Physical Security

Superior Essays
This chapter began with a brief introduction of physical security. This chapter described physical security as an important issue to organizations and their infrastructure. Indeed, physical security was addressed as a mechanism that protect data, systems, equipment, facilities, people and all company assets. This chapter equally observed that the issue of physical security in today’s world is very alarming and at a raising costs for companies because environment are now becoming more dynamically complex. Computer memory, processors, has been stolen from companies at different point. Companies have witnessed robbery attack, terrorist attack, shooting rampage by disgruntled employees or students in an institution of learning. It was also vividly mentioned in this chapter that if any security measures such as closed-circuit TV (CCTV) surveillance, security guards, intrusion detection systems (IDSs) failed, then of course the fault is from a human being considered as the weakest link in information security. This chapter also noted that people did not embrace physical security the …show more content…
It however explained how smart card can be used as an access control mechanism as well as locks, in securing facility or system. This chapter also discussed about Electronic Access Control (EAC) tokens and how useful it is in protecting and controlling entrances into physically controlled area. Intrusion Detection System was also evaluated in this chapter as an essential tool in detecting any strange changes within the physical environment or system. Once the IDSs capture any strange change, it alerts the responsible entities and proper action will be taken to evaluate the situation and react to it. In all, physical security though, was often not considered when addressing information security, but it is a key area that touched people, data, system, buildings and all company

Related Documents

  • Improved Essays

    5. Physical Security Devices a) Employee Identification Badges / Smart Cards: The company should provide employees with picture identification badges with a smart chip and magnetic strip. The company will provide unique public-key infrastructure (PKI) certificates on the employee’s smart chip, which will allow user access to the company network. Radio Frequency Identification (RFID) capable cards should not be used. While they are more convenient for access control than swipe cards, an attacker can scan and capture the identification information provided by the RFID chip without having to have any physical contact with the ID card, and use that information to gain access [43].…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    Cyber Ark is an enterprise application cyber security company based in Israel with offices worldwide. The United States headquarters is in Newton, MA. with regional sales offices in Ft. Lauderdale, Houston, Las Angles and Chicago. The company is well known in the IT Security Company with a quality product designed to secure data in the enterprise as well as the cloud.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt2580 Unit 7

    • 395 Words
    • 2 Pages

    There is panel control where a unit/equip is available in front of their cameras and other apparels to diagnose and give disposable information about the concern. Most often, this kind of security is to ensure that sensitive areas can only be accessed by authorized persons only, they control the equipment, data, electronic information of the organization from breaching or any other violence. D.B Parker proposed three additional elements for Information Security: Firstly, we have authenticity which accounts on the veracity of the information stored by the control or the website manager. It ensure that the members registered in the organization are who they state to be. We have possession and control, this is the control of the documents and all information saved in a computer or on a chip with encrypted code or information.…

    • 395 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Saga Fly Fishing

    • 551 Words
    • 3 Pages

    No limitation of access control especially in the sensitive areas such as storekeeping, work centre and inventory control may endanger the company’s assets (inventory and cash especially) and information. Proper actions or measures need to be taken into consideration. For instance, implementation of the electronic sensor and alarm, identification badges, CCTV, security guards, backup schedule and so…

    • 551 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Data security in the healthcare sector must be persistent and sufficient in ensuring the privacy and protection of patient’s information. The developing threat postured by malicious coding, such as viruses and worms, and unethical hackers can by reduced by the utilization of government standardize security controls. For instance, the Health Insurance Portability and Accountability Act has established security necessities regulations to ensure the protection of health information. However, organization must address the potential risk existing an internal and external networks to tackle threats effectively. Developing an effective network infrastructure by using resource hardware components as switches and routers to boost network security can reduces business operations interruption from attacks.…

    • 782 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    John Parachini Case Study

    • 790 Words
    • 4 Pages

    This paper will also relate the threat of this type of attack with the risk management perspectives…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Physical access control, audit review: Unauthorized access to sensitive facilities could occur without challenge, during which time a malicious party may directly connect to the supervisory control and data acquisition (SCADA) system and potentially set up a more permanent and remote connection for ongoing unauthorized access at a later time. Physical access to organizational facilities is a security vulnerability if not control as unauthorized personnel may access critical or sensitive areas. 5. Audit review, analysis and reporting: Without formalized review and validation of logs, unauthorized users, applications, or other unauthorized events may be present in the system and operate in the industrial control systems network without detection. 6.…

    • 301 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Homeland Security

    • 1157 Words
    • 5 Pages

    Security systems both physical and virtual are utilized to safeguard information from being copied, stolen, or destroyed. This is complicated by the fact that cyber-attacks can originate from hundreds of miles away and the source can be complicated to determine (Kemp 2012, p. 33). This leads to more robust security systems and multiple layers of duplicated…

    • 1157 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Promote Fire Safety

    • 652 Words
    • 3 Pages

    There are also recommended scanner and biometric system and other electronic devices that are legally allowed to control the identification of visitors and employees. All of these should provide safety to control the flow of people and confidential information of the…

    • 652 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Personal Safety

    • 954 Words
    • 4 Pages

    Personal Safety in the lab Personal Protective Equipment There is the possibility for safety concerns in the lab that may happen at any given moment. This could range from contact with a biological agent, splashing a hazardous chemical or even handling radioactive material. It is of the upmost importance that personal protective equipment be worn in the lab that should protect them from specific hazards of a hazardous substance. It should be noted that personal protective equipment used in the lab does not open the gates for a lacks in the protocols and measures one should be taking to ensure safety.…

    • 954 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    - Employees need to store sensitive information, including protected health information (PHI) on protected network servers only. - Employees need to avoid accidental spills by keeping food and drink away from workstations. - Laptops that contain sensitive information need to be secured by using cable locks or by locking them in drawers or cabinets. - Employees need to comply with the Portable Workstation Encryption…

    • 636 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Airport Security Plan

    • 868 Words
    • 4 Pages

    Physical Security 4. Customer/Patron Security 5. Commerce Security The fundamental parts of system security are, for example, • Secure remote access can be given virtual private systems VPNs • Antispyware & Antivirus • Unauthorized access to system can…

    • 868 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    External building security can also need to use physical security who plays a part in allowing people to get in and out the house environments. Some of the key principles which are discussed in this paper about external security include the integrity principle, confidentiality principle, the consistency principle and the availability principle. These key principles can be used by the house owners to improve the policies in place concerning protection and also the procedures which are already being followed in the organization. While assessing risks which can take place in a business environment, if the…

    • 1415 Words
    • 6 Pages
    Superior Essays