Physical Security Policy Essay

782 words - 4 pages

Physical Security Policy

KATARINA BRUNSKI
Sunday March 24 2013

Merkow and Breithaupt (2006) state, “an often overlooked connection between physical systems (computer hardware) and logical systems (the software that runs on it) is that, in order to protect logical systems, the hardware running them must be physically secure” (p.165).
Some entry controls that we can implement are making sure all doors are locked, implementing a system of alarm systems that are watched twenty-four seven, we should implement a system that allows badge access to the building, plus having the badges pop a picture on the computer to show who just came in the building. We should also implement restricted ...view middle of the document...

To protect the company’s information and assets a physical security policy has to be developed and enforced.
An isolated delivery and loading area is also very important for any business. Others that are delivering goods and services may attempt to intrude in to restricted areas to gain access to information that can help them rob or steal valuable assets. Most businesses have a designated spot as well as they require all visitors to sign in and also be escorted in by security.
Work place protection procedures are definitely needed to maintain security and keep all information confidential. There should be a written policy related to security practices and procedures that all representatives should be trained upon and are required to follow. There should be someone that is assigned to make sure all information and documents are safeguarded. One should also be aware of their current level of security.
All unused ports must be secured at all times, if the port is used for transient purposes, such as when a sales or executive employee visits a facility, then provisions must be made be made by and notice given to the information security department. Ports that are unused that are needed for future expansion plans must be temporarily disconnected until needed.”
All network and server equipment should be kept secure and there should be limited access to the equipment. All network equipment should be kept in a climate controlled room where it can’t...

Other Essays Like Physical Security Policy

Best Ever Essay

1112 words - 5 pages will be issued to the US government and you will be terminated immediately. Passwords Password policy is made to protect the computers security. A strong password with a mix of character, number, and symbols will result in a great password. A poor password is a very short and is used all the time.Example:1234 or your name. Frequently changing your password will provide greater protection for the company’s security. Physical Security Physical

Nsa Prodject Part 5 Essay

1200 words - 5 pages Red Group: John Richard Eib, Adam Upham, James Hare SP2799 Network Systems Administration Capstone Project Part 5 The fact that the ABC Company has locations throughout the world creates some additional concern when designing a security system. We have designed a physical security system that will provide adequate security for the company’s facilities, assets and personnel. The system specifics are as follows: (See attached schematics

It Security Policy Framework

1345 words - 6 pages Introduction When implementing a security policy many elements should be considered. For example, the size of the organization, the industry, classification of the data processed, and even the organization’s work load must be taken into account. As with any industry, selecting the proper security framework for an insurance organization should be done cautiously. This is because having too strict of a policy may inconvenience the

Accounting Data

2948 words - 12 pages internet security concerns In the future, the internet security issues can be alleviated by establishing a security policy. A security policy is defined as a written statement document that describe how an organization intend to protect its physical and information technology assets. A security policy general is regarded as a living document which is constantly to be updated according to the changed technology and employee requirements and never

It Asset Inventory List

1228 words - 5 pages work in the case of the faculty, Physical security at the school protecting the servers, student data, school business information, etc. and strong password policy. 3. Given the potential risks that you identified, what IT security policies would you recommend be created by the school to help mitigate each of the identified risk exposures you listed in #2 above? First and foremost a comprehensive security policy that takes into consideration the

IT 244 Final Assignment

5026 words - 21 pages Associate Level Material Appendix B Information Security Policy Student Name: Enter Your Name Here University of Phoenix IT/244 Intro to IT Security Instructor’s Name: Enter Your Instructor's Name Here Date: Enter the date here Table of Contents 1. Executive Summary 1 2. Introduction 1 3. Disaster Recovery Plan 1 3.1. Key elements of the Disaster Recovery Plan 1 3.2. Disaster Recovery Test Plan 1 4. Physical

Within the Network of the Department of Defense (Dod),

633 words - 3 pages and enforcement strategy of AAA. Our modified Internet use policy along with a physical access policy will be discussed first, then further detail will be explained going forward. Internet access is one of the main-stays of AAA. Users constantly will be using the Internet to access their email accounts, work use, and downtime personal use if they are laptop users at home. During business hours, only work related assignments from web usage will

A Comparison of Information Security Surveys

3096 words - 13 pages findings will be discussed. An analysis and comparison of the surveys to include both methodologies and findings will also be offered. Computer Security Institute (CSI) CSI is a professional membership organization serving practitioners of information, network and computer-enabled physical security from the level of system administrator to the Chief Information Security Officer (About the Computer Security Institute, 2009). CSI

Hoffman Trucking

1402 words - 6 pages ). Security Audit Huffman Trucking will use the services of Smith Systems Consulting to perform a quarterly security audit; this audit will test the physical security, the network security, and the security policy.  A checklist will be created to standardize the audit results, ensure all aspects are properly tested and create consistency within the audit.  Here is a brief overview of what the audit will

Ifsm 304 B2

1121 words - 5 pages entity. The Security Rule requires appropriate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of electronic protected health information. (Security, 2003) The policy requirements and restrictions defined in this document shall be adhered to by all employees at all locations and by contractors working for the organization. Procedures: The following requirements are the minimum to meet

Security Plan

1260 words - 6 pages Project Part 1 Multi-Layered Security Plan Introduction The components that make up cyberspace are not automatically secure. This includes cabling, physical networks, operating systems, and software applications that computers use to connect to the Internet. There is a raging information security war. The goal is to protect national security and business information. Therefore, IT is in great need of proper security controls. Scenario

Related Papers

A Big Idea Essay

1180 words - 5 pages , government has many different types of policy instruments that can be used to manage this range of security threats, and they can and should all be used in the most cost-effective combination to address the full range of security challenges. From these two ideas naturally springs a third: that governments should view the security threats they face, and the responses they make to them, holistically, and unite them under an overarching National Security

Chapter 5 Principles Of Information Security

3378 words - 14 pages publications, seminars, classes, and web portals. 8. Briefly describe management, operational and technical controls, and explain when each would be applied as part of a security framework. Answer: Managerial controls are procedural steps that establishes the direction and scope of the security process and provide in-depth instructions for its implementation. Operational controls deal with physical and personnel security and the protection of

Is4680 Lab 2 Questions Essay

662 words - 3 pages use this is because DCID 6/3 can give more detail than any other physical security and encryption combined. 3. What is C&A and what are the following Acronyms related to the C&A process: DISN, GIG, PAA, DAA, DISA? C&A- Certification & Accreditation (C&A), Defense Information Systems Network (DISN), Global Information Grid (GIG), Principal Accrediting Authority (PAA), Designated Accrediting Authority (DAA), Defense Information Systems

Tgt2 Apps In Network Security Challenge

1035 words - 5 pages A. Integrity of Network Security Introduction New security policy created for e-mail will ensure e-mails are used for business purpose and limits personal usage of e-mails. Policy also permits Softsearch to monitor employee’s e-mails if required. Controls implemented by e-mail policy will help prevent confidentiality breach. However, e-mail policy does not govern attachments within e-mails. Policy should be enhanced to include e-mail