- HOME
- About Research IT
- Campus Resources
- Endpoint Support & Network Services
- Application Infrastructure & Technical Solutions
- Research Computing & Cyberinfrastructure
- Research Data Security
- Reporting Data & Analytics
- Strategic & Tactical Planning
- Business Analysis & Project Management
- Work Coordination & Facilitation
- HOME
- About Research IT
- Campus Resources
- Endpoint Support & Network Services
- Application Infrastructure & Technical Solutions
- Research Computing & Cyberinfrastructure
- Research Data Security
- Reporting Data & Analytics
- Strategic & Tactical Planning
- Business Analysis & Project Management
- Work Coordination & Facilitation
Environmental Physical Security
- Visibility of Devices:
- Shoulder Surfing
- Have screens and keyboards out of sight from unauthorized individuals prevents anyone form observing data or credentials
- Theft
- Thieves wont be tempted to steal a device they are not aware of; Out of sight, out of mind
- Access to environment, devices, data stores:
- If unauthorized people can access devices and data stores, it makes it much easier for devices and data to be compromised
- “Locks keep honest people honest”
- Tracking who has access to the environment
- Cameras
- Cards/digital locks
- Visitor Logs
- Environmental Concerns:
- Natural Disasters
- Fire and Water damage