For Network Peripherals we will be looking for Hardware that is not (directly) connected to the network.
Devices like these are attached — temporarily or permanently — to a component of the network.
Device's like this could ba hardware like:
- Bar Code Reader (1D and 2D)
- Cell phones
- Digital camera(s)
- Docking station(s)
- Hand Held Computing Devices (inc.: PDAs, inventory taking, etc.)
- Local printers
- Monitors / Displays
- Removable storage devices (inc.: USB memory sticks, external harddisk, floppies, CDs, DVDs, etc.)
- USB Hubs
- VoIP phone handsets
Some of such peripherals are potential points-of-failure of the security infrastructure.
To limit those potential there must be policy, procedure and process for reducing risk and/or exposure of these devices..
Leave a Reply