IT-244
James Dutcher
Axia College of University of Phoenix
2010
Terrence McRae Physical Security Policy
10/7/2010
Security of the Building Facility
Physical entry controls
Scenario
The Bloom Design Group is a company that offers interior design services to businesses and individuals throughout the world. Bloom has a corporate office in New York and a second office in Los Angeles. The company’s Web site features a virtual decorating tool, which offers clients the chance to play with different color and design schemes. This tool allows their clients to get an idea of what a design project would look like once it is completed, before actually making color and design decisions. The Web site also gives interior designers access to their client files and company style guides, as well as the ability to electronically process orders for design materials and furniture. The designers use a secure login and a password to gain access to the Web site and its features. The company 's workforce spends all its time working remotely and accessing the corporate network using a secure VPN.
Security of building Facilities
Physical entry controls
Physical entry controls are provisions implemented to prevent unauthorized access to restricted areas of organizations premises and infrastructure, or to protect against loss, damage, and interruptions of critical operations. Physical controls should reflect not only on external threats, but also on internal threats alike; inside breaches are very likely. Physical security controls should include educating personnel, locked doors, key codes, security cameras, guards, biometrics (fingerprint authentication) , and if possible motion sensors to detect any person without permission from gaining access to sensitive areas. Security also considers natural disasters, such as earthquakes, tornadoes, fire,
References: Axia College of University of Phoenix Regan P. (2004) Wide Area Networks, Retrieved November 7, 2010, from Axia College Week 4 reading AXcess— IT-242 Introduction to WAN Technologies Narasimman R. (June 23, 2005) Laptop Security Retrieved, November 7, 2010, from http://www.securitydocs.com/library/3399 Miller L. (n.d.) Physical and Environmental Security Retrieved, November 7, 2010, from School of Medicine University of Miami http://it.med.miami.edu/x2230.xml