Question

In: Computer Science

No Plagiarism and must be in your own words (300 Words) Subject: Physical Security What are...

No Plagiarism and must be in your own words (300 Words)

Subject: Physical Security

What are protective barriers, and what should they entail?

Solutions

Expert Solution

I am going to explain protective barriers only related to physical security. don’t forget to upvote if you like the answer.

Protective barriers are the one which help us in keeping the important things (which may be confidential data, information, gold, money etc) in safe place.

We define physical safety only if it has a limited access, only authorized person’s access

And this can be achieved only with the help of protective barriers.

Lets take an example where we need a protective barriers in real time:

Let’s say I need to construct a data centre so here we are dealing and maintains sensitive data of various clients so obviously it needs physical security which indirectly needs protective barrier.

List of Protective Barriers needed:

  1. Security: once you identify a place to make the place safe .put security guards who allows only authorized persons into it.
  2. Surveillance camera: this is also an important protective barrier which monitors place 24*7.
  3. Fire safety: This is also an important barrier to keep the data safe.so proper fire safety precaution with fire extinguisher,fire alarm etc should be incorporated.
  4. Access card and Time Tracker: This is one of the major protective barrier as important threat to physical safety is human intervention so to keep track of human intervention we need access card and time tracker.
  5. Electric safety or power safety: Proper secuitry measures should be taken while constructing the building which is shock proof.to achieve this we need to make use of high quality wires and MCB(miniature circuit breakers).
  6. In addition to above mention Barriers other protective Barriers which we should consider for ensuring physical security quality of the building, the region you choose is same from natural calamities if anything happens what are the quick measures which we should take to minimise the damage etc.

The above explained example holds good for all type of physical security.

I believe only if a place contains above protective barriers then only we say the place is safe and it is physically secure.


Related Solutions

No Plagiarism and must be in your own words (300 Words) Subject: Physical Security .What mitigation...
No Plagiarism and must be in your own words (300 Words) Subject: Physical Security .What mitigation procedures can be used to ensure the resiliency of protective barriers?
No Plagiarism and must be in your own words (300 Words) Subject: Physical Security Describe and...
No Plagiarism and must be in your own words (300 Words) Subject: Physical Security Describe and explain some of the hardening methods of entry control.
PLEASE NO PLAGIARISM AND MUST BE IN YOUR OWN WORDS You must write a minimum of...
PLEASE NO PLAGIARISM AND MUST BE IN YOUR OWN WORDS You must write a minimum of two paragraphs and every paragraph should have at least four complete sentences. What is risk management? What is Vulnerability assessment? Thanks!!
PLEASE NO PLAGIARISM AND MUST BE IN YOUR OWN WORDS You must write a minimum of...
PLEASE NO PLAGIARISM AND MUST BE IN YOUR OWN WORDS You must write a minimum of two paragraphs and every paragraph should have at least four complete sentences. What is the difference between security and safety? What is the relationship between risk management and vulnerability assessment? Thank!!
please no plagiarism and must be in your own 500 words Tasks Given the fact, that...
please no plagiarism and must be in your own 500 words Tasks Given the fact, that many companies require remote workers to remain in business, research and discuss at least two the issues of securing backups. The following questions must be addressed in your answer: How are companies preparing for Remote Incident Response? How should backup media be secured/ Is the off-site storage of backups necessary in a remote culture? why or why not?
Please no plagiarism and must be in your own words (800) Compare and contrast the use...
Please no plagiarism and must be in your own words (800) Compare and contrast the use of R vs Python and identify the pros and cons of each. Provide an example of both programming languages with coding examples as well as your experience in using one or both programming languages in professional or personal work. If you have no experience with either language, please discuss how you foresee using either/both of these languages in visualizing data when analyzing big data.  
Please no plagiarism and must be in your own 500 words. Discuss both advantages and disadvantages...
Please no plagiarism and must be in your own 500 words. Discuss both advantages and disadvantages of remote authentication protocols and how the business will use them.
Please no plagiarism and must be in your own 500 words. Please do not copy from...
Please no plagiarism and must be in your own 500 words. Please do not copy from the previous Chegg answers. Discuss the importance of the testing phase of the Software Development Life Cycle.
Respond to the following in a minimum of 300 words & in your OWN words. What...
Respond to the following in a minimum of 300 words & in your OWN words. What recommendations would you give to someone wanting to improve his or her cardiovascular health? Give reasoning for each recommendation. What recommendations would you give to someone wanting to improve his or her gastrointestinal health? Give reasoning for each recommendation.
PLS NOTE: "NO PLAGIARISM" "NO PLAGIARISM" MINIMUM OF 300 typed words and not written on a...
PLS NOTE: "NO PLAGIARISM" "NO PLAGIARISM" MINIMUM OF 300 typed words and not written on a piece of paper. 1)Using the class scenario and the Enterprise Architecture Cube Framework, please provide the following: a.List examples of documentation from the enterprise that would be appropriate at each of the five functional levels. b.List examples of documentation from the enterprise that would be appropriate for the three common planning threads. c.List examples of documentation from the enterprise that would illustrate Lines of...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT