SEC 410
March 17, 2012
Brian Kissinger
Basic Physical Controls Principles For every organization and business, physical security is a necessary aspect of protecting its facility, properties and employees against unwanted criminal activities. To choose the best organizational security plan possible, the organization must first conduct a thorough risk and threat assessment to assist in developing physical security plan. Basic physical controls focus on three levels of protection, which is the outside perimeter, the inside perimeter and the interior of a building. Each of these security levels must include at least two to three forms of security measures to make physical controls effective. An organization that is pursuing physical security should follow the recommended security best practices and implement the necessary steps to ensure the most effective physical security possible.
At its core, physical security helps achieve protection of the personnel and assets by keeping the theft and other malicious criminal activities.
Outer, Inner and interior Perimeter Security To better understand how to effectively implement security measures on the three basic levels of protection, there must be a clear distinction between the outer, inner and interior perimeter security. The outer perimeter of a property is usually defined by the property lines. The facility’s outer perimeter is fenced with a distinctive access point of entry, such as gate. The main purpose of establishing the outer perimeter security is to control all the traffic entering and leaving the property, meaning only authorized personnel and visitors should be granted the access pass the entrance gate. For an organization to decide which type of outer perimeter security is the most suitable one for its purposes, it needs to weigh the pros, cons and the cost of an intruder entering the property versus the physical security available.
External Building
References: Defense in Depth: It is more than just the technology; retrieved on February 20, 2012 from www.isa.org/intech Revealing network threats, fears; retrieved on February 20, 2012 from www.isa.org/intec Maiwa, E. (2004). Fundamentals of network security. New York, NY: McGraw-Hill Technology Education. National Institute of Standards and Technology Special Publication 800-30, Risk Management Guide for Information Technology Systems (July 2002) Renfroe, N; Smith, J. (2012) Threat and Vulnerability Assessment and Risk Analysis retrieved on March 12, 2012 from http://www.wbdg.org/resources/riskanalysis.php Steinberger, R. (2009). Proactive vs. Reactive Security. Retrieved from http://www.crime research.org/library/Richard.html