Preview

Physical Security

Good Essays
Open Document
Open Document
848 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Physical Security
Physical Security Policy
IT-244

James Dutcher

Axia College of University of Phoenix
2010
Terrence McRae Physical Security Policy
10/7/2010

Security of the Building Facility
Physical entry controls

Scenario
The Bloom Design Group is a company that offers interior design services to businesses and individuals throughout the world. Bloom has a corporate office in New York and a second office in Los Angeles. The company’s Web site features a virtual decorating tool, which offers clients the chance to play with different color and design schemes. This tool allows their clients to get an idea of what a design project would look like once it is completed, before actually making color and design decisions. The Web site also gives interior designers access to their client files and company style guides, as well as the ability to electronically process orders for design materials and furniture. The designers use a secure login and a password to gain access to the Web site and its features. The company 's workforce spends all its time working remotely and accessing the corporate network using a secure VPN.

Security of building Facilities
Physical entry controls
Physical entry controls are provisions implemented to prevent unauthorized access to restricted areas of organizations premises and infrastructure, or to protect against loss, damage, and interruptions of critical operations. Physical controls should reflect not only on external threats, but also on internal threats alike; inside breaches are very likely. Physical security controls should include educating personnel, locked doors, key codes, security cameras, guards, biometrics (fingerprint authentication) , and if possible motion sensors to detect any person without permission from gaining access to sensitive areas. Security also considers natural disasters, such as earthquakes, tornadoes, fire,



References: Axia College of University of Phoenix Regan P. (2004) Wide Area Networks, Retrieved November 7, 2010, from Axia College Week 4 reading AXcess— IT-242 Introduction to WAN Technologies Narasimman R. (June 23, 2005) Laptop Security Retrieved, November 7, 2010, from http://www.securitydocs.com/library/3399 Miller L. (n.d.) Physical and Environmental Security Retrieved, November 7, 2010, from School of Medicine University of Miami http://it.med.miami.edu/x2230.xml

You May Also Find These Documents Helpful

  • Powerful Essays

    Wide area networks (WAN) are complex networks that span large geographical areas. The most commonly known WAN is the Internet. WANs tend to be slower in speed, highly complex, and intolerant of system problems. Because of the multitude of connections on a WAN, even a simple down can create problems across the network.…

    • 855 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    It 244 Week 1 Checkpoint

    • 721 Words
    • 3 Pages

    The company I have chosen is The Bloom Design Group. The Bloom Design Groups mission is to provide online interior design services to its customers. The company offers their customers interior design services. What sets this company apart from others is that they have a website that allows customers a chance to design and decorate their rooms to their liking in a virtual environment before spending their money. The option provided for their customers is a virtual decorating tool. With this tool customers can play around with various color schemes for each room’s floor and ceilings, as well as customizing furniture as well. Then employees are able to access the corporate network through a VPN collection to access their client files, in order to place electronic orders for the design materials and furniture.…

    • 721 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 5 Lab 1 Answers

    • 4778 Words
    • 20 Pages

    Internetworking Basics Internetworking Models The OSI Reference Model Summary Exam Essentials Written Labs Review Questions Answers to Review Questions Answers to Written Lab 1.1 Answers to Written Lab 1.2 Answers to Written Lab 1.3…

    • 4778 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    Regan, P. (2004). Chapter 12: Introduction to Routers and Routing in Wide Area Networks. Prentice-Hall.…

    • 554 Words
    • 3 Pages
    Good Essays
  • Better Essays

    sec 410

    • 1157 Words
    • 5 Pages

    It is important for all organizations to have physical security. Physical security protects the organization in every way. Every individual needs to be aware of the importance of physical security. Not only is important for the individual to be aware of the importance physical security has in an organization but to be able to understand how physical security works within the organization. In this paper the writer will be describing the core concepts of physical security. Additionally the writer would be writing about the security assessments. Last the writing would be writing about the basic physical controls.…

