Question

In: Computer Science

what is physical security in your own words

what is physical security in your own words

Solutions

Expert Solution

physical security

The physical security domain provides protection techniquesor security for the entire facility,from the outside perimeter to the insideoffice space, including all of the information system resources.because that due to the current situation so many security attack or cyber attacks we face them.Physical security can be as simple as a locked door or as elaborate as multiple layers of barriers, armed security guards and gate-house placement.physical Security describes security measures that are designed to deny access to unauthorized personnel from physically accessing a building, facility, resource, or stored information; The physical measures & their associated procedures to safeguard & protect against:

  • Damage
  • Loss
  • Theft

Physical safeguards a person must face before that the logical safeguards are reached physical security is the first line of security.example:locked doors,fence,cameras,access badges,locked computer,security guards,gates and security dogs.

physical object that creates a barrier to unauthorized access. This includes:

  • locks and latches
  • safes
  • alarms
  • guards & guard dogs
  • doors & door strikes/frames/closers
  • Windows
  • ceilings & floors
  • walls & fences

just few examples description shown below:

Locked Door

  

  • it is self locking or user must lock
  • keeping doors locked is reliant on a policy to due so
  • policies must be enforced for locks to work

camera

  • cameras is provide security.
  • like firewalls,traffic is managed.
  • cameras monitor physical traffic of authorized and unauthorized users.
  • can be used in a breach scenario to make sure all users are authorized.

Locked computers

  • locked computers keep unauthorized users from accessing a computer
  • log off or shutdown function used.
  • only password allow users onto computer.
  • prevent attacker from physical accessing and installing malware onto computer.

Fences

  

  • Fences can be around entirety of building.
  • in breach scenario there can be a "lock-in".
  • fences keep all people in or out.
  • must be activated by procedure.

Fire Security and Safety

  • Most serious threat to safety of people who work in an organization is possibility of fire.
  • Fires account for more property damage, personal injury, and death than any other threat.
  • Imperative that physical security plans examine and implement strong measures to detect and respond to fires

Barcodes

First-generation barcodes represent data as a series of variable-width, vertical lines of ink: one-dimensional encoding schemeSome more recent barcodes are rendered as two-dimensional patterns using dots, squares, or other symbolsCan be read by specialized optical scanners, which translate a specific type of barcode into its encoded information.

it consist of 3 types:

  • Physical security controls-consist of the system and techniques used to restrict access to a security perimeter,eg:Mantraps,Guard Dogs
  • Technical Controls-it consist of Alarms,Intrusion Detection systems,CCTV
  • Administrative Controls-Restricted Area Authorized Person only,Access logs,emergency procedures.

Physical Security Attackers : Two Categories

  • Outside the company
  • From within the company

Preventing Outside attackers

  • Natural barriers: landscape and terrain
  • Fencing: type and construction
  • Walls and ceiling construction: high risk areas
  • Gate facilities: security checkpoints
  • Frequency of patrols and security check
  • Door and window locations and security devices used
  • Reception areas: location and control of entry
  • Employee surveillance and vigilance
  • Parking areas: entrance/exit, access to facilit

Physical Security Preventing attackers from within

  • Ex: Disgruntled or greedy employers or contactors.
  • It’s important to implement a physical access control program in a company and strictly enforce the measures
  • If an attacker has physical access to a system they can wreak havoc.

physical security provide protection


Related Solutions

No Plagiarism and must be in your own words (300 Words) Subject: Physical Security What are...
No Plagiarism and must be in your own words (300 Words) Subject: Physical Security What are protective barriers, and what should they entail?
No Plagiarism and must be in your own words (300 Words) Subject: Physical Security .What mitigation...
No Plagiarism and must be in your own words (300 Words) Subject: Physical Security .What mitigation procedures can be used to ensure the resiliency of protective barriers?
No Plagiarism and must be in your own words (300 Words) Subject: Physical Security Describe and...
No Plagiarism and must be in your own words (300 Words) Subject: Physical Security Describe and explain some of the hardening methods of entry control.
Challenges in Implementing Physical Security. In your opinion what are the challenges in implementing physical security,...
Challenges in Implementing Physical Security. In your opinion what are the challenges in implementing physical security, this includes social engineering.
Information Technology (IT) Security Define your chosen type of security in your own words. Does the...
Information Technology (IT) Security Define your chosen type of security in your own words. Does the term shrinkage relate to your type of security? If so, how? (If not, please omit this portion from your response.) What challenges and risks exist for this type of security? How are the risks mitigated? Tracked? Eliminated? What types of internal and external factors exist? What key strategies are used to protect assets, personnel, and infrastructure? Please be sure to outline prevention and response...
Describe in your own words, what is the PHYSICAL SIGNIFICANCE of effective mass?? (Don’t talk about...
Describe in your own words, what is the PHYSICAL SIGNIFICANCE of effective mass?? (Don’t talk about the formulae)
Anwser in your own words Describe in your own words, what should be included in health...
Anwser in your own words Describe in your own words, what should be included in health record documentation best practices. Provide at least one example of how HIM's ensure these best practices are met.
In physical chemistry I want to answer this In your own words explain the following terms:...
In physical chemistry I want to answer this In your own words explain the following terms: 1) Born- oppenheimer Approximation , 2) molecular orbital , 3) overlap integral , 4) coulomb integral and 5) exchange integral
Answer only ONE of the questions below. In your own words. 1- The importance of physical...
Answer only ONE of the questions below. In your own words. 1- The importance of physical activity, along with nutrition, is a key component of a healthy lifestyle. Find an article that studied the effects of physical activity on reducing the risk of a particular disease, or on improving one's health following a specific disease. 2- Proper nutrition plays a big role in improving athletic performance. Find an article that discusses specific nutritional needs for a particular type of athlete...
what is Peer Review in your own words?
what is Peer Review in your own words?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT