Physical Security

In: Computers and Technology

Submitted By aidyl52
Words 2139
Pages 9
Physical Security



Table of Contents

INTRODUCTION III
ELEMENTS AND DESIGN III
EXAMPLES OF PHYSICAL SECURITY III
PHYSICAL SECURITY ELECTRONIC ACCESS III
CASINOS AND GAMING III
EDUCATION III
TRANSPORTATION III
Goggle Search iii
Dictionary Search iii



Introduction

This paper examines Physical Security from the perspective of perimeter such as gates/guards, building access controls, room access controls, enforcement options, auditing approaches, risk determination for physical attack vectors, etc. Physical Security describes measures that prevent and/or deter attackers from accessing a facility, resource, or information stored on physical media. It can be as simple as a locked door or as elaborate as multiple layers of armed guardposts.
In the Global world, Physical Security is the most common mechanisms for access control on doors and security containers. They are found in the vast majority of residences, commercial businesses, educational institutions, and government facilities, and often serve as the primary protection against intrusion and theft.
Elements and design

The field of security engineering has identified three elements to physical security:
1. obstacles, to frustrate trivial attackers and delay serious ones;
2. alarms, security lighting, security guard patrols and closed-circuit television cameras, to make it likely that attacks will be noticed; and
3. security response, to repel, catch or frustrate attackers when an attack is detected.
These features must complement each other as a well designed system. There are four layers of physical security and the goal is to convince potential attackers that the costs of attacking exceed the value of making the attack.
1. Environmental design
The initial layer of security for a campus, building, office, or physical space uses Crime Prevention through Environmental Design…...

Similar Documents

Physical Security

...Physical Security Table of Contents INTRODUCTION III ELEMENTS AND DESIGN III EXAMPLES OF PHYSICAL SECURITY III PHYSICAL SECURITY ELECTRONIC ACCESS III CASINOS AND GAMING III EDUCATION III TRANSPORTATION III Goggle Search iii Dictionary Search iii Introduction This paper examines Physical Security from the perspective of perimeter such as gates/guards, building access controls, room access controls, enforcement options, auditing approaches, risk determination for physical attack vectors, etc. Physical Security describes measures that prevent and/or deter attackers from accessing a facility, resource, or information stored on physical media. It can be as simple as a locked door or as elaborate as multiple layers of armed guardposts. In the Global world, Physical Security is the most common mechanisms for access control on doors and security containers. They are found in the vast majority of residences, commercial businesses, educational institutions, and government facilities, and often serve as the primary protection against intrusion and theft. Elements and design The field of security engineering has identified three elements to physical security: 1. obstacles, to frustrate trivial attackers and delay serious ones; 2. alarms, security lighting, security guard patrols and closed-circuit television cameras, to make it likely that attacks will be noticed; and 3. security response, to repel, catch or frustrate attackers when an attack...

Words: 2139 - Pages: 9

Outline the Physical Security Policy

...Associate Level Material Appendix E Physical Security Policy Student Name: University of Phoenix IT/244 Intro to IT Security Instructor’s Name: Date: March 11, 2012 Physical Security Policy Due in Week Five: Outline the Physical Security Policy. Merkow and Breithaupt (2006) state, “an often overlooked connection between physical systems (computer hardware) and logical systems (the software that runs on it) is that, in order to protect logical systems, the hardware running them must be physically secure” (p.165). Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario. These controls may include the following: * Physical controls (such as perimeter security controls, badges, keys and combination locks, cameras, barricades, fencing, security dogs, lighting, and separating the workplace into functional areas) * Technical controls (such as smart cards, audit trails or access logs, intrusion detection, alarm systems, and biometrics) * Environmental or life-safety controls (such as power, fire detection and suppression, heating, ventilation, and air conditioning) Security of the building facilities Physical entry controls Enter your text here Security offices, rooms and facilities Enter your text here Isolated delivery and loading areas Enter your text here Security of the information systems Workplace......

Words: 276 - Pages: 2

Physical Security Policy

...Associate Level Material Appendix E Physical Security Policy Student Name: xxxxxxxxxxx University of Phoenix IT/244 Intro to IT Security Instructor’s Name: xxxxxxxxx Date: 4.14.13 Physical Security Policy 1 Security of the building facilities 1 Physical entry controls Like we have in our company, everyone must have an ID Swipe card (smart Card), they must swipe the card coming into and going out of the building. These Smart card readers are at every door externally and internally. This is a big help in also identifying who is in the building and at what times. If there is any issue. This is for employees, for non-employees you need to write your name down and only then will you get a visitor’s pass to enter the building. You return you pass when you leave the building. We also have an alarm system at every external door way this includes the windows too. We do not have a fence but do have a security car that travels around the building all thru the night, as well as sensor lights and camera inside and out. 2 Security offices, rooms and facilities We have a few places that are locked down with keypad entrée’s one is the accounting room and the other is the network room. In the...

