¨Methods
–Walking past unlocked doors to data center
–Piggyback behind legitimate employee
¨Defense
–security badges
–track computers leaving premises
–physically lock down servers
–Use locks on cabinets containing sensitive
information
–Use automatic password-protected screen savers
–Encrypt stored files
¨