Reply To: OCU C)OST C Discussion Lesson 09
When it comes to network and enterprise security, it is easy to focus on software attacks, but just as important are the physical components of our networks. For instance, in my company, all employees have access cards that must be scanned to enter the building. In addition, there are several secure areas that only certain employees can access. For example, the server room is protected by key card only access, and very few employees have permission to enter that room.
Spiceworks defines hardware security as “The protection of physical devices from threats that would facilitate unauthorized access to enterprise systems” (Spiceworks, 2022). Things such as the key card access mentioned above, as well as cameras, can help keep hardware components safe. A hardware firewall can be installed to prevent unauthorized access to network components. A proxy server can act as a middleman, sending and receiving requests on a user’s behalf, allowing the IP address to stay hidden. All of these items are important to consider in business today.
Spiceworks. (2022, January 4). What is hardware security? Definition, threats, and best practices. Spiceworks. 1