This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Physical Security

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Physical Security

 

Physical security has been overlooked for years which has made most of the firms to lose track of their activities. Research has it that the increasing cases are due to the lack of incorporating the measures into their plan (Stallings et al., 2012). From this inference, the responsible bodies should ensure that they combine the appropriate steps to ensure that they improve the security status of the organization. Equally worth noting is that the information users trust their information with the organizations to preserve it in its original state. Therefore, the security specialist should ensure that all the necessary measures are used to mitigate the uncertainties that might arise.

 

Defence in depth is one of the strategies that has been used in the physical security plan to ensure the information systems are secured from the malicious attackers. This is because the attackers find it challenging to bypass several defence mechanisms which is crucial to the organizations. Employees, for instance, might interfere with the information systems since they are not monitored as required. As much as the organizations might trust the employees with the critical tasks in the organization, close monitoring of their activities us crucial since they might be used by the perpetrators to achieve their selfish interests (Ashok et al., 2014). The employees are mostly used by the competitors who might be willing to incur additional costs to acquire sensitive information such as the marketing techniques used by their competitors. Regarding this, the organizations should monitor their employees closely as they might contribute to their downfall.

Locked doors and reinforced perimeter walls limit the entry of people who might interfere with the information systems. With the advanced technology in the current world, the perpetrators might use devices such as the USBs and affect the information systems. This infers that the organizations should plan properly for the physical security measures to ensure that the organizations’ assets are secured from the attackers whose actions might lead to the indefinite closure of the business. Frisking should also be done to suspicious people to limit the entry of devices that might be used to execute the attackers’ plans.

Administrative controls, also such as proper site selection, help in combating the negative security issues that might occur. Works of literature have shown that the locations that are known for insecurity issues are more vulnerable than places with few security cases. Because of that, the organizations should seek relevant security issues before establishing their organizations in certain locations. Security guards also are crucial in the organizations since they are given the authority to safeguard the firms against any suspicious people who might compromise the security status. For the organizations to be guaranteed of their security, they have to use the right criteria to hire the guards to reap the expected outcome.

 

 

 

 

 

Physical security should not be taken lightly in the information technology sector since it might lead to huge losses in the organizations. As much as technological countermeasures serve the organizational needs, incorporating physical measures could bring better results. This, therefore, calls for a proper understanding of the relevant countermeasures that could bring deployed in the organizations to meet the security needs of the organizations.

 

References

Stallings, W., Brown, L., Bauer, M. D., & Bhattacharjee, A. K. (2012). Computer security: principles and practice (pp. 978-0). Upper Saddle River, NJ, USA: Pearson Education. Retrieved from https://fokt.pw/digital-15.pdf

Ashok, A., Hahn, A., & Govindarasu, M. (2014). Cyber-physical security of wide-area monitoring, protection and control in a smart grid environment. Journal of advanced research, 5(4), 481-489. Retrieved from https://www.sciencedirect.com/science/article/pii/S2090123213001495

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask