From the course: Introduction to Pen Testing for Cybersecurity Professionals

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Checking physical security

Checking physical security

- [Instructor] Physical access can be an entry point into your organization and the first step in a data breach. In this segment, we'll discover what methods should be in place to stop a would-be attacker from gaining access to your systems. With all the logical controls in place, testing for physical security might not be the first thing that comes to mind when conducting a pen testing exercise. However, checking the physical security of an organization should be part of an overall assessment. If I have physical access, I might be able to bypass the logical controls. For example, if you have a router that uses Wi-Fi protected setup, or WPS, this makes the process of connecting to a secure wireless network from a computer or other device easier. I'm at this website where it shows you how you can press the EPS button on your router to allow push and connect, and I'll scroll down where you can see some examples. That…

Contents