You are on page 1of 1

se who perform malicious actions are well aware that although technology and def

enses have gotten better, the physical side is overlooked far too often. In many
cases, if an attacker does not have a clear or easy way of using technology to
breach a target, they may move over to a physical attack to gain information or
access. Techniques such as dumpster diving and tailgating, among others, have pr
oven very effective and popular. In addition, weaknesses in the security of a fa
cility can
allow a malicious or unauthorized party to gain access to a portion of an office
or location that they should not otherwise be able to access.Those who perform
malicious actions are well aware that although technology and defenses have gott
en better, the physical side is overlooked far too often. In many cases, if an a
ttacker does not have a clear or easy way of using technology to breach a target
, they may move over to a physical attack to gain information or access.
Techniques such as dumpster diving and tailgating, among others, have proven ver
y effective and popular. In addition, weaknesses in the security of a facility c
an allow a malicious or unauthorized party to gain access to a portion of an off
ice or location that they should not otherwise be able to access.

You might also like