Summary
Without robust physical security, even the most advanced cybersecurity strategies can be undermined. Securing data not only requires technical and management solutions but also physical solutions that keep an attacker from walking into a building and carrying out attacks on physical infrastructure. This chapter highlighted the importance of securing both external and internal boundaries, using strategies such as perimeter fencing, surveillance systems, and controlled access points to prevent unauthorized access and protect against natural disasters.
We started the discussion with parking lot security, covering fencing, lighting, and cameras. Attackers seek vulnerabilities and notice when a facility is uncared for. Using principles of crime prevention through environmental design reduces the likelihood of attack because the facility appears to be tended to.
Then, the chapter discussed how to ensure building security with security guards and by logging who is entering and...