Appendix E
Physical Security Policy
Student Name: Aaron Neary
University of Phoenix
IT/244 Intro to IT Security
Instructor’s Name: KEVIN SWINSON
Date: August 9, 2013
Physical Security Policy
Due in Week Five: Outline the Physical Security Policy. Merkow and Breithaupt (2006) state, “an often overlooked connection between physical systems (computer hardware) and logical systems (the software that runs on it) is that, in order to protect logical systems, the hardware running them must be physically secure” (p.165).
Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario.
These controls may include the following:
• Physical controls (such as perimeter security controls, badges, keys and combination locks, cameras, barricades, fencing, security dogs, lighting, and separating the workplace into functional areas)
• Technical controls (such as smart cards, audit trails or access logs, intrusion detection, alarm systems, and biometrics)
• Environmental or life-safety controls (such as power, fire detection and suppression, heating, ventilation, and air conditioning)
1 Security of the building facilities
1 Physical entry controls
Physical entry controls will consist of guard’s at all perimeter doors, and into all secure areas. Also a security system on all outer doors that is monitored 24 hours a day by a security company. There will also be motion sensors at all available accessible areas. There will be barbed wire around all access to first and second floor areas around perimeter fence. There will also be badges for person ale according to security level as well as guest. Also security cameras in all accessible areas with 360 degree rotation as well as nightvision.
2 Security offices, rooms and facilities
References: Cite all your references by adding the pertinent information to this section by following this example.