Skip to main content

Physical Security Controls

  • Chapter
  • First Online:
IT Security Risk Control Management
  • 2575 Accesses

Abstract

The interesting thing about physical security is that some security folks write it off as not my problem. We too can be victims of the Someone Else’s Problem effect. In 2016, the California Attorney General reported that 22% of all reported breaches came from physical theft and loss. Physical security problems were second only to malware. As much as we IT security geeks would like to distance ourselves from physical security problems, it’s something we need to address.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://thedailywtf.com/articles/Insecurity_Doors

  2. 2.

    https://www.nachi.org/inspectors-bump-keys.htm

  3. 3.

    http://www.eweek.com/security/hacking-rfid-tags-is-easier-than-you-think-black-hat

  4. 4.

    https://en.wikipedia.org/wiki/Dunbar's_number

  5. 5.

    PCI DSS 3.2 control objective 8.1.8 states that “If a session has been idle for more than 15 minutes, require the user to re-authenticate to re-activate the terminal or session.”

  6. 6.

    https://en.wikipedia.org/wiki/Laptop_theft

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Raymond Pompon

About this chapter

Cite this chapter

Pompon, R. (2016). Physical Security Controls. In: IT Security Risk Control Management. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2140-2_19

Download citation

Publish with us

Policies and ethics