Words: 728 - Pages: 3

Physical Security Operations

...PHYSICAL SECRUTITY OPERTIONS RESEARCH PAPER Faye A. Smith Sec/320 October 29, 2012 Terence Hunt, MSS, CPP INTRODUCTION To understand the importance of physical security is the security of people and technology. The use of physical security consists if a series if actions that are used to protect someone against unwanted or illegal invasion. There are three levels of physical security which are the security practitioner should be concerned with. They are the outer perimeter, inner perimeter, and the interior. OUTER PERIMETER Your actual property line defines the outer perimeter. In controlling the outer you must control who can drive/walk onto your property. You can use barbed wire fence, a guard shack. You need to weigh the risk of an intruder entering your property and the cost of the available physical security measure. There are two concepts involved in perimeter security, which is Natural Access Control and Territorial Reinforcement. Natural Access Control is the use of building and landscaping features to guide the people as they and enter/exit a space. You all also want to discourage intruders to close any and all potential exits. potential (1) Clearly defined entrances the first thing to the access control is the approach to your area. That is can a car drive onto your property without it being notice? If this does happen that means you need to consider of using curbs, barriers, gates to direct the traffic to a single control area. A guard shack would be a...

Words: 717 - Pages: 3

Physical Security

...Physical Security Paper Security, the word carries different meanings depending on the context in which it is used but ultimately it always falls back to a sense of protection. Security can come in a variety forms but the one most notable would be physical security. Physical security refers to those tangible objects that can prevent or deter an adversary. Security is considered the backbone of any business or organization when the question of concern regarding protection is being looked upon. While physical security may appear to be simple, it actually follows a set of core concepts that helps to develop, build, and make it an effective approach to security. Physical security would not be complete without the use of a security assessment. If there is no known threat or risk then the need for security is not there which means it is the best decision to perform a security assessment to check for areas of vulnerability. Physical security also encompasses some basic physical controls that should be noted and taken into account. Core Concepts of Physical Security Before breaking into the core concepts of physical security, it only seems appropriate to determine exactly what physical security is. An effective physical protection system integrates people, equipment, and procedures for the protection of assets or facilities against theft, sabotage, or other malevolent human attacks (Rico & Beasley, 2006). Physical security is aimed at preventing any type of physical...

Words: 1183 - Pages: 5

Wireless Physical Layer Security: an Information Theoretic Approach

...Wireless Physical Layer Security: An Information Theoretic Approach DISSERTATION Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in the Graduate School of The Ohio State University By Onur Ozan K¨yl¨o˘lu, B.S., M.S. o u g Graduate Program in Electrical and Computer Engineering The Ohio State University 2010 Dissertation Committee: Hesham El Gamal, Adviser C. Emre K¨ksal o Ness B. Shroff Atilla Eryılmaz c Copyright by Onur Ozan K¨yl¨ o˘lu o u g 2010 ABSTRACT We are in the midst of wireless revolution, and increasing demand continues for wireless applications. This explosive growth, of wireless communications and services, inevitably renders security into a challenging quality of service constraint that must be accounted for in the network design. The state of the art methods in combating the security threats are usually founded on cryptographic approaches. These techniques typically assume limited computational resources at adversaries, are usually derived from unproven assumptions, and most of the time do not offer a measurable security notion. Information theoretic security, on the other hand, eliminates the aforementioned limitations of the cryptographic techniques at the physical layer of communication systems. In this thesis, we concentrate on both the theoretical and the practical aspects of physical layer security. We first start by analyzing elemental interference networks, in particular, two-user channels with an...

Words: 47476 - Pages: 190

Logical and Physical Security

...CONVERGENCE OF LOGICAL AND PHYSICAL SECURITY SYSTEMS INTRODUCTION Up to now, majority of organizations have their physical and logical access systems operating as independent structures, with each being run by a totally separate department. The information technology security system, which controls access to information technology infrastructure including mail servers, the internet, database applications and web servers was managed by the department of information technology. The physical security system, which incorporates door access into buildings, systems of life support such as CCTV and Fire, and the badging process of employees, was run by the department of facilities (Mehdizadeh, Y, 2003). Currently, security operations involve the guarding of buildings and equipment in addition to protection of networks, taking care of issues of privacy, and risk management. The interrelation between the aspects of the security initiatives necessitates consolidation of the two security systems. Such a convergence of the IT and physical security functions is important in achieving an efficient security system (Mehdizadeh, Y, 2003). However, such an operation is also lined up with disadvantages. This paper looks at the pros and cons of combining the IT and physical security functions in a medium to large-size firm with complex IT system requirements and a global footprint. It also analyzes the fundamental components of an IT security system and explains how their integration...

