Physical security: Physical security is giving protection to physical items or objects or even areas from an unauthorized access. That is, it gives protection physically to people, system, hardware and some resources that are connected with the management. Data interception: Data interception is considered as a part of physical security, because it addresses design, execution and maintenance. It is one of the serious problems among computer systems. Fundamental ways that information could be intercepted: Direct observation: Direct observation requires individuals to have sufficient space in order to breach confidentiality. If an employee does his work or opens the documents in home or other commercial places, the chances of observation increases. Interception of data transmission: During the transmission of information, interception could occur via sniffers and tapping into a LAN (Local Area Network)...

BuyFind

Principles of Information Security...

6th Edition
Michael E. Whitman + 1 other
Publisher: Cengage Learning
ISBN: 9781337102063
BuyFind

Principles of Information Security...

6th Edition
Michael E. Whitman + 1 other
Publisher: Cengage Learning
ISBN: 9781337102063

Solutions

Chapter 9, Problem 19RQ

Explanation of Solution

Physical security:

Physical security is giving protection to physical items or objects or even areas from an unauthorized access. That is, it gives protection physically to people, system, hardware and some resources that are connected with the management.

Data interception:

Data interception is considered as a part of physical security, because it addresses design, execution and maintenance. It is one of the serious problems among computer systems.

Fundamental ways that information could be intercepted:

  • Direct observation:
    • Direct observation requires individuals to have sufficient space in order to breach confidentiality.
    • If an employee does his work or opens the documents in home or other commercial places, the chances of observation increases.
  • Interception of data transmission:
    • During the transmission of information, interception could occur via sniffers and tapping into a LAN (Local Area Network)...

Expert Solution

Want to see the full answer?

Check out a sample textbook solution.

Want to see this answer and more?

Experts are waiting 24/7 to provide step-by-step solutions in as fast as 30 minutes!*

*Response times may vary by subject and question complexity. Median response time is 34 minutes for paid subscribers and may be longer for promotional offers.