Table of Contents:
Introduction………………………………………………………………………………………………………………………………Page 2
Risks and Threats Overview………………………………………………………………………………………………………Page 2
Risks Associated with Access Control………………………………………………………………………………………..Page 3
Methods of Access Control……………………………………………………………………………………………………….Page 4
Government Regulations…………………………………………………………………………………………………………..Page 7
Conclusion…………………………………………………………………………………………………………………………………Page 8
Bibliography………………………………………………………………………………………………………………………………Page 10
Access Control *
Introduction:
Physical security breaches can be detrimental to any company. Adequate access control is imperative to insure the protection of data, assets and employees. In a post 9/11 America, the need for higher physical security standards and more stringent access control systems remains a critical piece of corporate security plans. Access control systems not only keep out unauthorized individuals, but prevent unauthorized access to data and equipment, and help deter and prevent unauthorized disclosure of information. “In traditional physical security, locks, security alarms, access controls, and surveillance video define the primary hardware systems.” (Martin & Bakhto). This paper examines the significance of physical access controls and their purpose and place in the corporate security program.
Risks and Threats Overview:
There are many risks and threats associated with corporations and the protection of their assets and data. Some of these threats include, terrorism (both domestic and foreign), cyber threats, armed intruders, espionage, bomb threats and data spills. Any one of these threats, if allowed to become a reality, could easily be the downfall of a corporation, depending on the severity of the threat. “Physical security breaches can result in more issues for an organization than a worm attack. Loss of data,
Bibliography: Corporate ID Card & Identity Management Systems. (2013). Retrieved from ISG (Identification Systems Group): http://www.identificationsystemsgroup.com/corporate Cambone, S. A. (2006). NISPOM (National Industrial Security Program Operating Manual). Washington, DC: United States Department of Defense. Retrieved from http://www.dss.mil/documents/odaa/nispom2006-5220.pdf Giannoulis, P., & Northcutt, S. (2007, January 25). Security Laboratory: IT Managers - Safety Series. Retrieved from Sans Technology Institute: http://www.sans.edu/research/security-laboratory/article/281 Homeland Security News Wire. (2012, June 11). Homeland Security News Wire. Retrieved from Perimeter Protection: http://www.homelandsecuritynewswire.com/dr20120611-cast-lighting-s-led-perimeter-light-wins-industry-innovation-award Martin, T., & Bakhto, A. (n.d.). Physical Access Controls. Retrieved from Global Information Assurance Certification: http://www.giac.org/cissp-papers/282.pdf