Words: 1624 - Pages: 7

Physical Security

...Physical Security Simulation After completing the interviews at Magnolia Utility Citizens’ Cooperative I found several holes in their physical security processes and also that many employees were not very happy about an outside security consultant asking questions. My experience from the security interviews was that there were multiple issues in most departments and many employees tried to mislead me into believing there was not a problem. In some interviews a couple of employees told me the way business was conducted and then blatantly contradicted themselves right in front of me. There were major consistency problems in the way business was conducted as well. I was surprised to learn that the cash management offices at both branch location were not ran the same way. I also saw got to see the value in bringing in an outside security consultant. With an outside consultant performing interviews I was able to find holes or short falls that were probably unknown to the security manager. The security report that we provided to Magnolia Utility Citizens’ Cooperative illustrated every aspect of security and accountability from each of their departments. With a list of everything Magnolia Utility Citizens’ Cooperative is doing wrong and right it will allow management to come up with plans, training, and/or changes to staff to make their company more efficient and secure. This physical security simulation was a great assignment for me. It put a lot of things in perspective......

Words: 270 - Pages: 2

Physical Security Plan

...Perimeter Protection As the Security Manager of Palm Beach Marina Cove (PBMC), I was informed that there will be an expansion to the existing condominium. PBMC II will be built next to PBMC on the east side of the property near the seawall. ABC construction will be the lead company to erect the PBMC II. A construction site has a high probability of internal and external threats. With the ongoing construction, we must put in place a perimeter protection plan. The perimeter protection plan must include best practices in perimeter protection for a construction site that integrates with the contiguous existing building, properly safeguard the perimeter of both sites during construction, my recommendations, and a budget for all recommendations. The protection plan will come with a price but we need to ensure the safety of all the residents of PBMC, but also take into considerations of ABC constructions equipment and materials. With undertaking of this huge project, we must look at the best practices for the construction site that integrates with the contiguous existing building. The first step in this process will ensure that the individuals that are working on the construction site will have a complete background check. The background check will be conducted by ABC Construction. If the employee is suitable to work on the site, he will be issued a badge with his or her picture on the card. If the individual is not suitable for the work site, then...

Words: 1710 - Pages: 7

Cyber Security: Physical and Digital Security Measures

...Cyber Security: Physical and Digital Security Measures Abstract Due to the issues associated with cyber security and the appropriate application thereof, this paper will strive to address different cybersecurity measures that may be employed, both physically and digitally. It will identify what cyber security is, measures that may be taken, the tools needed to ensure implementation, and provide information regarding the different resources and programs necessary to work to effect greater success in the application thereof. Keywords: cyber security, physical security, digital security, security measures, definition, tools, resources Cyber Security: Physical and Digital Security Measures Introduction In spite of the increasingly prevalent use of technology in today’s digital world, many organizations find the concept of cyber security to be somewhat of a mystery. As a result of a lack of knowledge or an inability to appropriately apply that knowledge, companies like Target, Home Depot, and even Sony, among others, find themselves faced with security nightmares that could have just as easily been avoided (Yang & Jayakumar, 2014; Home Depot, 2014; Steinberg, 2014). In order to be able to approach cyber security properly, an organization must both have the knowledge necessary to implement a system designed to secure their digitized data and must have the ability to apply that knowledge within the constructs of their systems in order to ensure that a breach does...

Words: 3485 - Pages: 14

Impact and Issues of Physical Security

...Impact and Issues of Physical Security Security 6030 Wilmington University Table of Contents Introduction 3 Physical Security Countermeasures 4 Physical Security Program 5 Regulatory Compliance 7 Conclusion 9 References 10 Introduction Most people consider about locks, bars, alarms, and uniformed guards once they consider about protection. At the same time these countermeasures are certainly not the only precautions that have got to be viewed when trying to secure information system, they're a perfectly logical situation to start. Physical security is a vital part of any security plan and is fundamental to all safety efforts without it, information security, application security, user access security, and community safety are considerably more...

