Physical Security
Tutorial Content
At a Glance
- Data Storage Techniques
- Secure Zones
- 2 Case Studies
As an often overlooked area of information security, the physical security of data is essential not only for regulatory compliance, but also for insulating companies from serious security failures. From locking away physical documents, to cleaning down whiteboards, or server room access, devices and documents need to be properly protected.
"In all cases, both personal and professional, when an attacker has physical access to a machine, there is very little that can be done to stop them from getting past login screens to installing hardware that monitors everything you type"
- Hut Six, Physical Security
Learning Objectives
- Identification Protocols
- Protecting Digital and Physical Data
- Reporting Suspicious Behaviour
- Completion time: ~ 8 minutes