When you think of network security, or even computer security, you may imagine attackers exploiting software vulnerabilities. An equally important vulnerability is the physical security of devices, as shown in the figure. An attacker can deny the use of network resources if those resources can be physically compromised.

The four classes of physical threats are:

Some of these issues must be dealt with in an organizational policy. Some of them are subject to good leadership and management in the organization.