Words: 1812 - Pages: 8

Case 3: Physical Security

...CASE 3: PHYSICAL SECURITY p.64 Required: 1. Why are the auditors of Avatar stressing the need to have a better physical environment for the server? If Avatar has proper software controls in place, would that not be enough to secure the information? Ans. Auditors of Avatar are stressing the need to have a better physical environment for the server to secure and protect the infrastructure itself (hardware, sorftware and networking devices) as well as the information they hold from possible threats. The company may not only lose the investment they put for the servers and data but it can also impair their ability to function as a business. Evidently, software controls that are currently in place are not enough to secure the information. Additional control features must be considered to guarantee the security of the server and help them mitigate risks. 2. Name the six essential control features that contribute directly to the security of the computer server Ans. a. The physical location of the computer center directly affects the risk of destruction to a natural or man-made disaster. b. Computer center should be located in a single-story building of solid construction with controlled access c. Access to the computer center should be limited to the operators and other employees who work there. d. Computers function best in an air-conditioned environment, and providing adequate air conditioning is often a requirement of the vendor’s warranty e. The......

Words: 354 - Pages: 2

Physical Security

...Current Event Article Krishna Koutilya Reddy Wilmington University A teenage hacker who is a student from an American high school hacked into personalized online e-mail account of Central Intelligence Agency (CIA) director John Brennan and hacked sensitive secret files and information. The hacker entered into the Brennan's individual e mail account and hacked sensitive documents that include: * A copy of application form regarding top-secret security clearance of total 47 pages. * Social Security Numbers and some personal information of more than 10 top most leading US officials. * A federal government authorities notice discussing on "harsh interrogation techniques" which are used to interrogate the terrorist suspects. * Phone figures * E-mail handles The hacker performed the procedure by using the Twitter name "Crackas with Attitude." The hacker also tweeted screenshots regarding the list of sensitive files in an e-mail account and showed the fax from the CIA office. Hacker stated that he apparently acquired an entry to an e-mail account of CIA director using a social engineering scam where he acted as a Verizon employee to get access as another employee to reveal Brennan's personalized details. By using that information hacker could reset the password of Brennan's personalized email account continuously and that's the reason chief struggled to regain its control. And finally after all trials Brennan’s account has got disabled. Government......

Words: 299 - Pages: 2

Physical

...Physical fitness is a necessity for everyone regardless of race, culture, or sex in order to live a long healthy life. In order to achieve physical fitness, you must be able to perform daily tasks vigorously, while avoiding diseases related to a lack of activity. There are many benefits of physical fitness like endurance, good figure, muscular strength, and flexibility. Some mental benefits include a positive attitude, high self-esteem, and the production of endorphins, which act as a natural painkiller. There have been many benefits of physical activity, which were always praised throughout history. It was not until the 1970s, that enough information was available on physical fitness. The American College of Sports Medicine and the American Heart Association has since begun issuing physical activity recommendations to the public. Some of these recommendations include cardio-respiratory exercises and sustained periods of vigorous activity. The past several years the ACSM, CDC, AHA, PCPFS, and NIH have also recommended regular, moderate physical activity. There are also risks involved with physical activity. The most common health problem related to physical activity is muscle and skeletal injury. These injuries can occur with almost any amount of exercise when the body is not conditioned. Flexibility and the proper education associated with these exercises are usually over looked. Some of the more serious risks associated with physical activity include heart attacks......

Words: 291 - Pages: 2

Physical

... exceeds manageable amounts then the fundamental needs of people (food/water) more significant than grand infrastructure 7. Expensive techniques for planning and management – are they physically capable and patient enough to reap the benefits in the long run or do they want immediate results Discuss the view that the impact of volcanic hazards depends primarily on physical factors. (40 marks) Volcanic events vary in size frequency and type around the world but it can be argued that these physical factors cause the greatest impact as they are uncontrollable and create the ‘initial’ impact which we can only manage and are therefore what causes the impact. On the other hand it could be said that there are many factors which affect the impacts, both human and physical. As stated it could be argued that physical factors are what the impact of volcanic events depends primarily on, because these are the factors behind the event. The eruption of Iceland for example in 2010 had 2 phases both physically very different. On March 20th the first eruption began lasting for 6 weeks; it gained little interest from the rest of the worldwide media as the eruption was not dominated by explosive events and caused little impact to the rest of the world. This was due to the low viscous nature of the lava allowing trapped gas bubbles to escape, this also produced little ash. In contrast with the second phase on April......

Words: 2036 - Pages: 9