wk4LearningTopic3forproject2.docx

Learning Topic

Physical Security Planning

stock photo of a security officer working in control room.

Jon Feingersh Photography Inc. / DigitalVision / Getty Images

Organizations can implement the best authentication scheme in the world, develop the best access control, and install firewalls and intrusion prevention. However, their security cannot be complete without implementing physical security. 

The goal of physical security is to protect the actual hardware and networking components that store and transmit information resources. This involves taking measures to prevent unauthorized access to the organization’s assets. These measures include the following:

· Locked doors: It may seem obvious, but security is useless if an intruder can simply walk in and physically remove a device. High-value information assets should be secured in a location with limited access.

· Physical intrusion detection: High-value information assets should be monitored through security cameras and other means to detect unauthorized access to the physical locations.

· Secured equipment: Devices should be physically locked down. One employee’s hard drive could contain all your customer information.

· Environmental monitoring: An organization’s servers and other high-value equipment should always be kept in a room that is monitored for temperature, humidity, airflow, and unauthorized access. The risk of a server failure rises when these factors go out of a specified range.

· Employee awareness and training: Physical security requires educating all employees on organizational policies and best practices related to security, such as upholding visitor policies, workstation locking, device encryption, following policies related to traveling with work devices, and reporting suspicious activity (Kostadinov, 2017).

References

Kostadinov, D. (2017). Tips for managing physical security. Infosec.  https://resources.infosecinstitute.com/category/enterprise/securityawareness/managing-physical-security/#gref).

Licenses and Attributions

 from  Information Systems for Business and Beyond by David T. Bourgeois is available under a   license. © 2014, David T. Bourgeois. UMGC has modified this work and it is available under the original license.

image1.jpeg

Calculate your order
Pages (275 words)
Standard price: $0.00
Client Reviews
4.9
Sitejabber
4.6
Trustpilot
4.8
Our Guarantees
100% Confidentiality
Information about customers is confidential and never disclosed to third parties.
Original Writing
We complete all papers from scratch. You can get a plagiarism report.
Timely Delivery
No missed deadlines – 97% of assignments are completed in time.
Money Back
If you're confident that a writer didn't follow your order details, ask for a refund.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Power up Your Academic Success with the
Team of Professionals. We’ve Got Your Back.
Power up Your Study Success with Experts We’ve Got Your Back.
Open chat
1
Hello. Can we help you?