Physical security: Securing Boundary Devices, Hosts, and Software | MyPaperHub

Physical security is very important for an institution such as UMUC. It is usually much overlooked, and little emphasis is put on it but poses some of the greatest risks within an organization if they are not well established. In the world of IT, today organizations mostly put much of their focus on technological aspects of countermeasures against attacks.  It is an aspect that has grown to be very difficult for organizations because of the cost associated with establishing it effectively as well as the increases in ways to breach such security measures. Physical security is also associated with a lot of vulnerabilities that attackers prey on. The increased vulnerabilities have developed more and more forms of compromise that put computer systems belonging to organizations such as UMUC at the risk of unauthorized access.

Physical security requirements

 In the world of computing today there have been developed the aspect of portability as well as wireless technology, and these are factors that add up to the increased vulnerabilities of physical security in organizations. The mobility of computer devices has made it very easy to access information from a system. More precautionary measures are needed in order for the safety and protection of a computer to be guaranteed (Hutter, 2016). Physical security stands at a great position for securing such systems and organizations need to have a great analysis of how it operates in order to identify vulnerabilities that exist in order to close them. Some of the requirements of physical security measure in an organization include; control associated with access by unauthorized people, testing the physical security system, and surveillance. These three are some of the essential physical security requirements that are needed to address the problem of vulnerability in an institution such as UMUC (Physical security, 2017).

Proposed solution

Access controls play very important aspects in the establishment of a physical security measure in an organization. This is because of their association with the development of systems and mechanisms that are expected to manage access to physical and technological resources of an organization. Access controls also require the development of obstacles within the premises of the organization in order to make it hard for attackers to access. They may include developing a strong perimeter fence with electricity to bar away anyone one with malicious intentions of accessing the premises. It also includes other important aspects that include the use of sophisticated locks and alarm systems, biometric access controls, motion sensors, hiring experienced guards, having guard dogs and other aspects that would ensure that access is only limited to the people that have authorization (Hutter, 2016).

On the other hand, surveillance is another measure that helps organizations account for the people that have breached access to the premises of the organization without authorization. Surveillance is associated with the use of electronic equipment such as cameras. Use of closed circuit televisions which are well known as CCTVs is very important as a measure to ensure physical security. These cameras record activities within the premises of an organization and the recordings can be used to trace people that had access without authorization. They can be used to apprehend them. Others include motion and heat sensors that provide notifications of intrusions through alarm systems (Physical security, 2017).

The other aspect of physical security is associated with the use of testing. This involves measures that try to assess the strength of the physical security system already in place. It may be done through the use of drills that test the abilities of employees as well as the system itself of the risks of attack that may exist. Tests can also be used to identify more vulnerabilities within the system (Physical security, 2017).

Justification

The three components and measures are very important in ensuring physical security is high. They are measures that ensure the prevention, detection as well as the recovery of information and other important resources lost as a result of unauthorized access. Access controls are the factors between the inside and outside of the premises of an organization. The nature, as well as the level of security, is the one that determines the level of safety the organization has. Surveillances are important for the detection as well as the recovery in case an incidence of attack occurs. With surveillance, evidence can be easily recorded and culprits charged in court for their crimes. Surveillance also helps to scare away potential attackers because they are a sign of security for the organization. Testing is used as a measure for monitoring and evaluation of the existing physical security system. It can be used to identify new vulnerabilities and also determine the readiness of the existing system to protect the organization (Guil, 2003).

The world of today as explained above is characterized by mobility in terms of computer devices. Many people have access to laptops, flash drives, memory cards and other forms of technology that can be used to carry information from an organization and into the world where they are at greater risk of access by unauthorized people. The existence of this form of mobility has also made it very difficult for organizations to protect its data. There needs to be developed more measures that would ensure the safety of information and provide more effective measures that would control the use of mobile devices within the organization because they have become gateways to attacks (Physical security, 2017).


 

Works Cited

Guil, Felicitas. "Computer Rooms – Meet the physical security measures." SANS Institute (2003).

Hutter, David. "Physical Security and Why It Is Important." SANS Institute (2016).

"physical security." (2017). http://searchsecurity.techtarget.com/definition/physical-security.

Additional articles

Vodafone Group: Report Analysis

Contents Executive Summary Introduction- Brief Overview Mannesmann Vodafone Group Plc Objectives of Acquisition Profitability and Valuation Statics D2 Vodafone Germany OPI- Italy Telecom operations in rest of European Conti...Vodafone-Group:-Report-Analysis …

Read Article
Case Study: The Growing Appeal of Non-traditional Retail Locations

The case focuses on various retailers and how they have ventured into opening their stores at non-traditional locations. The main reason why these stores venture into the non-traditional location is to expand to the underutilized locations, a stra...Case-Study:-The-Growing-Appeal-of-Non-traditional-Retail-Locations …

Read Article
Compare and contrast the founding of the Chesapeake and New England, English colonies

The history of the colonial USA is a significant part of understanding the history of the European settlements and subsequent colonization of countries around the world. In the late years of the 16th century, some of the most powerful nations of E...Compare-and-contrast-the-founding-of-the-Chesapeake-and-New-England,-English-colonies …

Read Article
Let's give your paper the attention it deserves