Preview

It244 R Appendix E

Good Essays
Open Document
Open Document
650 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It244 R Appendix E
Associate Level Material
Appendix E

Physical Security Policy

Student Name: Aaron Neary

University of Phoenix

IT/244 Intro to IT Security

Instructor’s Name: KEVIN SWINSON

Date: August 9, 2013

Physical Security Policy

Due in Week Five: Outline the Physical Security Policy. Merkow and Breithaupt (2006) state, “an often overlooked connection between physical systems (computer hardware) and logical systems (the software that runs on it) is that, in order to protect logical systems, the hardware running them must be physically secure” (p.165).

Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario.

These controls may include the following:

• Physical controls (such as perimeter security controls, badges, keys and combination locks, cameras, barricades, fencing, security dogs, lighting, and separating the workplace into functional areas)

• Technical controls (such as smart cards, audit trails or access logs, intrusion detection, alarm systems, and biometrics)

• Environmental or life-safety controls (such as power, fire detection and suppression, heating, ventilation, and air conditioning)

1 Security of the building facilities

1 Physical entry controls

Physical entry controls will consist of guard’s at all perimeter doors, and into all secure areas. Also a security system on all outer doors that is monitored 24 hours a day by a security company. There will also be motion sensors at all available accessible areas. There will be barbed wire around all access to first and second floor areas around perimeter fence. There will also be badges for person ale according to security level as well as guest. Also security cameras in all accessible areas with 360 degree rotation as well as nightvision.

2 Security offices, rooms and facilities



References: Cite all your references by adding the pertinent information to this section by following this example.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Psy/250 Appendix G

    • 398 Words
    • 2 Pages

    | Security managers to keep an eye out the employees, have security cameras, metal detectors and have every employee checked before they leave the store, CCTV, employee screening for all employees.…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Security Assessment

    • 824 Words
    • 4 Pages

    Choose one of the Facts for Consideration sections from Ch. 3 of the text and list the page number for the section you chose. Then, complete the following table. List five threats appropriate to the environment from the section you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures. Once you complete the table, write a brief explanation of the countermeasures for the two threats with the highest risk total, stating how the countermeasure reduces the risk associated with that threat.…

    • 824 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Security is a compelling concern for business and employees. Employers need to establish that they carry out complete risk assessment and address security issues by implementing required security systems. Physical security system is a fundamental component of an establishment, which protects a several aspects such as building security, theft, vandalism and falsification of records. Therefore, organizations and companies need to highly aware of to protect their physical assets. The foundation of a competent security management can prevents such risk like discovering solutions, authorization, and controlling employee’s activities. As a result, organizations can ensure the safety and protection of employees and property.…

    • 1377 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Questions 641 Answers

    • 1208 Words
    • 6 Pages

    State why and when health and safety control equipment, identified by the principles of protection, should be used relating to types, purpose and limitations of each type, the work situation, occupational use and the general work environment, in relation to:…

    • 1208 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Est1 Task 1

    • 623 Words
    • 3 Pages

    The security rule has meaningful standards that are grouped into five categories; administrative safeguard, physical safeguard, technical standards, organizational standards, and policies, procedures, and documentation requirements. Administrative safeguards have several standards that help implement the security rule. The security operation purpose require organizations to evaluate their risks to security and implement policies and procedures that prohibit, detect, and acceptable security violations and to define appropriate approval for security violations. Another, workforce security has three implementation qualifications that are mandatory by the organizations. The organization has to contain policies and procedures to ensure that each members of the particular…

    • 623 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Q1. I classified the following controls based on what I read in appendix 1. For IT General Control, it talks to controls that are set in place so that a client's IT system operates correctly. These controls primarily focus on ensuring that changes to applications are properly authorized, tested, and approved before they are implemented and that only authorized persons and applications have access to data, and then only to perform specifically defined functions. Because of this, the physical access to the server room has been classified as an IT General Control. For Application Control, it talks more to automated controls that apply to the processing of individual transactions. They include such controls as edit checks, validations, calculations, interfaces, and reporting. Because of it being more automated and IT verification, the system requiring a complete and valid order number and only allowing a purchasing manager to approve purchases up to a certain amount fall under here. These are rules that are set in place that will automatically verify what is going on in the IT system before a manual view is needed. The last IT control, IT Dependent Manual Control is more detective in nature, which relies on computer produced information but has a manual oversight on it. Both the overdue receivable account being reviewed by the Credit Manager and bank reconciliations reviewed by the controller fall here as they both rely on information produced by the computer system but still need a manual review before anything is processed. I have assigned these controls to their parent categories in the tables below.…

    • 1966 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Trade Secret – intellectual work ex: business plan a company info that is not publicized/patent/copyright Dumpster diving is always illegal because it involves trespassing on private property – False IT security is the responsibility of everyone in the organization – True Risk mitigation org takes concrete actions against risks acceptance accept the potential risk, continue operating w no controls and absorb any damage that occur limitation limit the risk by implementing controls that minimize the impact of threat transference transfer the risk by using other means to compensate for the loos such as by purchasing insurance Physical controls prevents unauthorized access to a company’s facilities – walls/doors Access controls restrict unauthorized individuals from using info resources Authentication determines the identity of the person requiring access Authorization determines which actions, rights, or privileges the person has, based on verified identity Something the user is – biometric: authentication that examines person’s innate physical characteristics fingerprint/palm Something the user does – authentication that include voice and signature recognition Something the user…

    • 1429 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Context Data Flow Diagram

    • 290 Words
    • 2 Pages

    Show controls for validating input data, for obtaining a record, for ensuring successful completion of a process and for system security.…

    • 290 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Cash Internal Control

    • 453 Words
    • 2 Pages

     Physical, mechanical, and electronic controls - Store cash in safes and bank vaults; limit access to storage areas; use cash registers.…

    • 453 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Goodner Brothers

    • 327 Words
    • 2 Pages

    3. The policies or procedures to alleviate the control weaknesses are “pre-numbering of documents; authorization of transactions; independent checks to maintain asset accountability; timely and appropriate performance reviews; information processing controls; physical controls for safeguarding assets and segregation of duties.” (AU314)…

    • 327 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Ch02

    • 3231 Words
    • 14 Pages

    w. Simple physical controls, such as ensuring locks on doors, guards at entry doors no longer work in today’s information technology…

    • 3231 Words
    • 14 Pages
    Satisfactory Essays
  • Good Essays

    With IT, security aspects are also improvised. Security cameras are used in many places such as shopping centre, office and many more. By using security cameras, the police are able to crack a criminal case much more easily. Electronically managed doors are also common now; password and security card are required to gain access to the office in order to prevent any unauthorised people from entering. Some companies with advanced technology will even use biometrics technology to keep their company safe.…

    • 495 Words
    • 2 Pages
    Good Essays
  • Good Essays

    There are five main components of internal controls that are recognized by the Committee of Sponsoring Organizations of the Treadway Commission (COSO) that are required in…

    • 734 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    When developers start to acquire equipment or software, the __________ stage of the SDLC has been reached.…

    • 603 Words
    • 3 Pages
    Satisfactory Essays