04091124 Master Cybersecurity Training Book

4/20/24

In-person

§ Some attackers will show up in person to gain physical access to the network

§ Attach a rogue device to the network § Drop USB sticks with malware on them § Access open, unattended, desktops

19

19

In-person defenses

§ Visitor and employee verification procedures when access sensitive areas § Can include offices, network closets, ports attached to gaming machines § Visual surveillance to identify attacker either in the act or once they have left § Policy and procedures for how employees are supposed to

handle visitors or unexpected guests § Implement MAC address filtering

20

20

10

Made with FlippingBook - Online catalogs