Definition: The word, Lock, as it relates to information security, has several meanings. Desktop workstations, for example, can and should be physically affixed to the desk to increase the difficulty of theft. Storage media (hard drives, CDs and external drives) should be secured behind closed doors or by appropriate software commands that require a password to activate. Even keyboards can be secured prior to leaving a workstation. The physical space that contains infrastructure should also be protected . Some methods require the entering of a numeric combination, a fingerprint, handprint scan or retina scans before permission to enter is granted.
Its Relevance: Blocking physical access to information resources must be provided for in an organization’s security policies. A significant portion of attacks resulting in breaches to the information infrastructure occurs as a result of the insider threat. Securing workstations is relatively inexpensive.