Physical Security for IT

Physical Security for IT

5.0 1
by Michael Erbschloe
     
 

The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple an organization by doing physical damage to IT assets. In many cases

…  See more details below

Overview

The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple an organization by doing physical damage to IT assets. In many cases such damage can be far more difficult to recover from than a hack attack or malicious code incident. It does little good to have great computer security if wiring closets are easily accessible or individuals can readily walk into an office and sit down at a computer and gain access to systems and applications.

Even though the skill level required to hack systems and write viruses is becoming widespread, the skill required to wield an ax, hammer, or fire hose and do thousands of dollars in damage is even more common. Although many books cover computer security from one perspective or another, they do not thoroughly address physical security. This book shows organizations how to design and implement physical security plans. It provides practical, easy-to-understand and readily usable advice to help organizations to improve physical security for IT, network, and telecommunications assets.

• Expert advice on identifying physical security needs
• Guidance on how to design and implement security plans to prevent the physical destruction of, or tampering with computers, network equipment, and telecommunications systems
• Explanation of the processes for establishing a physical IT security function
• Step-by-step instructions on how to accomplish physical security objectives
• Illustrations of the major elements of a physical IT security plan
• Specific guidance on how to develop and document physical security methods and procedures

Read More

Editorial Reviews

From the Publisher
"Michael has unquestionable knowledge about how organizations today are linking their systems across enterprise-wide networks and virtual private networks (VPNs), as well as increasing their exposure to customers, competitors, browsers, hackers, and physical threats to the facility equipment and network(s). This book will show you how each connection magnifies the vulnerability to attack. This book also provides the fundamental knowledge you need to analyze electronic and physical risks to your networks and systems." -John Vacca, Author of numerous computer security books

Product Details

ISBN-13:
9781555583279
Publisher:
Elsevier Science
Publication date:
11/22/2004
Pages:
256
Product dimensions:
0.53(w) x 7.50(h) x 9.25(d)

Meet the Author

Michael Erbschloe an information technology consultant, educator, and author. Michael has also taught and developed technology related curriculum for several universities including the University of Denver, and speaks at conferences and industry events around the world. He has authored hundreds of articles on technology and several books including Information Warfare: How to Survive Cyber Attacks.

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >

Physical Security For It 5 out of 5 based on 0 ratings. 1 reviews.
Guest More than 1 year ago
The obsession about cyber security has far too often overshadowed the need for improving physical security of IT. Author Michael Erbschloe has done an outstanding job in this book of showing organizations how to design and implement security plans to prevent the physical destruction of, or tampering with computers, network equipment, and telecommunications systems. Erbschloe begins this book by providing an overview of physical security and the many reasons it is so important. Next, the author covers the process of establishing a physical IT security function in an organization. In addition, the author presents the steps to developing a physical security plan. He also explains the major elements of a physical security plan, including the overview and mission statement, assignment of organizational responsibilities, the use of duty officers, and the management of contact lists. Then, he provides a detailed discussion on how to develop and document methods and procedures for the planning areas. The author then covers the importance of testing and how to test and audit procedures. Next, he covers the steps for managing response to an incident. Then, he presents a model training program for physical IT security. Finally, he takes a look at the future of physical security for IT assets. With the preceding in mind, the author has done an excellent job of providing the reader with a practical, easy to understand and readily usable advice to help his or her organization improve physical security for IT, network and telecom assets. At the end of the day, you, the reader, will have a clear understanding that the struggle to improve physical security will continue well into the future.