How secure are the host computers at the University?
Perform ananalysis of the physical security to protect these devices. Make note of any hardware locks, proximity readers, video surveillance, fencing, etc. Then visualize the hardware security around the hosts. What are the strengths? What are the weaknesses?
What recommendations would you make for improving host security?
How secure are the host computers at the University?
Perform an analysis of the physical security to protect these devices. Make note of any hardware locks, proximity readers, video surveillance, fenc