Physical Security

Part of the Undergraduate Topics in Computer Science book series (UTICS)


What normally comes to mind, when hearing about or discussing computer security, is either viruses or some of the many security issues that have to do with networks, such as loss of privacy, identity theft, or how to secure sensitive data sent on a network. Computer security, however, is a vast discipline that also includes mundane topics such as how to physically protect computer equipment and secure it against fire, theft, or flood. This chapter is a short discussion of various topics that have to do with physical security.


Privacy Protection Computer Security Recovery Plan Physical Security Uninterruptible Power Supply 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

  1. absolute (2005) is Scholar
  2. Agrawal, Rakesh, and Ramakrishnan Srikant (2000) “Privacy-Preserving Data Mining,” ACM SIGMOD, 29(2):439–450, June.CrossRefGoogle Scholar
  3. Asonov, Dmitri and Rakesh Agrawal (2004) “Keyboard Acoustic Emanations,” IEEE Symposium on Security and Privacy, Oakland, California, pp. 3– 11, May. ssp04.pdf.Google Scholar
  4. Backes, Michael, et al. (2010) Compromising Reflections, or How to Read LCD Monitors Around the Corner, available at˜unruh/publications/reflections.pdf.
  5. Bar-El, Hagai (2010) Introduction to Side Channel Attacks, available at
  6. Boneh D., and D. Brumley (2004) “Remote Timing Attacks Are Practical,” available at Scholar
  7. (2004) is /security/hardware/tracking_and_theft_prevention/.Google Scholar
  8. intelius (2005) is
  9. Kuhn (2004) is Scholar
  10. Maiwald, Eric and William Sieglein (2002) Security Planning and Disaster Recovery, Berkeley, CA, Osborne/McGraw-Hill.Google Scholar
  11. Moore, Dan Tyler and MarthaWaller (1965) Cloak and Cipher, Indianapolis, IN, Bobbs-Merrill, 1962; London, Harrap.Google Scholar
  12. PCPhoneHome (2004) is
  13. SDattacks (2010) is
  14. Shamir, Adi and Eran Tromer (2004) “Acoustic cryptanalysis,” available online at˜tromer/acoustic/.Google Scholar
  15. van Eck, Wim (1985) “Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk,” Computers and Security, 4:269–286.CrossRefGoogle Scholar
  16. Wright, Peter (1989) Spycatcher: The Candid Autobiography of a Senior Intelligence Officer, New York, Random House.Google Scholar
  17. Zalewski, Michal (2005) Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks, San Francisco, CA, No Starch Press.Google Scholar

Copyright information

© Springer London 2010

Authors and Affiliations

  1. 1.Computer Science Dept.California State University, NorthridgeNorthridgeUSA

Personalised recommendations