Verified Document

Physical Security Models Essay

These can be layered by razor spiral at the top all around the perimeter wall. There could also be a second perimeter wall after the main one as well as security personnel patrolling the perimeter wall to handle any intrusions once detected. This type of perimeter wall works effectively in the layered security model since it gives the detection systems an inhibition backing to prevent intruders from accessing the business. The intrusion can also come in the form of attempted access through the legitimate means like through the gate where the intruder will come in as any expected traffic. The layered physical security mode will have several choke points at the entry areas. There is the first heavy steel gate where vehicles stop for thorough and systematic checks. Electronic devices are used to check the vehicles and the visitors on foot are expected to go through metal detectors.

The security measures are not ended once the person goes through the gate and gets access to the building but there is a controlled access to some areas like the server rooms and identification tags are issued to keep tab and account for every individual within the compound. There is need for various validation areas within the business premises to ensure that the...

The layered security system also works in such a manner that each control point within the building is linked to the other in such a manner that if there is security compromise in one region, it can be isolated and shut off from the other regions in order to prevent the threat from spreading to other regions.
It is important to note the significance of regular inspecting of the security system in order to be sure that the security works well al the time. The security system also needs to be managed or manned by the same group in order for there to be a well coordinated security system that does not leave gaps that could be explored by intruders.

References

Pagoria B., (2004). Implementing Robust Physical Security. SANS Institute. Retrieved May 3, 2014 from http://www.sans.org/reading-room/whitepapers/physcial/implementing-robust-physical-security-1447

Taylor B., (2002). Physical Security Vs. Information Security: Redefining the Layered Information Security Models. Retrieved May 3, 2014 from http://www.giac.org/paper/gsec/1792/physical-security-vs.-information-security-redefining-layered-information-security-model/109158

Sources used in this document:
References

Pagoria B., (2004). Implementing Robust Physical Security. SANS Institute. Retrieved May 3, 2014 from http://www.sans.org/reading-room/whitepapers/physcial/implementing-robust-physical-security-1447

Taylor B., (2002). Physical Security Vs. Information Security: Redefining the Layered Information Security Models. Retrieved May 3, 2014 from http://www.giac.org/paper/gsec/1792/physical-security-vs.-information-security-redefining-layered-information-security-model/109158
Cite this Document:
Copy Bibliography Citation

Related Documents

Security Technology in Next Five Years Globally
Words: 1593 Length: 5 Document Type: Essay

Security Technology in Next Five Years Globally security concerns have placed great pressure on the survival of human life and had threatened the daily life, confidence and dignity of societies at large. To resolve the security concerns and overcome with this disastrous obstacles, security technological advancements have been made in many facets. Human life is playing its vital role in moving the world to a secure place where families, businesses,

Security Privacy and Ethics in the Surveillance State
Words: 6863 Length: 23 Document Type: Research Paper

Physical Security in Public AreasAbstract/SummaryThis paper examines the effectiveness of physical security measures in public areas, by looking at spaces such as schools, airports, stadiums, and malls. It discusses current strategies, including surveillance cameras, metal detectors, and access control systems. It also examines the need customized approaches since all spaces are different. Schools require security that balances safety with an open, welcoming environment, whereas airports can use stricter, more invasive

Security and Control of Health Data
Words: 3766 Length: 10 Document Type: Term Paper

Health-Care Data at Euclid Hospital Security and Control: A White Paper Protecting Health-Care Data The efficiency of the modern healthcare system is increasingly becoming reliant on a computerized infrastructure. Open distributed information systems have been initiated to bring professionals together on a common platform throughout the world. It needs to be understood that easy and flexible methods of processing and communication of images; sound and texts will help in visualizing and thereby

Security and Cloud Computing
Words: 2417 Length: 8 Document Type: Research Paper

Cloud Computing: Security Threats & Countermeasures, Auditing and Strategies Regarding the Cloud Abstract The cloud is the latest development in the world of the Information Age. It provides a way for data to be stored, shared, managed, and protected in an efficient and effective manner. This paper looks at some of the security threats and countermeasures that can be conducted to help make the cloud safer. It examines why auditing is essential

Security in Cloud Computing
Words: 3274 Length: 10 Document Type: Research Paper

Security in Cloud Computing Security issues associated with the cloud Cloud Security Controls Deterrent Controls Preventative Controls Corrective Controls Detective Controls Dimensions of cloud security Security and privacy Compliance Business continuity and data recovery Logs and audit trails Legal and contractual issues Public records The identified shortcomings in the cloud computing services and established opportunities for growth regarding security aspects are discussed in the current research. The security of services is regarded as the first obstacle. The opportunity for growth is provided as combination

Physical and Mental Disorders for
Words: 1325 Length: 4 Document Type: Essay

Usually, diagnosis is symptom driven, then combined with testing, forms an opinion, sometimes verified by lab tests, of a specific diagnosis. For instance, someone may have symptoms of nausea, pain, depression, anxiety, and their skin has a yellowish hue. The physician runs blood tests and finds that the liver is malfunctioning and there is likely a diagnosis of hepatitis. In this case, there are both physical and mental symptoms,

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now