Cabling Security

The security of your cabling should be considered both when your computer premises are set up initially, and, subsequently, when hardware enhancements are carried out. See also Installing and Maintaining Network Cabling.

To view the related Policy click      

  • Cables may be damaged with a resultant reduction in reliability and / or the loss of your network.

  • Consider separating the network wiring from all other wiring, so as to protect and monitor it more easily, and to reduce the danger of accidental electronic interference.
  • Where rodent damage is possible, consider installing armoured cable.
  • For very high-security situations, consider laying the cable in transparent conduit, thereby allowing ready identification of any interference.
  • Any intrusion into your network may threaten your information systems and hence the confidentiality of your information.

  • Ensure that all devices such as datascopes, that may facilitate tapping of communications lines, are controlled effectively. See electronic eavesdropping.
  • Ensure that network access points are disabled if equipment is removed.
  • Consider separating the network wiring from all other wiring to protect and monitor it more easily, and to reduce the danger of accidental electronic interference.
  • For very high-security situations, consider laying the cable in transparent conduit, thereby allowing ready identification of any interference.
  • Ensure that the incoming and outgoing services, including communications lines, are hidden from view and are adequately protected against damage.
  • A failure to observe Health and Safety regulations may threaten the well-being of staff and render you liable to prosecution.

  • Avoid 'quick fixes' which involve practices that may be dangerous to staff.
  • Make sure that the cabling routes you adopt do not create a trip hazard, even if for short periods of time.
Previous PageTop of this pageNext Page


Information Security Policies from US$595

 From
 US$595

Use of the guidance contained within RUSecure™ is subject to the End User Licence Agreement
This site created with EasyHTMLHelp(tm) for MS Word

 

Next PageUpPrevious Page