https://www.americancityandcounty.com/wp-content/themes/acc_child/assets/images/logo/footer-logo.png
  • Home
  • Co-op Solutions
  • Hybrid Work
  • Commentaries
  • News
  • In-Depth
  • Multimedia
    • Back
    • Podcast
    • Latest videos
    • Product Guides
  • Resources & Events
    • Back
    • Resources
    • Webinars
    • White Papers
    • IWCE 2022
    • How to Contribute
    • Municipal Cost Index – Archive
    • Equipment Watch Page
    • American City & County Awards
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Cookie Policy
    • Privacy Statement
    • Terms of Service
American City and County
  • NEWSLETTER
  • Home
  • Co-op Solutions
  • Hybrid Work
  • Commentaries
  • News
  • In-Depth
  • Multimedia
    • Back
    • Podcasts
    • Latest videos
    • Product Guides
  • Resources/Events
    • Back
    • Webinars
    • White Papers/eBooks
    • IWCE Expo
    • Calendar of Events
    • How to Contribute
    • American City & County Awards
    • Municipal Cost Index
    • Equipment Watch Page
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Cookie Policy
    • Privacy Stament
    • Terms of Service
  • newsletter
  • Administration
  • Economy & Finance
  • Procurement
  • Public Safety
  • Public Works & Utilities
  • Smart Cities & Technology
  • Magazine
acc.com

Public Safety


Navigating The Crossroads

Navigating The Crossroads

The invisible threat of computer network attacks traditionally has been treated as a separate issue than the physical protection of facilities and staff.
  • Written by MIKE NIELSEN
  • 1st August 2005

The invisible threat of computer network attacks traditionally has been treated as a separate issue than the physical protection of facilities and staff. Typically separate strategies — tools and specialized staffs — are employed with little interaction between the two efforts.

Today, that model no longer applies. With physical security systems such as badge readers, 9-1-1 systems and even surveillance cameras now managed over the data network, a network security vulnerability is also a physical security vulnerability. The opposite is also true: Unauthorized physical access to network assets can lead to downtime and disruption.

Security personnel should ensure that an agency’s security policy includes strong protection of physical network devices — the routers, switches, servers and other hardware that supports the agency’s mission. If malicious parties are able to tamper with network equipment, they can wreak havoc.

One way would-be attackers could exploit physical vulnerabilities in a network is to gain access to the network through an unused port on a router or switch. Internal employees with malicious intent are also dangerous since they could use their legitimate access to a device to unleash an attack.

An attacker also might steal or “hijack” an end-user device, such as a laptop or personal digital assistant (PDA) that is authorized to access the network. If wireless networking systems are used, an attacker might try to intercept wireless data traffic from a location outside the building that is still within the radio frequency (RF) range (for example, a parking space near a building exit). An ambitious attacker might even try to install his or her own wireless receiver (called a “rogue access point”) on the premises to intercept wireless traffic. Such attacks can cause substantial damage and can be hard to trace.

Here are some guidelines government agencies can use to protect themselves against these types of attacks:

  • Network equipment should be kept under lock and key with access tightly restricted and closely monitored.

  • Unused ports on network devices should be disabled. Network equipment should be configured so that all active ports are limited solely to their intended use. Network routers and switches should include tools to detect whether a device plugged into a port is legitimate.

  • Network and computing resources should be able to self-defend, notifying legitimate administrators of unauthorized access or configuration changes.

  • Wireless networks should incorporate security systems to detect and block rogue access points or unauthorized users attempting to hijack wireless traffic.

  • All computing devices should be tracked, for example with RFID tags.

  • Access should be monitored to network routers, switches, security devices and servers. Within the network, the security policy should include sophisticated authentication systems to control who has access to equipment and how each user is authorized to use that access.

Ultimately, the best defense against an attack on an agency’s physical network equipment is a sound, comprehensive security policy — one that recognizes the interdependency of physical and digital assets and provides for robust protection of both.


