ABSTRACT

Most information security practitioners are experienced in

and concentrate on logical issues of computer and tele-

communications security while leaving physical security

to another department. However, most of us would agree

that a knowledgeable person with physical access to a

console could bypass most of our logical protective mea-

sures by simply rebooting the system or accessing the

system that is already turned on with root or administrator

access in the computer room. Additionally, an unlocked

wiring closet could provide hidden access to a network or a

means to sabotage existing networks.