Practical UNIX & Internet Security

Practical UNIX & Internet SecuritySearch this book
Previous: 13.2 On the JobChapter 13
Personnel Security
Next: IV. Network and Internet Security
 

13.3 Outsiders

Visitors, maintenance personnel, contractors, vendors, and others may all have temporary access to your location and to your systems. They are people too, and could be a part of that 100% pool we mentioned at the beginning of this chapter. You should consider how everything we discussed earlier can be applied to these people with temporary access. At the very least, no one from the outside should be allowed unrestricted physical access to your computer and network equipment.


Previous: 13.2 On the JobPractical UNIX & Internet SecurityNext: IV. Network and Internet Security
13.2 On the JobBook IndexIV. Network and Internet Security