Mike Nielsen Mike Nielsen is a security solution manager for Cisco Systems, focusing on the deployment of network security systems for government and enterprise customers. He has 14 years experience in data networking, with the past six years devoted to network and information security technologies.

Tags: Public Safety

Most Recent


  • Report: Modern construction techniques, building codes protected structures that survived Lahaina fire
    More than a month after wildfire ripped through the historic community of Lahaina, Hawaii, emergency responders continue working to get a more comprehensive picture of what triggered the tragedy. The death toll remains at 115 people. A recent report from the Insurance Institute for Business and Home Safety’s research division unpacks why the fire was […]
  • asthma
    The top 10 Asthma Capitals for 2023
    September is Asthma Peak Month thanks to ragweed pollen peaking, higher mold counts, the start of cold and flu season, and kids headed back to school. The Asthma and Allergy Foundation of America (AAFA) has released its 2023 Asthma Capitals report, which analyses data from the 100 most populated cities and reveals the most challenging […]
  • Searchable mapping tool shows local, county heat-related injury EMS activation data
    Twenty-twenty-three has been a record year for temperatures globally—and they’re expected to continue to rise into the foreseeable future. From cooling infrastructure to policy changes that accomidate workers, cities and counties across the United States are adapting to this new norm. A new tool from the U.S. Department of Health and Human Services’ Office of […]
  • great downtown
    10 American cities accessible and safe for pedestrians
    Amid a recent increase in roadway deaths nationally, pedestrian safety has become a prioritized topic in city halls and county offices across the United States. Research has proven that traffic calming features and smart urban planning can dramatically reduce the risk for pedestrians. Some cities are better at it than others. A new ranking from […]

Leave a comment Cancel reply

-or-

Log in with your American City and County account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

Related Content

  • 10 reasons why local governments should outsource all IT: Post pandemic view
  • How governments can keep employees safe as they return to work
  • Preventing cyber-attacks needs to be a priority for local governments
  • Building community and officer wellness through data sharing

White papers


7 Resources to Level-up Your Federal Grants Administration and Compliance

5th September 2023

Elevator Phone Line Replacement Strategy | A Guide to Reliable, Code-Compliant Solutions

29th August 2023

2023 State of Public Sourcing Report: The Bright Future of Public Procurement

23rd August 2023
view all

Webinars


Grant Preparedness: Unlocking Funding Opportunities for Your Success

10th August 2023

2023 State of Public Sourcing: Taking Local Governments into a Bright Future

1st August 2023

Stop Playing with Fire: How to Manage Infrastructure Asset Risk So You Know You’re Covered

20th June 2023
view all

PODCAST


Young Leaders Episode 4 – Cyril Jefferson – City Councilman, High Point, North Carolina

13th October 2020

Young Leaders Episode 3 – Shannon Hardin – City Council President, Columbus, Ohio

27th July 2020

Young Leaders Episode 2 – Christian Williams – Development Services Planner, Goodyear, Ariz.

1st July 2020
view all

GALLERIES


Gallery: Hottest temperatures recorded in American cities during July

12th September 2023

The top 10 Asthma Capitals for 2023

7th September 2023

U.S. cities with the cleanest air from latest “State of the Air” report

5th September 2023
view all

Twitter


Newsletters

Sign up for American City & County’s newsletters to receive regular news and information updates about local governments.

Resale Insights Dashboard

The Resale Insights Dashboard provides model-level data for the entire used equipment market to help you save time and money.

Municipal Cost Index

Updated monthly since 1978, our exclusive Municipal Cost Index shows the effects of inflation on the cost of providing municipal services

Media Kit and Advertising

Want to reach our digital audience? Learn more here.

DISCOVER MORE FROM INFORMA TECH

  • IWCE’s Urgent Communications
  • IWCE Expo

WORKING WITH US

  • About Us
  • Contact Us

FOLLOW American City and County ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2023 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.