Databases Reference
In-Depth Information
Employee
Training
Supply Chain
Partner
Computer
Company Offices
Data
Encryption
Computer
00001100
10111011
01100110
10001111
Firewall
or Proxy
Computer
Controlled
Access to
Database
Customer
Computer
Antivirus
Software
Database
Controlled
Access to
Computer
System
“Hacker”
Computer
Physical Security
of Company Offices
F IGURE 11.2
Data security measures
They eventually put up concrete barriers outside of the building because they
were concerned about just this possibility.)
Don't put the computer above the eighth floor because that's as high as firetruck
ladders can reach.
Don't put the computer on the top floor of the building because it is subject to
helicopter landing and attack.
If you occupy at least three floors of the building, don't put the computer on
your topmost floor because its ceiling is another company's floor, and don't put
the computer on your bottommost floor because its floor is another company's
ceiling.
Whatever floor you put the computer on, keep it in an interior space away from
the windows.
Another issue is personnel access to the computer room. Obviously, such
access should be limited to people with a legitimate need to be in the room. Access
to the room is controlled by one or a combination of:
Something they know, such as a secret code to be punched in.
Something they have, such as a magnetic stripe card, possibly combined with a
secret code.
Some part of them that can be measured or scanned. These ''biometric'' systems
can be based on fingerprints, the dimensions and positions of facial features,
retinal blood vessel patterns, or voice patterns.
 
Search WWH ::




Custom Search