Jump to content

Talk:Physical information security: Difference between revisions

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
Content deleted Content added
Rlaird (talk | contribs)
Rlaird (talk | contribs)
Line 6: Line 6:


== No discussion of hacker dongles, USB fobs, etc? ===
== No discussion of hacker dongles, USB fobs, etc? ===
I would think these devices (dongles, USB fobs, etc.) would be an important topic to discuss within the aspect of physical security. If a rack of servers is in a less-than-secure location, anyone can fairly easily install something, very quickly, that could compromise the entire systems. [[User:Rlaird|Rlaird]] ([[User talk:Rlaird|talk]]) 15:42, 7 November 2012 (UTC)
I would think these devices (dongles, USB fobs, etc.) would be an important topic to discuss within the aspect of physical security. If a rack of servers is in a less-than-secure location, anyone can fairly easily install something, very quickly, that could compromise the entire system. [[User:Rlaird|Rlaird]] ([[User talk:Rlaird|talk]]) 15:42, 7 November 2012 (UTC)

Revision as of 15:43, 7 November 2012

WikiProject iconComputer Security: Computing Unassessed
WikiProject iconThis article is within the scope of WikiProject Computer Security, a collaborative effort to improve the coverage of computer security on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
???This article has not yet received a rating on Wikipedia's content assessment scale.
???This article has not yet received a rating on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Computing.
Things you can help WikiProject Computer Security with:
Article alerts will be generated shortly by AAlertBot. Please allow some days for processing. More information...
  • Review importance and quality of existing articles
  • Identify categories related to Computer Security
  • Tag related articles
  • Identify articles for creation (see also: Article requests)
  • Identify articles for improvement
  • Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
  • Find editors who have shown interest in this subject and ask them to take a look here.

It is possible this content would be more appropriate if included within the social engineering page. I wasn't sure what to do with it, so I created a separate article. --Starschreck 04:56, 21 September 2006 (UTC)[reply]

I vote NAY to the merge proposal. Because Physical Information Security is about the safeguarding of the actual medium that the information is stored on (paper or data), but Social engineering (security) is about the coercion of information from humans. I am surprised that this article does not mention more about security of live information in the physical sense. i.e. server rooms, server cabinets, safes, distribution of physical keys, breach protocols, etc. --Emana 09:52, 7 January 2007 (UTC)[reply]

No discussion of hacker dongles, USB fobs, etc? =

I would think these devices (dongles, USB fobs, etc.) would be an important topic to discuss within the aspect of physical security. If a rack of servers is in a less-than-secure location, anyone can fairly easily install something, very quickly, that could compromise the entire system. Rlaird (talk) 15:42, 7 November 2012 (UTC)[reply]