4/20/24
In-person
§ Some attackers will show up in person to gain physical access to the network
§ Attach a rogue device to the network § Drop USB sticks with malware on them § Access open, unattended, desktops
19
19
In-person defenses
§ Visitor and employee verification procedures when access sensitive areas § Can include offices, network closets, ports attached to gaming machines § Visual surveillance to identify attacker either in the act or once they have left § Policy and procedures for how employees are supposed to
handle visitors or unexpected guests § Implement MAC address filtering
20
20
10
Made with FlippingBook - Online catalogs