Physical Security Models Essay

PAGES
2
WORDS
822
Cite

These can be layered by razor spiral at the top all around the perimeter wall. There could also be a second perimeter wall after the main one as well as security personnel patrolling the perimeter wall to handle any intrusions once detected. This type of perimeter wall works effectively in the layered security model since it gives the detection systems an inhibition backing to prevent intruders from accessing the business. The intrusion can also come in the form of attempted access through the legitimate means like through the gate where the intruder will come in as any expected traffic. The layered physical security mode will have several choke points at the entry areas. There is the first heavy steel gate where vehicles stop for thorough and systematic checks. Electronic devices are used to check the vehicles and the visitors on foot are expected to go through metal detectors.

The security measures are not ended once the person goes through the gate and gets access to the building but there is a controlled access to some areas like the server rooms and identification tags are issued to keep tab and account for every individual within the compound. There is need for various validation areas within the business premises to ensure that the...

...

The layered security system also works in such a manner that each control point within the building is linked to the other in such a manner that if there is security compromise in one region, it can be isolated and shut off from the other regions in order to prevent the threat from spreading to other regions.
It is important to note the significance of regular inspecting of the security system in order to be sure that the security works well al the time. The security system also needs to be managed or manned by the same group in order for there to be a well coordinated security system that does not leave gaps that could be explored by intruders.

Sources Used in Documents:

References

Pagoria B., (2004). Implementing Robust Physical Security. SANS Institute. Retrieved May 3, 2014 from http://www.sans.org/reading-room/whitepapers/physcial/implementing-robust-physical-security-1447

Taylor B., (2002). Physical Security Vs. Information Security: Redefining the Layered Information Security Models. Retrieved May 3, 2014 from http://www.giac.org/paper/gsec/1792/physical-security-vs.-information-security-redefining-layered-information-security-model/109158


Cite this Document:

"Physical Security Models" (2014, May 04) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/physical-security-models-188842

"Physical Security Models" 04 May 2014. Web.26 April. 2024. <
https://www.paperdue.com/essay/physical-security-models-188842>

"Physical Security Models", 04 May 2014, Accessed.26 April. 2024,
https://www.paperdue.com/essay/physical-security-models-188842

Related Documents

Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework

(Gartenberg, 2005) Like all other aspects of business today, security systems often prove to be highly complex and hard (even for the participants) to identify. The culture of an organization is like the culture of a family, a community, or a nation: Because it surrounds the people in it they often have a great deal of difficulty in recognizing to what extent policies and procedures arise from the constraints of culture

SECURITY and PRIVACY - the following security and privacy requirements apply: The Office does not accept responsibility for the privacy, confidentiality or security of data or information not generated by this office or transmitted from external sources into the system. The Office does not accept responsibility for loss, corruption, misdirection or delays in transmission of personal data through the system. Users are responsible for the integrity of all data and

They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and

Security Information is the Power. The importance of collecting, storing, processing and communicating the relevant information presently is viewed as crucial in order to achieve success in almost all the fields be it business firms, individuals or organizations. An integrated set of components assisting collection, store, process and communication of information is termed as information system. Increasing dependence on information systems is noticed in order to excel in the respective fields

Security Technology in Next Five Years Globally security concerns have placed great pressure on the survival of human life and had threatened the daily life, confidence and dignity of societies at large. To resolve the security concerns and overcome with this disastrous obstacles, security technological advancements have been made in many facets. Human life is playing its vital role in moving the world to a secure place where families, businesses,