Verified Document

Security The Implementation Of System-Level Essay

There is a trade-off with regard to this first layer to ensure a high level of physical security that does not compromise the system-level flexibility and support. This first level of support can be as simple as locks, fireproofing and safes to biometrically based access as well. The components of physical security are surveillance and notification systems. These are systems that react to smoke, intrusion or a threat in the form of a break-in for example. Using motion sensors, intrusion detection equipment and closed-circuit televisions are all part of this step, as are continual centralized monitoring of the entire site as well. Organizations have successfully been able to integrate emergency self-start shutdown procedures for systems when intruders are discovered, disabling all system access to protect the data. A third class or component of security is the reliance on...

Advanced strategies organizations are using at this level include attempting to capture the attackers by locking them into the computing complex and also taking their pictures via video and sending them to monitoring agencies including the police and FBI in real-time.
References

Phil Aronson. (2005). An integrated approach to workplace security.

Employment Relations Today, 32(1), 41-46.

C Thomas Johnson. (2008). Protecting Your Walls. Risk Management,

55(5), 55,8.

Gene Kim. (2008). Seven steps to a secure virtual environment.…

Sources used in this document:
References

Phil Aronson. (2005). An integrated approach to workplace security.

Employment Relations Today, 32(1), 41-46.

C Thomas Johnson. (2008). Protecting Your Walls. Risk Management,

55(5), 55,8.
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now