Cause a Denial of Service (DoS) attack. These physical infrastructure attacks can be accomplished simply by snipping a fiber-optic cable. They are typically mitigated by the reality that traffic can quickly be rerouted.
If physical access to a computer system can be obtained, then gaining access to the information on that computer system can also be obtained. With new U.S. laws pertaining to the security of information—including HIPAA (Health Insurance Portability and Accountability Act), the Gramm-Leach-Bliley Act, and the Sarbanes-Oxley Act—data in both physical and electronic forms must not only be protected by adequate access control mechanisms but also be audited if compliance with the various regulations is to be maintained.
Recommendations on physical and logical security integration can be found at this TechTarget Website: http://www.searchSecurity.com/originalContent/0,289142,sid14_gci1046324,00.html? track+NL-358&ad=502258.
Maiwald, E. The ‘How-tos’ of Security Integration. [Online, January 20, 2005.] TechTarget Website. http://searchsecurity.techtarget.com/originalContent/0,289142, sid14_gci1046324,00.html?track+NL-358&ad=502258; McAlearney, S. Wedded to Physical and IT Security? [Online, January 20, 2005.] KnowledgeStorm, Inc. Website. http://knowledgestorm .techtarget.com/searchsecurity/MainServlet?track+NL-358&ad=502258&ksAction+Home&c= TT&n+home; TechTarget. Denial of Service. [Online, May 16, 2001.] TechTarget Website. http:// searchsecurity.techtarget.com/sDefinition/0,,sid14_gci213591,00.html.