    • 1157 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    The Layout map shows the direct connection to each department the potential lack of defenses against deliberate attack, critical infrastructure protection, and any human error leading to future incidents in the physical security. In the majority of the building region the main issues were of the staff lack of knowledge or lack of proper protocols to prevent the lost of confidential documentation like in the Warehouse region. In the Tool and Distribution Center there were elapses in protocol when the staff member allowed the disbursal of tool without following the department’s documentation policy for a friend. In some areas security are up to par for the necessary observation over sensitive…

    • 357 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    For every organization and business, physical security is a necessary aspect of protecting its facility, properties and employees against unwanted criminal activities. To choose the best organizational security plan possible, the organization must first conduct a thorough risk and threat assessment to assist in developing physical security plan. Basic physical controls focus on three levels of protection, which is the outside perimeter, the inside perimeter and the interior of a building. Each of these security levels must include at least two to three forms of security measures to make physical controls effective. An organization that is pursuing physical security should follow the recommended security best practices and implement the necessary steps to ensure the most effective physical security possible.…

    • 1927 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Wingtip Toys

    • 2558 Words
    • 11 Pages

    References: Search Enterprise WAN (2009). Wide Area Network (WAN) Definitions: Virtual Private Network. Retrieve Dec 31, 2009, fromhttp://searchenterprisewan.techtarget.com/sDefinition/0,,sid200_gci213324,00.htmlStallings, W. (2001). IEEE 802.11: Moving Closer to Practical Wireless LANs.…

    • 2558 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Weapon Security

    • 503 Words
    • 3 Pages

    What are some of the reasons why you should practice good weapons security in places that are familiar and unfamiliar in a deployed environment? Reason One: You never know what other people may be thinking or planning so as a soldier you should be ready at all times. Reason Two: If you work in a environment where you are around locals that could be potentially a threat to you, you should never be to comfortable around them. Reason Three: You should never leave your weapon unattended because it may be picked up by the wrong person.…

    • 503 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Physical Privacy

    • 948 Words
    • 4 Pages

    tried. We will examine our emotions using the utilitarian approach and the correct or policy…

    • 948 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Home Security

    • 4779 Words
    • 20 Pages

    Firstly we would like to heartfully thank our beloved lecturer Mr.M.J.Sampath kumar and Mr.S.B.Rudraswamy without whose guidance our project would have been a mere dream. We also like to take this opportunity to thank our respected HOD C.R.Venugopal.…

    • 4779 Words
    • 20 Pages
    Powerful Essays
  • Powerful Essays

    Understanding the importance of physical security rest in acknowledging the two main elements of security; people, and technology ( Bitzer [Remove the space after the parenthesis] & Hoffman, n.d.). Physical security consists of a series of actions used to protect someone or something against an unwanted or illegal invasion. At its core, physical security consists of three levels; outer perimeter, inner perimeter, and the interior. Essentially, when implementing a system of physical security one needs to implement several forms of security on each of the three aforementioned levels in order to [Writing suggestion--the meaning will be the same (and less wordy) by removing "in order"] obtain effective security (Deutsch, 2011). The following study will assess the various features of physical security and their overall [Wordiness: unless meaning denim work clothes, "overall" is general and vague and contributes little to the sentence] importance in the overall system…

    • 1537 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Elements of Security

    • 2008 Words
    • 9 Pages

    Before any company begins to expand their business into another country, they should prepare a risk assessment of the areas of interest and begin to narrow down choices based on their positives and negatives. By identifying those positives and negatives, it allows the company to weigh their overall outcome and where they could afford to take the risk. To just dive into an unknown country without assessing the economy and current security risks of setting up shop in that area could harm the future of the company greatly. Some areas that a company would want to look into would be the current economic state of the country. They would want to know how the current population is holding up against poverty and how the unemployment rate is affecting that poverty rate. They would also want to take into consideration any environmental concerns and how that might play into any unwanted expenses later down the road.…

    • 2008 Words
    • 9 Pages
    Better Essays
  • Powerful Essays

    Security plays a major role in business. The value security Department brings to organizations is enormous as the department works hard to avert losses, shield property and human assets.…

    • 2080 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Human security

    • 1380 Words
    • 6 Pages

    become little more than a vehicle for activists wishing to promote certain causes, and that it…

    • 1380 Words
    • 6 Pages
    Satisfactory Essays