Question

In: Computer Science

Please no copy and paste from other website: EXERCISE #1 - PHYSICAL AND PROCEDURAL CONTROLS FOR...

Please no copy and paste from other website:

EXERCISE #1 - PHYSICAL AND PROCEDURAL CONTROLS FOR PROTECTING ASSETS - GENERAL DISCUSSION

"Security Management Standard: Physical Asset Protection" is a 2012 ASIS International publication that assists security directors in completing their security planning.

"ASIS International Facilities Physical Security Measures Guideline," also assists organizations in determining risk levels and the appropriate controls to secure assets in the most effective, efficient, and cost-saving manner.

After thoroughly reviewing these documents, summarize their contents and explain how the standard and the guideline will assist you in completing the vulnerability assessment required not only for this in this course, but also in your current of future security management career.

Also, identify, in your considered opinion, the five most significant physical controls used to protect corporate assets discussed in the document and explain your rationale, citing not only the advantages of the controls you selected, but also the drawbacks.

REMEMBER: Be sure to cite your sources

Solutions

Expert Solution

If there exists a perfect world where we need no security, then risk will never occur. But this is not true in the real world, where all large , medium as well as small size companies encounter at-least some degree of risks. The solutions for these risks should be developed such a way it is cost effective wile it meets the requirement of the company as well as its objectives. Risk exists in all levels of enterprises, organizations which puts the company’s important assets such as confidential data under attacks. These important assets are prone to detrimental occurrences including, intentional, unintentional, as well as events, for instance, the company’s window may break due to unwary weather, deliberate destruction, in this case the actual occurrence of breaking a company window cannot be predicted. In-order to overcome this situation, “Security Management Standard: Physical Asset Protection” provides enterprises, companies and organizations the methods, techniques to safe guard as well as manage their important assets, thereby, protecting sustainability and its profitability along with reputation. It can be deployed to any kind of organization , no matter their factor or size. Based on it, an enterprise should include people, property, information, as well as intangibles under assets, it also recommends to include tangible and intangible assets including brand, information and reputation under physical asset protection.

It suggests to safeguard assets by creating a physical asset protection management system which considers an enterprise’s security as a proactive management system. This is similar to ISO Management System which includes management, employees, technologies, and methods since these entities share the same risk factors. The physical asset protection management system must not only predict but also manage uncertainty under evolving environment. The important components which needs to be included in a physical asset protection management system are establish, implementation, monitor, review, maintain, as well as enhance physical protection systems (PPS).

Now let us a look at five most important physical security measures for an organization:

  1. Lock up the server room: The server room consists of servers, switches, routers, cables which are important assets in any organization.
  2. Set up surveillance.
  3. Keep unauthorized employees out from entering important facilities.
  4. Regular testing of physical security systems should take place.
  5. Protect the computers, laptops, pen drives as well as printers.

Related Solutions

please don't copy and paste from other website Write the Impacts of the COVID-19 Shocks in...
please don't copy and paste from other website Write the Impacts of the COVID-19 Shocks in New Zealand (~600 words) Use economic models and theories covered in this course (e.g. AD-AS model, neoclassical growth model, etc) to explain how the pandemic affects the demand and supply side of the economy. TIP: ⮚ You could discuss how the government’s non-economic responses to the pandemic (e.g. social distancing, closing the borders) and how it affects the economy. ⮚ You could contrast the...
Please don't copy and paste from other website. Outline the key fiscal and monetary policy actions,...
Please don't copy and paste from other website. Outline the key fiscal and monetary policy actions, respectively, of New Zealand against the COVID-19 shocks(already outlined below) use appropriate macroeconomic models and theories covered in this course to explain their expected impacts. Discuss any limitations of these policy actions. (~600 words) TIPS: ⮚ If there are many policy actions, you could list all of them but focus on the key ones for discussion. ⮚ The government may take multiple actions (e.g....
Please do not go to a website and copy and paste a bunch of stuff that...
Please do not go to a website and copy and paste a bunch of stuff that does not answer the question. *ICD 10 PCS* 1. Research and discuss the guidelines that apply to the coding of CABGs, Pacemaker insertions, and also to the Coding of a Debridement.
(Please do not use any material from previously answered on cheeg website or do not copy/paste...
(Please do not use any material from previously answered on cheeg website or do not copy/paste someone else writing. I am looking for completely new article with reference!!) Blogging Assignment: "bloggers" are responsible for posting news articles and offering brief commentary on them. The Rules: **Anything "bloggers" post must specifically pertain to the field of technology or e-marketing. As you are aware, these fields are wide open and have many interesting and varied topics within it, so you should have...
There are two answer already posted up on this website please do not copy and paste...
There are two answer already posted up on this website please do not copy and paste from one of those I can not use those, Please help I have posted this before but all I get is a copy paste, Please no less then 3 paragraphs the more the better THank you for your help and I will rate well. Select a familiar or local Common Resource or Public Good (see text for examples to consider). Assess the existence of...
Please answers on your own words don't copy from other writers in this website or from...
Please answers on your own words don't copy from other writers in this website or from other websites I need 0% plagiarism​​​​​​​. Note. please don't copy from other writer here in Chegg or other web because it will be plagiarism​​​​​​​ coz maybe some student already submitted so it will match so please if you will copy from other source don't answer.just make sure its your own words. thanks answer the following: A. A company wants to implement good internal control....
Please DO NOT copy-paste from other sources. answer will be checked for plagiarism. Thank you!!! Question:...
Please DO NOT copy-paste from other sources. answer will be checked for plagiarism. Thank you!!! Question: Using a Web browser, search for “incident response template.” Look through the first five results and choose one for further investigation. Take a look at it and determine if you think it would be useful to an organization creating a CSIRT. Why or why not?
Please DO NOT copy-paste from other sources. answer will be checked for plagiarism. Thank you!!! Question:...
Please DO NOT copy-paste from other sources. answer will be checked for plagiarism. Thank you!!! Question: Using a Web browser, identify at least five sources you would want to use when training a CSIRT. Using a Web browser, visit mitre org. What information is provided there, and how would it be useful?
Please DO NOT copy-paste from other sources. answer will be checked for plagiarism. Thank you!!! Question:   ...
Please DO NOT copy-paste from other sources. answer will be checked for plagiarism. Thank you!!! Question:    Using a Web browser, visit securityfocuscom. What is Bugtraq, and how would it be useful? What additional information is provided under the Vulnerabilities tab? Using a Web browser, visit certorg. What information is provided there, and how would it be useful? What additional information is provided at cert org/csirts/?
DO NOT COPY AND PASTE FROM THE WEBSITE!!!! I NEED YOUR OWN WORD!!! Explain the seeming...
DO NOT COPY AND PASTE FROM THE WEBSITE!!!! I NEED YOUR OWN WORD!!! Explain the seeming contradiction in the One-Way ANOVA; namely, that the null hypothesis is about comparing the means of three or more populations, whereas the actual testing of means is about using ANOVA analysis to compare variances. Why is this so?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT