(function(a,e,f,g,b,c,d){a.GoogleAnalyticsObject=b;a[b]=a[b]||function(){(a[b].q=a[b].q||[]).push(arguments)};a[b].l=1*new Date;c=e.createElement(f);d=e.getElementsByTagName(f)[0];c.async=1;c.src=g;d.parentNode.insertBefore(c,d)})(window,document,"script","https://www.google-analytics.com/analytics.js","ga");ga("create","UA-732153-7","auto",{allowLinker:!0,siteSpeedSampleRate:10});ga("set","transport","beacon");ga("set","anonymizeIp",!0);ga("require","linker"); ga("linker:autoLink","askapache.com askapache.net htaccess.io htaccesselite.com askapache.info htaccess.guru".split(" "),!0);ga("send","pageview"); CLASS="ARTICLE" BGCOLOR="#FFFFFF" TEXT="#000000" LINK="#0000FF" VLINK="#840084" ALINK="#0000FF" >

Introduction to Physical Security and Security of Services

Jennifer Vesperman

jenn@linuxchix.org

2002-02-24

Revision History
Revision 0.12002-02-17Revised by: MEG
Converted from text file. Modified wording.
Revision 0.22002-02-24Revised by: MEG
Conforming to LDP standards. Added abstract.

Table of Contents
1. Introduction
1.1. Copyright Information
1.2. Overview
1.3. Physically Securing the hardware
2. Physical security of networks
3. Power
4. Network Access