السلام عليكم
ليس كل اختراق الشبكات يتم عن طريق خارجي لكن معظمها يكون عن طريق اختراق داخلي من قبل بعض النفوس الضعيفة. الـ Physical Security بدأ باخذ الاهتمام ويجب اخذ الحذر باهماله والنقاط التاليه مهمة جدا"
اتبع هذه التعليمات لحظر او تقليل صلاحية الاشخاص
Follow these guidelines for restricting personal access:
* Initiate a badge program that includes an employee picture, and color-code specific areas of access.
* Make it a policy to question anyone who doesn’t have a visible ID badge.
* Escort, observe, and supervise guests for their entire visit.
* Don’t allow anyone — including vendors, salespeople, etc. — to connect personal laptops (or any other computing device) to your network.
* Don’t allow anyone to add hardware or software to computers without proper authorization.
* Watch out for “tailgaters.” These people wait for someone with access to enter a controlled area (such as one with a locked door) and then follow the authorized person through the door. Tailgaters enter without using their own key, card key, or lock combination.
اتبع هذه التعليمات لحماية المعلومات والدخول او الولوج على الاجهزة
Follow these guidelines for protecting information and equipment access:
* Place monitors and printers away from windows and areas where unauthorized persons could easily observe them.
* Shred or otherwise destroy all sensitive information and media when it’s no longer necessary.
* Don’t leave documents unattended at fax machines or printers.
* Require all users to log off or power down workstations at the end of the working day.
* Lock up portable equipment (e.g., laptops, PDAs, media, memory sticks) out of sight in a safe storage place overnight.
* Don’t allow the removal of computers or storage media from the work area or facility without ensuring that the person removing it has authorization and a valid reason.
* Provide locks or cables to prevent theft, and lock computer cases.
ولاتنسوا الدعاء وان شاء الله الفائدة وأي سؤال اني حاضر
المفضلات