If a skilled adversary can gain physical access to a PC, it's game over as far as information security is concerned. Without appropriate controls in place, he/she can potentially install a hardware keyboard logger, download data and programs to/from a USB memory device, reboot from a powerful operating system on a CD/DVD or USB memory device, steal the hard drive or other components, destroy the system ... Do you search visitors to your site for USB pens for example?
Other physical security links here
No comments:
Post a Comment