![]() For example, it is a lot more likely to do poor handling of key electrical components in a modular device switch or router that requires installation of modules, installation of blades, and network cards to either expand its functionality or add more horsepower. We have had threats to physical installations since the dawn of networking however, these threats are augmented by some of the technology transit we see now a days. Risk is based on the probability of threats exploiting assets with certain vulnerabilities. Information security policies should be based on risk analysis and risk management. ![]() We will start with physical security, followed by basic controls like implementing a password strategy, sign posting via login banners, and the use of SSH for improved and confidential configuration management.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |