Discovering Vulnerabilities
Discovering Vulnerabilities
A physical attack is an attack that is almosy always guaranteed to work, and it will only take a skilled hacker a few minutes to have complete control over a device or get the data that he needs from a system that he is able to access. For that reason, it is very important that you are aware of the possible physical vulnerabilities of the system that you are protecting.
Look into these factors when looking for physical vulnerabilities:
1. Number of sites or buildings that contains systems that you need to protect
2. Number of employees and their access to devices or computer peripheries
3. Number of entrances and exits in the building and possible access points to devices
4. Location of data centers in the building, as well as other possible hubs of confidential information
5. Number and location of devices or computer peripheries that are interconnected to each other.
When you take a look at the above list, you can possibly imagine that there are thousands of possible breaches of physical security that may happen. If you can think of how a possible perpetrator can possibly gain physical access to a single part of the computer system that you intend to protect, then it is highly possible that criminal hackers are thinking the same.


No comments