start page | rating of books | rating of authors | reviews | copyrights

Practical UNIX & Internet Security

Practical UNIX & Internet SecuritySearch this book
Previous: 13.2 On the Job Chapter 13
Personnel Security
Next: IV. Network and Internet Security
 

13.3 Outsiders

Visitors, maintenance personnel, contractors, vendors, and others may all have temporary access to your location and to your systems. They are people too, and could be a part of that 100% pool we mentioned at the beginning of this chapter. You should consider how everything we discussed earlier can be applied to these people with temporary access. At the very least, no one from the outside should be allowed unrestricted physical access to your computer and network equipment.


Previous: 13.2 On the Job Practical UNIX & Internet Security Next: IV. Network and Internet Security
13.2 On the Job Book Index IV. Network and Internet Security