O Preventing Signal Jamming Attacks

Follow normal physical security procedures. This type of attack will prove to be very hard to detect without physically inspecting the surrounding area regularly. A signal jamming attack may use a hidden, timer-activated portable device, so security personnel must be trained to look for changes in their environment, not just the presence of unauthorized individuals.

All changes in location or status of a tagged object should also be confirmed by both parties involved in the change. If a wholesaler delivers a product to a retailer, then the amount of product transferred is recorded on an invoice. If either party notes a discrepancy, investigate it. This is an obvious tactic when dealing with an outside vendor because payment will be made for the goods delivered, but this tactic should also be used internally. If an item is moved from the back room to the floor, confirm the move with a change in inventory for both locations.

Was this article helpful?

0 0
The Ultimate Computer Repair Guide

The Ultimate Computer Repair Guide

Read how to maintain and repair any desktop and laptop computer. This Ebook has articles with photos and videos that show detailed step by step pc repair and maintenance procedures. There are many links to online videos that explain how you can build, maintain, speed up, clean, and repair your computer yourself. Put the money that you were going to pay the PC Tech in your own pocket.

Get My Free Ebook


Post a comment