you to survive for 72 hours with no support?

Comments  (2)

6d117b57d55f63febe392e40a478011f

GreenIT Innovations: Micro-Modular Data Centers

August 23, 2010 Added by:Anthony M. Freed

What do you get when you cross a server rack with a Cadillac? How about with a tank? EMS launched its Micro-Modular Data Centers at the UPTIME Institute’s Green IT Conference, and industry leaders praised the units as being one of the Greenest IT solutions on the market...

Comments  (0)

1789975b05c7c71e14278df690cabf26

Getting Physical: Hot Summer Security

July 16, 2010 Added by:Pete Herzog

OSSTMM 3 requires that you don't look to the threat to prepare your security plan because it's too easy to only make changes which affect a small portion of the threats. That's especially true when you consider how unpredictable human behavior can be...

Comments  (10)

37d5f81e2277051bc17116221040d51c

10 Personal Safety and Security Tips

April 10, 2010 Added by:Robert Siciliano

Fundamentals: Body language is 55% of communications. That’s your walk, posture, facial expressions and eye contact. Awareness is being alert to your surroundings at all times. Intuition is when the hair on the back of your neck stands on end. Voice tone and pitch equal 35% of communications. The way a person communicates physically and verbally can determine whether or not a predator deems ...

Comments  (6)