Physical Security
Physical security has been overlooked for years which has made most of the firms to lose track of their activities. Research has it that the increasing cases are due to the lack of incorporating the measures into their plan (Stallings et al., 2012). From this inference, the responsible bodies should ensure that they combine the appropriate steps to ensure that they improve the security status of the organization. Equally worth noting is that the information users trust their information with the organizations to preserve it in its original state. Therefore, the security specialist should ensure that all the necessary measures are used to mitigate the uncertainties that might arise.
Defence in depth is one of the strategies that has been used in the physical security plan to ensure the information systems are secured from the malicious attackers. This is because the attackers find it challenging to bypass several defence mechanisms which is crucial to the organizations. Employees, for instance, might interfere with the information systems since they are not monitored as required. As much as the organizations might trust the employees with the critical tasks in the organization, close monitoring of their activities us crucial since they might be used by the perpetrators to achieve their selfish interests (Ashok et al., 2014). The employees are mostly used by the competitors who might be willing to incur additional costs to acquire sensitive information such as the marketing techniques used by their competitors. Regarding this, the organizations should monitor their employees closely as they might contribute to their downfall.
Locked doors and reinforced perimeter walls limit the entry of people who might interfere with the information systems. With the advanced technology in the current world, the perpetrators might use devices such as the USBs and affect the information systems. This infers that the organizations should plan properly for the physical security measures to ensure that the organizations’ assets are secured from the attackers whose actions might lead to the indefinite closure of the business. Frisking should also be done to suspicious people to limit the entry of devices that might be used to execute the attackers’ plans.
Administrative controls, also such as proper site selection, help in combating the negative security issues that might occur. Works of literature have shown that the locations that are known for insecurity issues are more vulnerable than places with few security cases. Because of that, the organizations should seek relevant security issues before establishing their organizations in certain locations. Security guards also are crucial in the organizations since they are given the authority to safeguard the firms against any suspicious people who might compromise the security status. For the organizations to be guaranteed of their security, they have to use the right criteria to hire the guards to reap the expected outcome.
Physical security should not be taken lightly in the information technology sector since it might lead to huge losses in the organizations. As much as technological countermeasures serve the organizational needs, incorporating physical measures could bring better results. This, therefore, calls for a proper understanding of the relevant countermeasures that could bring deployed in the organizations to meet the security needs of the organizations.
References
Stallings, W., Brown, L., Bauer, M. D., & Bhattacharjee, A. K. (2012). Computer security: principles and practice (pp. 978-0). Upper Saddle River, NJ, USA: Pearson Education. Retrieved from https://fokt.pw/digital-15.pdf
Ashok, A., Hahn, A., & Govindarasu, M. (2014). Cyber-physical security of wide-area monitoring, protection and control in a smart grid environment. Journal of advanced research, 5(4), 481-489. Retrieved from https://www.sciencedirect.com/science/article/pii/S2090123213001495