This is the third article of a series whose purpose is to provide experienced physical security practitioners with a comfortable familiarity with key aspects of computer and network security. Network ...