Sie sind auf Seite 1von 1

Those who perform malicious actions are well aware that although technology and

defenses have gotten better, the physical side is overlooked far too often. In m
any cases, if an attacker does not have a clear or easy way of using technology
to breach a target, they may move over to a physical attack to gain information
or access. Techniques such as dumpster diving and tailgating, among others, have
proven very effective and popular. In addition, weaknesses in the security of a
facility can
allow a malicious or unauthorized party to gain access to a portion of an office
or location that they should not otherwise be able to access.
se who perform malicious actions are well aware that although technology and def
enses have gotten better, the physical side is overlooked far too often. In many
cases, if an attacker does not have a clear or easy way of using technology to
breach a target, they may move over to a physical attack to gain information or
access. Techniques such as dumpster diving and tailgating, among others, have pr
oven very effective and popular. In addition, weaknesses in the security of a fa
cility can
allow a malicious or unauthorized party to gain access to a portion of an office
or location that they should not otherwise be able to access.Those who perform
malicious actions are well aware that although technology and defenses have gott
en better, the physical side is overlooked far too often. In many cases, if an a
ttacker does not have a clear or easy way of using technology to breach a target
, they may move over to a physical attack to gain information or access.
Techniques such as dumpster diving and tailgating, among others, have proven ver
y effective and popular. In addition, weaknesses in the security of a facility c
an allow a malicious or unauthorized party to gain access to a portion of an off
ice or location that they should not otherwise be able to access.

Das könnte Ihnen auch gefallen