ABSTRACT
Most information security practitioners are experienced in
and concentrate on logical issues of computer and tele-
communications security while leaving physical security
to another department. However, most of us would agree
that a knowledgeable person with physical access to a
console could bypass most of our logical protective mea-
sures by simply rebooting the system or accessing the
system that is already turned on with root or administrator
access in the computer room. Additionally, an unlocked
wiring closet could provide hidden access to a network or a
means to sabotage existing networks.